WorldWideScience

Sample records for wireless propagation letters

  1. Propagation Engineering in Wireless Communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2012-01-01

    Wireless communications has seen explosive growth in recent decades, in a realm that is both broad and rapidly expanding to include satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems and much more. Propagation Engineering in Wireless Communications deals with the basic principles of radiowaves propagation for frequency bands used in radio-communications, offering descriptions of new achievements and newly developed propagation models. The book bridges the gap between theoretical calculations and approaches, and applied procedures needed for advanced radio links design. The primary objective of this two-volume set is to demonstrate the fundamentals, and to introduce propagation phenomena and mechanisms that engineers are likely to encounter in the design and evaluation of radio links of a given type and operating frequency. Volume one covers basic principles, along with tropospheric and ionospheric propagation,...

  2. Propagation engineering in wireless communications

    CERN Document Server

    Ghasemi, Abdollah; Ghasemi, Farshid

    2016-01-01

    This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

  3. NASA Lunar Base Wireless System Propagation Analysis

    Science.gov (United States)

    Hwu, Shian U.; Upanavage, Matthew; Sham, Catherine C.

    2007-01-01

    There have been many radio wave propagation studies using both experimental and theoretical techniques over the recent years. However, most of studies have been in support of commercial cellular phone wireless applications. The signal frequencies are mostly at the commercial cellular and Personal Communications Service bands. The antenna configurations are mostly one on a high tower and one near the ground to simulate communications between a cellular base station and a mobile unit. There are great interests in wireless communication and sensor systems for NASA lunar missions because of the emerging importance of establishing permanent lunar human exploration bases. Because of the specific lunar terrain geometries and RF frequencies of interest to the NASA missions, much of the published literature for the commercial cellular and PCS bands of 900 and 1800 MHz may not be directly applicable to the lunar base wireless system and environment. There are various communication and sensor configurations required to support all elements of a lunar base. For example, the communications between astronauts, between astronauts and the lunar vehicles, between lunar vehicles and satellites on the lunar orbits. There are also various wireless sensor systems among scientific, experimental sensors and data collection ground stations. This presentation illustrates the propagation analysis of the lunar wireless communication and sensor systems taking into account the three dimensional terrain multipath effects. It is observed that the propagation characteristics are significantly affected by the presence of the lunar terrain. The obtained results indicate the lunar surface material, terrain geometry and antenna location are the important factors affecting the propagation characteristics of the lunar wireless systems. The path loss can be much more severe than the free space propagation and is greatly affected by the antenna height, surface material and operating frequency. The

  4. Radio propagation and adaptive antennas for wireless communication networks

    CERN Document Server

    Blaunstein, Nathan

    2014-01-01

    Explores novel wireless networks beyond 3G, and advanced 4G technologies, such as MIMO, via propagation phenomena and the fundamentals of adapted antenna usage.Explains how adaptive antennas can improve GoS and QoS for any wireless channel, with specific examples and applications in land, aircraft and satellite communications.Introduces new stochastic approach based on several multi-parametric models describing various terrestrial scenarios, which have been experimentally verified in different environmental conditionsNew chapters on fundamentals of wireless networks, cellular and non-cellular,

  5. Propagation Characteristics of International Space Station Wireless Local Area Network

    Science.gov (United States)

    Sham, Catherine C.; Hwn, Shian U.; Loh, Yin-Chung

    2005-01-01

    This paper describes the application of the Uniform Geometrical Theory of Diffraction (UTD) for Space Station Wireless Local Area Networks (WLANs) indoor propagation characteristics analysis. The verification results indicate good correlation between UTD computed and measured signal strength. It is observed that the propagation characteristics are quite different in the Space Station modules as compared with those in the typical indoor WLANs environment, such as an office building. The existing indoor propagation models are not readily applicable to the Space Station module environment. The Space Station modules can be regarded as oversized imperfect waveguides. Two distinct propagation regions separated by a breakpoint exist. The propagation exhibits the guided wave characteristics. The propagation loss in the Space Station, thus, is much smaller than that in the typical office building. The path loss model developed in this paper is applicable for Space Station WLAN RF coverage and link performance analysis.

  6. Propagation channel characterization, parameter estimation, and modeling for wireless communications

    CERN Document Server

    Yin, Xuefeng

    2016-01-01

    Thoroughly covering channel characteristics and parameters, this book provides the knowledge needed to design various wireless systems, such as cellular communication systems, RFID and ad hoc wireless communication systems. It gives a detailed introduction to aspects of channels before presenting the novel estimation and modelling techniques which can be used to achieve accurate models. To systematically guide readers through the topic, the book is organised in three distinct parts. The first part covers the fundamentals of the characterization of propagation channels, including the conventional single-input single-output (SISO) propagation channel characterization as well as its extension to multiple-input multiple-output (MIMO) cases. Part two focuses on channel measurements and channel data post-processing. Wideband channel measurements are introduced, including the equipment, technology and advantages and disadvantages of different data acquisition schemes. The channel parameter estimation methods are ...

  7. Light propagation analysis in nervous tissue for wireless optogenetic nanonetworks

    Science.gov (United States)

    Wirdatmadja, Stefanus; Johari, Pedram; Balasubramaniam, Sasitharan; Bae, Yongho; Stachowiak, Michal K.; Jornet, Josep M.

    2018-02-01

    In recent years, numerous methods have been sought for developing novel solutions to counter neurodegenerative diseases. An objective that is being investigated by researchers is to develop cortical implants that are able to wirelessly stimulate neurons at the single cell level. This is a major development compared to current solutions that use electrodes, which are only able to target a population of neurons, or optogenetics, which requires optical fiber-leads to be embedded deep into the brain. In this direction, the concept of wireless optogenetic nanonetworks has been recently introduced. In such architecture, miniature devices are implanted in the cortex for neuronal stimulation through optogenetics. One of the aspects that will determine the topology and performance of wireless optogenetic nanonetworks is related to light propagation in genetically-engineered neurons. In this paper, a channel model that captures the peculiarities of light propagation in neurons is developed. First, the light propagation behavior using the modified Beer-Lambert law is analyzed based on the photon transport through the nervous tissue. This includes analyzing the scattering light diffraction and diffusive reflection that results from the absorption of neural cell chromophores, as well as validating the results by means of extensive multiphysics simulations. Then, analysis is conducted on the path loss through cells at different layers of the cortex by taking into account the multi-path phenomenon. Results show that there is a light focusing effect in the soma of neurons that can potentially help the to stimulate the target cells.

  8. Propagation Analysis for Wireless Sensor Networks Applied to Viticulture

    Directory of Open Access Journals (Sweden)

    Felipe Pinheiro Correia

    2017-01-01

    Full Text Available Wireless sensor networks have been proposed as a solution to obtain soil and environment information in large distributed areas. The main economic activity of the São Francisco Valley region in the Northeast of Brazil is the irrigated fruit production. The region is one of the major agricultural regions of the country. Grape plantations receive large investments and provide good financial return. However, the region still lacks electronic sensing systems to extract adequate information from plantations. Considering these facts, this paper presents a study of path loss in grape plantations for a 2.4 GHz operating frequency. In order to determine the position of the sensor nodes, the research dealt with various environmental factors that influence the intensity of the received signal. It has been noticed that main plantation aisles favor the guided propagation, and the vegetation along the secondary plantation aisles compromises the propagation. Diffraction over the grape trees is the main propagation mechanism in the diagonal propagation path. Transmission carried out above the vineyard showed that reflection on the top of the trees is the main mechanism.

  9. New approach to wireless data communication in a propagation environment

    Science.gov (United States)

    Hunek, Wojciech P.; Majewski, Paweł

    2017-10-01

    This paper presents a new idea of perfect signal reconstruction in multivariable wireless communications systems including a different number of transmitting and receiving antennas. The proposed approach is based on the polynomial matrix S-inverse associated with Smith factorization. Crucially, the above mentioned inverse implements the so-called degrees of freedom. It has been confirmed by simulation study that the degrees of freedom allow to minimalize the negative impact of the propagation environment in terms of increasing the robustness of whole signal reconstruction process. Now, the parasitic drawbacks in form of dynamic ISI and ICI effects can be eliminated in framework described by polynomial calculus. Therefore, the new method guarantees not only reducing the financial impact but, more importantly, provides potentially the lower consumption energy systems than other classical ones. In order to show the potential of new approach, the simulation studies were performed by author's simulator based on well-known OFDM technique.

  10. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  11. Letters

    Science.gov (United States)

    2001-07-01

    The Editor welcomes letters, by e-mail to ped@iop.org or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: Alternative view of education in Zambia Pedantry or compromise Alternative view of education in Zambia I have just read the 'On the Map' report of the International School of Lusaka with very mixed feelings (Physics Education, March 2001). I have recently spent some time in Zambia, in Lusaka, and share Sue Pears' love for the country and the Zambians. The ISL is indeed a good, prestigious school, similar to International Schools in many other countries. But, as in most other developing countries, there is enormous variation between the different types of schooling, and the ISL is at one end of the spectrum. Most schools in Zambia are less favoured. Zambia is a wonderful, beautiful country full of the most friendly and resourceful people I know. It is also a very poor country. It is a country of enormous contrasts and its schools reflect that variation. It has a tiny, affluent 'middle' class of professionals, politicians, businessmen, employees of international businesses and NGOs—nearly all paid from overseas budgets. It has an enormous majority of poor folk, cheerfully living in very basic conditions but sharing their lives in extended families without complaint. The government is virtually bankrupt, and consequently those paid by the government—teachers, police, nurses etc—get a pittance. The wage for a teacher in a typical school is #20 per month (compared to a typical teacher in the UK who gets 100 times more, about #2000 per month). The GNP in Zambia is about 1 per day per person, and this has to pay for all the schools, hospitals, police, and the civic infrastructure that we take so much for granted (the GNP in UK is about 60 per day per person). Consequently most state schools do not have resources; they have a classroom and a teacher but little else. What resources the school has will be paid for by the school fees that every

  12. Letters

    Science.gov (United States)

    2001-03-01

    The Editor welcomes letters, by e-mail to ped@iop.org or by post to Dirac House, Temple Back, Bristol BS1 6BE Contents: Force on a pendulum Sound slows down Bond is back Force on a pendulum The simple pendulum has been used by several educationalists for investigating the patterns of thinking among students and their observations that Aristotelian thinking persists among students at college level. I had also considered the simple pendulum in my 1985 letter in Physics Today [1], so I was interested to read the test given by Lenka Czudková and Jana Musilová [2]. When students were asked to draw net forces acting on the particle at various positions, 31.9% of students believed that the net force was tangential to the particle's path the whole time. To me this is no surprise because in our derivation of the equation for the period of a simple pendulum we assume that the unbalanced sine component provides the restoring force for the harmonic motion of the bob. Of course, Czudková and Musilová's question asked students for the net force on the particle, not the component. The student's answer fits well with the logic of the equilibrium of forces and the parallelogram law. Lastly, let me bring out the similarity between the student's answer and the thinking of George Gamow. He used to call positrons 'donkey' electrons because of their displacement against the applied force, before Paul Dirac termed them positrons. Victor Weisskeptf told me this anecdote in a letter in May 1982. References [1] Sathe D 1985 Phys. Today 38 144 [2] Czudková L and Musilová J 2000 Phys. Educ. 35 428 Dileep V Sathe Dadawala Jr College, Pune, India Sound slows down Without wanting to stir up more trouble amongst the already muddy waters of Physics teaching, consider how many times you have heard (or, more worryingly, read) this: 'Sound waves travel faster in a denser material' But...The velocity of simple longitudinal waves in a bulk medium is given by v = (K/ρ)1/2 where K is

  13. Letters

    Science.gov (United States)

    2001-09-01

    The Editor welcomes letters, by e-mail to ped@iop.org or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: M-set as metaphor The abuse of algebra M-set as metaphor 'To see a World in a Grain of Sand And a Heaven in a Wild Flower Hold Infinity in the palm of your hand And Eternity in an hour' William Blake's implied relativity of spatial and temporal scales is intriguing and, given the durability of this worlds-within-worlds concept (he wrote in 1803) in art, literature and science, the blurring of distinctions between the very large and the very small must strike some kind of harmonious chord in the human mind. Could this concept apply to the physical world? To be honest, we cannot be absolutely sure. Most cosmological thinking still retains the usual notions of a finite universe and an absolute size scale extending from smallest to largest objects. In the boundless realm of mathematics, however, the story is quite different. The M-set was discovered by the French mathematician Benoit Mandelbrot in 1980, created by just a few simple lines of computer code that are repeated recursively. As in Blake's poem, this 'world' has no bottom we have an almost palpable archetype for the concept of infinity. I would use the word 'tangible', but one of the defining features of the M-set is that nowhere in the labyrinth can one find a surface smooth enough for a tangent. Upon magnification even surfaces that appeared to be smooth explode with quills and scrolls and lightning bolts and spiral staircases. And there is something more, something truly sublime. Observe a small patch with unlimited magnifying power and, as you observe the M-set on ever-smaller scales, down through literally endless layers of ornate structure, you occasionally come upon a rapidly expanding cortex of dazzling colour with a small black structure at its centre. The black spot appears to be the M-set itself! There is no end to the hierarchy, no bottom-most level, just endless recursive

  14. Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

    Directory of Open Access Journals (Sweden)

    Weimin GAO

    2014-01-01

    Full Text Available Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

  15. Letters

    Science.gov (United States)

    2001-05-01

    The Editor welcomes letters, by e-mail to ped@iop.org or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: Quantum uncertainties Reflections in a plastic box A brief history of quantum physics Correction Grammar and gender Quantum uncertainties Whilst I enjoyed Gesche Pospiech's article ('Uncertainty and complementarity: the heart of quantum physics' 2000 Phys. Educ. 35 393 9) I would like to expand on two comments he makes. Firstly the author claims that QM is linear, and a consequence of this is that any two superimposed states form an admissible third state. This is rather too sweeping, as it is true only for degenerate states. Otherwise quantum mechanics would allow a continuum of energies between states by a simple admixture of levels. The proof of this statement is trivial. For a Hamiltonian H and two orthogonal wavefunctions, ψ1 and ψ2 with energies E1 and E2 then (ψ1 + ψ2) is not an eigenfunction of that Hamiltonian as H(ψ1 + ψ2) = E1ψ1 + E2ψ2 ≠ E(ψ1 + ψ2) for any value of E, unless E1 = E2. Secondly Pospiech states that quantum objects show wave- or particle-like behaviour, depending on the measuring apparatus, and that occasionally experiments (such as Taylor's) reveal both. I would contest the validity of this type of thinking. All experiments on quantum objects reveal both types of behaviour—even ones which simply show straight line motion of photons. What is important, in addition, is our interpretation of the results. It takes an understanding of QED, for example, to see that an experiment which otherwise shows particle behaviour is, in fact, showing quantum behaviour. More contentiously though I would suggest that detection apparatus is incapable of detecting anything other than particles. Wave-like behaviour is revealed only by an analysis of the paths the particle could have taken. In other words, the interference of continuous fields sometimes predicts the same results when the detection is averaged over many events

  16. Self-Propagating Worms in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Thanassis; Dimitriou, Tassos; Prasad, Neeli R.

    2009-01-01

    Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a buffer overflow vulnerability to smash the c...

  17. Propagation Analysis for Wireless Sensor Networks Applied to Viticulture

    OpenAIRE

    Correia, Felipe Pinheiro; Alencar, Marcelo Sampaio de; Lopes, Waslon Terllizzie Araújo; Assis, Mauro Soares de; Leal, Brauliro Gonçalves

    2017-01-01

    Wireless sensor networks have been proposed as a solution to obtain soil and environment information in large distributed areas. The main economic activity of the São Francisco Valley region in the Northeast of Brazil is the irrigated fruit production. The region is one of the major agricultural regions of the country. Grape plantations receive large investments and provide good financial return. However, the region still lacks electronic sensing systems to extract adequate information from p...

  18. Model Development For Wireless Propagation In Forested Environments

    Science.gov (United States)

    2015-09-01

    vegetation elements can be compared to the reduction of the propagated radio signals in buildings and urban areas. The diversity of operational...contexts for radio wave propagation through foliage is infinite, ranging from tall, dense canopy forests to open, low, sparse canopy woodlands [3], as...nearly flat and mainly consists of dry soil and sand that is covered by grass in some parts. The experimental site is mixed vegetation woodland with an

  19. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  20. Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks

    Science.gov (United States)

    Song, Yurong; Jiang, Guo-Ping

    Based on the inherent characteristics of wireless sensor networks (WSN), the dynamic behavior of malware propagation in flat WSN is analyzed and investigated. A new model is proposed using 2-D cellular automata (CA), which extends the traditional definition of CA and establishes whole transition rules for malware propagation in WSN. Meanwhile, the validations of the model are proved through theoretical analysis and simulations. The theoretical analysis yields closed-form expressions which show good agreement with the simulation results of the proposed model. It is shown that the malware propaga-tion in WSN unfolds neighborhood saturation, which dominates the effects of increasing infectivity and limits the spread of the malware. MAC mechanism of wireless sensor networks greatly slows down the speed of malware propagation and reduces the risk of large-scale malware prevalence in these networks. The proposed model can describe accurately the dynamic behavior of malware propagation over WSN, which can be applied in developing robust and efficient defense system on WSN.

  1. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Liping Feng

    2015-01-01

    Full Text Available An improved SIRS model considering communication radius and distributed density of nodes is proposed. The proposed model captures both the spatial and temporal dynamics of worms spread process. Using differential dynamical theories, we investigate dynamics of worm propagation to time in wireless sensor networks (WSNs. Reproductive number which determines global dynamics of worm propagation in WSNs is obtained. Equilibriums and their stabilities are also found. If reproductive number is less than one, the infected fraction of the sensor nodes disappears and if the reproduction number is greater than one, the infected fraction asymptotically stabilizes at the endemic equilibrium. Based on the reproduction number, we discuss the threshold of worm propagation about communication radius and distributed density of nodes in WSNs. Finally, numerical simulations verify the correctness of theoretical analysis.

  2. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  3. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.

    Science.gov (United States)

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-13

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

  4. Propagation Measurements and Comparison with EM Techniques for In-Cabin Wireless Networks

    Directory of Open Access Journals (Sweden)

    Nektarios Moraitis

    2009-01-01

    Full Text Available This paper presents results of a narrowband measurement campaign conducted inside a Boeing 737–400 aircraft, the objective being the development of a propagation prediction model which can be used in the deployment of in-cabin wireless networks. The measurements were conducted at three different frequency bands: 1.8, 2.1, and 2.45 GHz, representative of several wireless services. Both a simple, empirical, inverse distance power law and a deterministic, site-specific model were investigated. Parameters for the empirical model were extracted from the measurements at different locations inside the cabin: aisle and seats. Additionally, a statistical characterization of the multipath scenario created by the transmitted signal and the various cabin elements is presented. The deterministic model, based on Physical Optics (PO techniques, provides a reasonable match with the empirical results. Finally, measurements and modeling results are provided for the penetration loss into the cabin (or out of the cabin, representative of interference scenarios.

  5. Overview of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models

    Science.gov (United States)

    Rappaport, Theodore S.; Xing, Yunchou; MacCartney, George R.; Molisch, Andreas F.; Mellios, Evangelos; Zhang, Jianhua

    2017-12-01

    This paper provides an overview of the features of fifth generation (5G) wireless communication systems now being developed for use in the millimeter wave (mmWave) frequency bands. Early results and key concepts of 5G networks are presented, and the channel modeling efforts of many international groups for both licensed and unlicensed applications are described here. Propagation parameters and channel models for understanding mmWave propagation, such as line-of-sight (LOS) probabilities, large-scale path loss, and building penetration loss, as modeled by various standardization bodies, are compared over the 0.5-100 GHz range.

  6. Analysis of radio wave propagation for ISM 2.4 GHz Wireless Sensor Networks in inhomogeneous vegetation environments.

    Science.gov (United States)

    Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2014-12-10

    The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  7. Analysis of Radio Wave Propagation for ISM 2.4 GHz Wireless Sensor Networks in Inhomogeneous Vegetation Environments

    Directory of Open Access Journals (Sweden)

    Leire Azpilicueta

    2014-12-01

    Full Text Available The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  8. Preface for the book: Antennas And Propagation for Body-Centric Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2006-01-01

    The book address the following subjects: Body Centric Wireless Communications possibilities, Electromagnetic properties of the body, On-body Communication Channels at high and low frequency bands, Body Centric UWB Communications, Wearable Antennas for cellular and WLAN communications, Body...

  9. Study of RF Propagation Characteristics for Wireless Sensor Networks in Railroad Environments

    Science.gov (United States)

    2010-01-01

    The freight railroad industry in North America is exerting efforts to leverage Wireless Sensor Networks to monitor systems and components on railcars. This allows fault detection and accident prevention even while a train is moving. Railcars, constru...

  10. Numerical study of propagation effects in a wireless mesh test bed

    CSIR Research Space (South Africa)

    Lysko, AA

    2008-07-01

    Full Text Available The present layout of the indoor wireless mesh network test-bed build at the Meraka Institute is introduced. This is followed by a description of a numerical electromagnetic model for the complete test-bed, including the coupling and diffraction...

  11. An Empirical Study of Propagation Models for Wireless Communications in Open-pit Mines

    DEFF Research Database (Denmark)

    Portela Lopes de Almeida, Erika; Caldwell, George; Rodriguez Larrad, Ignacio

    2018-01-01

    —In this paper, we investigate the suitability of the propagation models ITU-R 526, Okumura Hata, COST Hata models and Standard Propagation Model (SPM) to predict the path loss in open-pit mines. The models are evaluated by comparing the predicted data with measurements obtained in two operational...

  12. An Integrated Signaling-Encryption Mechanism to Reduce Error Propagation in Wireless Communications: Performance Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Olama, Mohammed M [ORNL; Matalgah, Mustafa M [ORNL; Bobrek, Miljko [ORNL

    2015-01-01

    Traditional encryption techniques require packet overhead, produce processing time delay, and suffer from severe quality of service deterioration due to fades and interference in wireless channels. These issues reduce the effective transmission data rate (throughput) considerably in wireless communications, where data rate with limited bandwidth is the main constraint. In this paper, performance evaluation analyses are conducted for an integrated signaling-encryption mechanism that is secure and enables improved throughput and probability of bit-error in wireless channels. This mechanism eliminates the drawbacks stated herein by encrypting only a small portion of an entire transmitted frame, while the rest is not subject to traditional encryption but goes through a signaling process (designed transformation) with the plaintext of the portion selected for encryption. We also propose to incorporate error correction coding solely on the small encrypted portion of the data to drastically improve the overall bit-error rate performance while not noticeably increasing the required bit-rate. We focus on validating the signaling-encryption mechanism utilizing Hamming and convolutional error correction coding by conducting an end-to-end system-level simulation-based study. The average probability of bit-error and throughput of the encryption mechanism are evaluated over standard Gaussian and Rayleigh fading-type channels and compared to the ones of the conventional advanced encryption standard (AES).

  13. Determination of outdoor signal propagation via visibility analysis in outdoor wireless networks

    Directory of Open Access Journals (Sweden)

    Mustafa Coşar

    2017-02-01

    Full Text Available Wireless networks on university campuses has gained importance in recent years. These networks in major areas such as university campuses, are faced with many problems during the planning, design and establishment. These problems are among the first that comes to mind, the physical properties of the campus and is selected according to the characteristics of network equipment. There is no doubt at all points of a wireless network set up in order to provide uninterrupted service and quality of the signal is expected to be good. However, it should be understood literally cannot meet these expectations. Therefore, to solve many problems to campus planning and design can be made to have acceptable signal distribution will have the appropriate use of and satisfaction with increasing effect. In this study, due to the start of construction on the North Campus of Hitit University, wireless signal spread using the current spread has been determined with the help of geographic information systems visibility analysis. An area of 56 hectares, with the total of 9 AP the acceptable signal distribution was obtained.

  14. Experimental Investigation of Subject-Specific On-Body Radio Propagation Channels for Body-Centric Wireless Communications

    Directory of Open Access Journals (Sweden)

    Mohammad Monirujjaman Khan

    2014-01-01

    Full Text Available In this paper, subject-specific narrowband (2.45 GHz and ultra-wideband (3–10.6 GHz on-body radio propagation studies in wireless body area networks (WBANs were performed by characterizing the path loss for eight different human subjects of different shapes and sizes. The body shapes and sizes of the test subjects used in this study are characterised as thin, medium build, fatty, shorter, average height and taller. Experimental investigation was made in an indoor environment using a pair of printed monopoles (for the narrowband case and a pair of tapered slot antennas (for the ultra-wideband (UWB case. Results demonstrated that, due to the different sizes, heights and shapes of the test subjects, the path loss exponent value varies up to maximum of 0.85 for the narrowband on-body case, whereas a maximum variation of the path loss exponent value of 1.15 is noticed for the UWB case. In addition, the subject-specific behaviour of the on-body radio propagation channels was compared between narrowband and UWB systems, and it was deduced that the on-body radio channels are subject-specific for both narrowband and UWB system cases, when the same antennas (same characteristics are used. The effect of the human body shape and size variations on the eight different on-body radio channels is also studied for both the narrowband and UWB cases.

  15. Radio frequency propagation model and fading of wireless signal at 2.4 GHz in an underground coal mine

    OpenAIRE

    Patri, A.; Nimaje, D. S.

    2015-01-01

    Wireless sensor networks and wireless communication systems have become indispensable in underground mines. Wireless sensor networks are being used for better real-time data acquisition from ground monitoring devices, gas sensors, and mining equipment, whereas wireless communication systems are needed for locating and communicating with workers. Conventional methods like wireline communication have proved to be ineffective in the event of mine hazards such as roof falls, fires etc. Before imp...

  16. Radio Frequency Propagation Model and Fading of Wireless Signal at 2.4 GHz in Underground Coal Mine

    OpenAIRE

    Patri, Ashutosh; Nimaje, Devidas S.

    2015-01-01

    Deployment of wireless sensor networks and wireless communication systems have become indispensable for better real-time data acquisition from ground monitoring devices, gas sensors, and equipment used in underground mines as well as in locating the miners, since conventional methods like use of wireline communication are rendered ineffective in the event of mine hazards such as roof-falls, fire hazard etc. Before implementation of any wireless system, the variable path loss indices for diffe...

  17. Remote Monitoring of the Heart Condition of Athletes by Measuring the Cardiac Action Potential Propagation Time Using a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Amang Sudarsono

    2016-04-01

    Full Text Available Highly performing athletes are susceptible to cardiac damage of several kinds which may be irreversible. The monitoring of heart rate and ECG waveforms from such subjects by wireless sensor networks has been reported in health and sports care documents. However, a more decisive parameter for instant to instant changes would be the time of Cardiac Action Potential Propagation. This time, which can be between 15-20 ms would shoot suddenly in acute stress in highly performing athletes for short durations. Repeated incidents of such rising values will tend to cause irreversible damage to the heart. We developed the technique of measuring this time and reporting it through a wireless sensor network to monitoring station.

  18. Investigation of Prediction Accuracy, Sensitivity, and Parameter Stability of Large-Scale Propagation Path Loss Models for 5G Wireless Communications

    DEFF Research Database (Denmark)

    Sun, Shu; Rappaport, Theodore S.; Thomas, Timothy

    2016-01-01

    This paper compares three candidate large-scale propagation path loss models for use over the entire microwave and millimeter-wave (mmWave) radio spectrum: the alpha–beta–gamma (ABG) model, the close-in (CI) free-space reference distance model, and the CI model with a frequency-weighted path loss...... exponent (CIF). Each of these models has been recently studied for use in standards bodies such as 3rd Generation Partnership Project (3GPP) and for use in the design of fifth generation wireless systems in urban macrocell, urban microcell, and indoor office and shopping mall scenarios. Here, we compare...

  19. Method of synchronizing with an uplink channel and a method of determining a propagation delay in a wireless communications system

    NARCIS (Netherlands)

    Bosch, H.G.P.; Farag, E.N.; Mullender, Sape J.; Nathues, A.; Samuel, L.G.

    2007-01-01

    provided. In the example method of synchronizing, a propagation delay between a target base station and a mobile station is calculated. Then, the calculated propagation delay is sent to the target base station. In the example method of determining a propagation delay, a first signal is received

  20. Electronic Discharge Letter Mobile App

    NARCIS (Netherlands)

    Lezcano, Leonardo; Triana, Michel; Ternier, Stefaan; Hartkopf, Kathleen; Stieger, Lina; Schroeder, Hanna; Sopka, Sasa; Drachsler, Hendrik; Maher, Bridget; Henn, Patrick; Orrego, Carola; Specht, Marcus

    2014-01-01

    The electronic discharge letter mobile app takes advantage of Near Field Communication (NFC) within the PATIENT project and a related post-doc study. NFC enabled phones to read passive RFID tags, but can also use this short-range wireless technology to exchange (small) messages. NFC in that sense

  1. Letter: Meyerhofer

    International Nuclear Information System (INIS)

    Mackinnon, A.J.

    2011-01-01

    This letter confirms that the Laboratory for Laser Energetics (LLE) was an important part of the FY10 NIF Polar Drive Exploding Pusher experiments on the National Ignition Facility (NIF). These experiments were designed by LLE to produce requested neutron yields to calibrate and qualify nuclear diagnostics. LLE built a deuterium-tritium filling system for the glass shells and provided them to LLNL for mounting. In FY10, four exploding pusher implosions were performed with measured neutron yields within a factor of two of requested and ion temperatures within 20% of requested. These implosions are proving to be an ideal platform for commissioning the nuclear diagnostic suite on the NIF and are achieving all of the objectives planned for this campaign.

  2. Wireless optical telecommunications

    CERN Document Server

    Bouchet, Olivier

    2013-01-01

    Wireless optical communication refers to communication based on the unguided propagation of optical waves. The past 30 years have seen significant improvements in this technique - a wireless communication solution for the current millennium - that offers an alternative to radio systems; a technique that could gain attractiveness due to recent concerns regarding the potential effects of radiofrequency waves on human health.The aim of this book is to look at the free space optics that are already used for the exchange of current information; its many benefits, such as incorporating chan

  3. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  4. Letter to the parliament:

    DEFF Research Database (Denmark)

    2017-01-01

    This piece was a letter directed towards various ministers in the parliament, targeted at raising a discussion on the values in the education of architects in Denmark and various related topics.......This piece was a letter directed towards various ministers in the parliament, targeted at raising a discussion on the values in the education of architects in Denmark and various related topics....

  5. Wireless sensors remotely powered by RF energy

    NARCIS (Netherlands)

    Visser, Hubregt J.; Vullers, Ruud J.M.

    2012-01-01

    Wireless, radiated far-field energy is being employed for charging a battery. This battery, while being recharged, is used to power a commercially of the shelf, low power, wireless sensor node. Propagation conditions in common office and house configurations are investigated experimentally. These

  6. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  7. Letter to Carl Niigeli

    Indian Academy of Sciences (India)

    We reproduce an english translation of one of these letters below, in which ... contemporary scientific knowledge, and that under the circumstances ... generation it became necessary to limit the numbers because of lack of space, so that, in.

  8. Letter of Map Revision

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — The National Flood Hazard Layer (NFHL) data incorporates all Digital Flood Insurance Rate Map(DFIRM) databases published by FEMA, and any Letters Of Map Revision...

  9. Launch of Zoological Letters.

    Science.gov (United States)

    Fukatsu, Takema; Kuratani, Shigeru

    2016-02-01

    A new open-access journal, Zoological Letters, was launched as a sister journal to Zoological Science, in January 2015. The new journal aims at publishing topical papers of high quality from a wide range of basic zoological research fields. This review highlights the notable reviews and research articles that have been published in the first year of Zoological Letters, providing an overview on the current achievements and future directions of the journal.

  10. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  11. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  12. Letter Names, Letter Sounds and Phonological Awareness: An Examination of Kindergarten Children across Letters and of Letters across Children

    Science.gov (United States)

    Evans, Mary Ann; Bell, Michelle; Shaw, Deborah; Moretti, Shelley; Page, Jodi

    2006-01-01

    In this study 149 kindergarten children were assessed for knowledge of letter names and letter sounds, phonological awareness, and cognitive abilities. Through this it examined child and letter characteristics influencing the acquisition of alphabetic knowledge in a naturalistic context, the relationship between letter-sound knowledge and…

  13. A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network

    Science.gov (United States)

    Mahmoudi, Fariborz; Mirzashaeri, Mohsen; Shahamatnia, Ehsan; Faridnia, Saed

    This paper introduces a novel design for handwritten letter recognition by employing a hybrid back-propagation neural network with an enhanced evolutionary algorithm. Feeding the neural network consists of a new approach which is invariant to translation, rotation, and scaling of input letters. Evolutionary algorithm is used for the global search of the search space and the back-propagation algorithm is used for the local search. The results have been computed by implementing this approach for recognizing 26 English capital letters in the handwritings of different people. The computational results show that the neural network reaches very satisfying results with relatively scarce input data and a promising performance improvement in convergence of the hybrid evolutionary back-propagation algorithms is exhibited.

  14. Wireless transmission of power

    International Nuclear Information System (INIS)

    Grotz, T.

    1991-01-01

    This paper reports that it has been proven by researchers that electrical energy can be propagated around the world between the surface of the Earth and the ionosphere at extremely low frequencies in what is known as the Schumann Cavity. Experiments to data have shown that electromagnetic waves with frequencies in the range of 8 Hz, the fundamental Schumann Resonance frequency, propagate with litter attenuation around the planet within the Schumann Cavity. It is the intent of this research to determine if the Schumann Cavity can be resonated, if the power that is delivered to the cavity propagated with very low losses, and if power can be extracted at other locations within the cavity. Experimental data collected and calculations made in recent years support the hypothesis that wireless power transmission is a viable and practical alternative to the present systems of power transmission

  15. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  16. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  17. Letters to the Editor

    Science.gov (United States)

    1999-09-01

    All the Letters to the Editor in this issue are in the same PostScript or PDF file. Contents The imaginary Sun? Harold Aspden Energy Science Ltd, PO Box 35, Southampton SO16 7RB, UK Difficult physics? Tim Akrill Chief Examiner, A-level Physics, Edexcel Foundation Was it a dream? Bill Jarvis 6 Peggy's Mill Road, Edinburgh EH4 6JY

  18. Letters From Peplau.

    Science.gov (United States)

    Peden, Ann R

    2018-03-01

    Dr. Hildegard Peplau, considered to be our first modern Nurse theorist and the Mother of Psychiatric Nursing, was a prolific writer, engaging in correspondence with colleagues and students who sought her professional and theoretical expertise. Through these letters, she influenced psychiatric nursing while maintaining a broad international network of professional colleagues. An analysis of letters, written between 1990 and 1998, provides insights into Peplau's last decade of professional life and a model of how to support the next generation of nurse scholars. Using content analysis, 24 letters received between 1990 and 1998 were read, reread, and coded. Recurring themes were identified. Three themes were identified. These include Peplau, the Person: Living a Life of Professional Balance; Lighting a Spark: Investing in the Next Generation; and Work in the Vineyards of Nursing: Maintaining a Life of Scholarship. The letters depict Peplau's keen intellect, her wide professional network, her leisure time spent with family and friends, and her own work to assure that her theoretical legacy continued. Peplau's insights continue to be relevant as psychiatric mental health nursing leaders engage in activities to support the next generation of scholars and leaders.

  19. Letters in this Issue

    Science.gov (United States)

    1998-01-01

    Reforming the General Chemistry Textbook individual letters by Edward T. Samulski; Stephen J. Hawkes; Stephen J. Fisher; J. Stephen Hartman; A. R. H. Cole; Stanley Pine, Ronald Archer, and Herbert Kaesz; Jimmy Reeves; Robert Hill; and Brock Spencer, C. Bradley Moore and Nedah Rose. Re: article by R. J. Gillespie The author replies

  20. Path Loss Analysis of WSN Wave Propagation in Vegetation

    International Nuclear Information System (INIS)

    Sabri, Naseer; Aljunid, S A; Ahmad, R B; Malek, M F; Salim, M S; Kamaruddin, R

    2013-01-01

    Deployment of a successful wireless sensor network requires precise prediction models that provide a reliable communication links of wireless nodes. Prediction models fused with foliage models provide sensible parameters of wireless nodes separation distance, antenna height, and power transmission which affect the reliability and communication coverage of a network. This paper review the line of sight and the two ray propagation models combined with the most known foliage models that cover the propagation of wireless communications in vegetative environments, using IEEE 802.15.4 standard. Simulation of models is presented and the impacts of the communication parameters, environment and vegetation have been reported.

  1. Letters of Map Change (LOMC)

    Data.gov (United States)

    Department of Homeland Security — Documents, including different types of Letters of MAP Revision (LOMR) and Letters of Map Amendment (LOMA), which are issued by FEMA to revise or amend the flood...

  2. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2004-01-01

    The present collection of letters from JINR, Dubna, contains nine separate letters on data on elastic (p,n) charge exchange: compilation, the potentialities of δ-electron control of luminosity in experiments with internal targets at the Nuclotron, pion broadening and low-mass dilepton production, fluctuation of electromagnetic cascade axis in dense amorphous segmented media, the forward detector of the ANKE spectrometer. Tracking system and its use in data analysis, quantum field theory with three-dimensional vector time, curvature decomposition and the Einstein-Yang-Mills equations, an integral equation for the spinor amplitude of a massive neutral Dirac particle in a curved space time with arbitrary geometry and surprising resonances in 147 Sm(nα) 144 Nd reaction

  3. Particles and Nuclei, Letters

    International Nuclear Information System (INIS)

    2004-01-01

    The present collection of letters from JINR, Dubna, contains eight separate letters on analysis of experimental data on relativistic nuclear collisions in the Lobachevski space, relativistic contribution of the final-state interaction to deuteron photodisintegration, on the charge asymmetry of the like-sign lepton pairs induced by B - B bar - production asymmetry, limits on the ν e → ν e neutrino oscillation parameters from an experiment at the IHEP-JINR neutrino detector, excitation of high spin isomers in photonuclear reactions, study of product formation in proton-nuclear reactions on the 129 I target induced by 660-MeV protons, application of jet pumps in the cryogenic system of the Nuclotron - superconducting accelerator of relativistic particles and study of the silicon drift detector performance with inclined tracks

  4. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2004-01-01

    The present collection of letters from JINR, Dubna, contains nine separate letters on nonlocal chiral quark model with confinement, perturbation of finite-lattice spectral levels by nearby nuclear resonances, on the application of 'Z 0 + jet' events for determining the gluon distribution in a proton at the LHC, account of light velocity constancy in the Galilean problem on the free movement of a particle and its fall onto the ground, first results of crystal deflector investigations at the Nuclotron external beams, decay parameters of K mesons, measured at proton synchrotron U-70 using 'Hyperon' set-up and modern world data, prototype of atomic-emission spectrometer on the basis of one-electrode impulse RF discharge for analytical measurements, polarimeter for Nuclotron internal beam and primordial bubbles of colour superconducting quark matter

  5. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2004-01-01

    The present collection of letters from JINR, Dubna, contains thirteen separate letters on start-to-end simulations of SASE FEL at the TESLA test facility, possible ways of improvement of the FEM oscillator with a Bragg resonator, the status and perspectives of the electron cooling method development, crystalline ion beams in storage rings, latest results of modeling of LHC beam injection, charge exchange injection in a synchrotron equipped with an electron cooling system, fringe and hysteresis effects in electron guns, nonstationary regimes of electron flow formation in secondary emission inverse coaxial diodes, a proposal of the experiment testing of the fine structure of the Vavilov-Cherenkov radiation, computer simulation of the electron beam dynamics at the accelerator structure and the injector of S-band linac with energies of 3 and 10 MeV, calculation of the electron beam dynamics of the accelerator LUE-200, the accelerator-accumulation facility ITEP-TWAC and accelerators-drivers of electronuclear facilities

  6. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  7. The Danish letters

    DEFF Research Database (Denmark)

    Beier, Sofie; Ejlers, Steen

    2011-01-01

    The talk will focus on Danish type designers and their work on Æ (AE), Ø (Oslash) and Å (Aring). These 'anomalies' found in the Danish written language, often causes difficulties for type designers. The counters of Ø/ø sometimes appear overcrowded, the uppercase Æ can result in an uncomfortably o......' attempt to create the optimal variation of these letters, we will give a brief introduction to the Danish typography tradition ranging from the early 20th Century and up until today....

  8. Letters on nuclear controversy

    International Nuclear Information System (INIS)

    Kafka, P.; Maier-Leibnitz, H.

    1982-01-01

    Heinz Maier-Leibnitz a well-known scientist, nuclear physicist, for 50 years, who publicily supported the idea not to overrate the dangers of peaceful utilization of nuclear energy, has grown tired of talking only to colleagues. He invites a junior fellow physicist, who held engaged speeches against the nuclear power plant Zwentendorf, to an exchange of thoughts. Peter Kafka, an astro-physicist studied the self organisation of the universe from the big bang to the economic crisis and encountered the question of which conditions have to be fulfilled to prevent progress from becoming caranogenous. He became one of the spokesmen of 'political ecology' and called for resistance again large-scale technological use of scientific knowledge. He was enthusiastic about the idea of an exchange of letters, because he - just like his partner - believes in gaining knowledge by discussion. The variety of subjects is sketched briefly in form of three lectures. In the letters both scientists discuss intensly about: - Freedom of science and responsibility of science. - Decisions on energy questions under time-pressure. - Risks of nuclear plants. - Large scale technology and large-scale research or decentralization. - Energy utilization and energy waste. - Nuclear energy and alternatives. - Sense and nonsense of detailed future planning. In the end no one has convinced the other. The reader however finds a lot of new incentives in the letters - printed in unabridged form - a lot of new and significant arguments for a discussion which has only just started. (orig.) [de

  9. Auction design for the wireless spectrum market

    CERN Document Server

    Lin, Peng; Zhang, Qian

    2014-01-01

    This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems.Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of c

  10. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2002-01-01

    The present collection of letters from JINR, Dubna, contains eight separate records on the role of the complanar emission of particles in nuclear interaction for E 0 >10 16 eV detected in the stratosphere, 10 B nucleus fragment yields, nuclear teleportation (proposal for an experiment), invisible 'glue' bosons in model field theory, calculation of the ionization differential effective cross sections in fast ion-atom collisions, interactions of ultracold neutrons near surface of solids, g factors as a probe for high-spin structure of neutron-rich Dy isotopes, search for periodicities in experimental data by the autoregressive model methods

  11. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2001-01-01

    The present collection of letters from JINR, Dubna, contains eight separate records on the interaction of high energy Λ 6 He hypernuclear beams with atomic nuclei, the position-sensitive detector of a high spatial resolution on the basis of a multiwire gas electron multiplier, pseudorapidity hadron density at the LHC energy, high precision laser control of the ATLAS tile-calorimeter module mass production at JINR, a new approach to ECG's features recognition involving neural network, subcriticity of a uranium target enriched in 235 U, beam space charge effects in high-current cyclotron injector CI-5, a homogeneous static gravitational field and the principle of equivalence

  12. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2002-01-01

    The present collection of letters from JINR, Dubna, contains seven separate records on kinematic separation and mass analysis of heavy recoiling nuclei, dynamical effects prior to heavy ion fusion, VACTIV-DELPHI graphical dialog based program for the analysis of gamma-ray spectra, irradiation of nuclear emulsions in relativistic beams of 6 He and 3 H nuclei, optical and structural investigations of PLZT x/65/35 (x = 4, 8 %) ferroelectric ceramics irradiated by a high-current pulsed electron beam, the oscillating charge and first evidence for neutrinoless double beta decay

  13. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2001-01-01

    The present collection of letters from JINR, Dubna, contains seven separate records on physics from extra dimensions, new physics in the new millennium with GENIUS: double beta decay, dark matter, solar neutrinos, the (μ - , e + ) conversion in nuclei mediated by light Majorana neutrinos, exotic muon-to-positron conversion in nuclei: partial transition sum evaluation by using shell model, solar neutrino problem accounting for self consistent magnetohydrodynamics solution for solar magnetic fields, first neutrino observations from the Sudbury neutrino observatory and status report on BOREXINO and results of the muon-background measurements at CERN

  14. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2000-01-01

    The present collection of letters from JINR, Dubna, contains eight separate records on quantum field theory and symmetries in nuclear physics, multifractal analysis of AFM images of Nb thin film surfaces, the fast-acting memory for multichannel converters of time to digital, an analysis of the anomalous Cherenkov radiation obtained in the relativistic lead ion beam at CERN SPS, the problem of consistency of the thermal-spike model with experimentally determined electron temperature, ATLAS calorimeter performance for charged pion as well as on collective flow in multifragmentation induced by relativistic helium and carbon ions variation of the coulomb repulsion in multifragmentation

  15. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2000-01-01

    The present collection of letters from JINR, Dubna, contains six separate records on the DELPHI experiment at LEP, the Fermi-surface dynamics of rotating nuclei, production of large samples of the silica dioxide aerogel in the 37-litre autoclave and test of its optical properties, preliminary radiation resource results on scintillating fibers, a new algorithm for the direct transformation method of time to digital with the high time resolution and development and design of analogue read-out electronics for HADES drift chamber system

  16. Letters of intent

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    Thursday 5 November was another major milestone en route to the establishment of the experimental programme for CERN's LHC protonproton collider to be built in the 27- kilometre LEP tunnel. After initial discussions of 'Expressions of Interest' at the specially arranged meeting at Evian-les-Bains, France, earlier this year (May, page 1), three Letters of Intent have emerged, together involving nearly 2000 physicists from research institutes all over the world. As well as these researchers listed on the documents, the plans in fact involve many additional technical specialists who work behind the scenes. It was a historic moment as these three detector proposals were aired at the first open meeting of the new LHC Experiments Committee. CERN's main auditorium and a large overflow room receiving relayed video pictures were both packed. From these three schemes - ATLAS, CMS and L3P - and the first reactions to their letters of intent, eventually two projects will emerge, for which full technical proposals will be prepared, including construction plans and credible costings

  17. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  18. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  19. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2000-01-01

    The present collection of letters from JINR, Dubna, contains nine separate records on the new results on simulation of the nuclotron beam extraction with a bent crystal, the Ehrenfest force in inhomogeneous magnetic field, the e/h ratio of the electromagnetic calorimeter, a new approach to develop hadronic event generators in HEP, an algebraic description of multilayer systems with resonances, a high-voltage module for photomultipliers, an estimation of the spin-flip contribution to the np→pn process from the charge exchange reaction on the deuteron, a measurement of the tensor analyzing powers in the dd→ 3 Hp reactions at RIKEN as well as on calibration of SPES4-π set-up in experiments on SATURNE-II

  20. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2001-01-01

    The present collection of letters from JINR, Dubna, contains ten separate records on the monochromatic neutrinos from massive fourth generation neutrino annihilation in the Sun and Earth, solar neutrino results from SAGE, the present and future oscillation experiments at reactors, as well as on the possibilities to test the LSND parameters at reactors, the energy spectrum of reactor antineutrinos and searches for new physics (recent developments), angular distribution of radiative gamma quanta in radiative beta decay of neutrons, an 37 Ar based neutrino source for calibration of the iodine solar neutrino detector, detector LENS as a new tool for solar neutrino spectroscopy, limits on different Majoron decay modes of 100 Mo, 116 Cd, 82 Se, and 96 Zr for neutrinoless double beta decays in the NEMO-2 experiment as well as on the search for 76 Ge and 150 Nd double beta decay to excited states

  1. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2002-01-01

    The present collection of letters from JINR, Dubna, contains ten separate records on Wien filter using in exploring on low-energy radioactive nuclei, memory effects in dissipative nucleus-nucleus collision, topological charge and topological susceptibility in connection with translation and gauge invariance, solutions of the multitime Dirac equation, the maximum entropy technique. System's statistical description, the charged conductor inside dielectric. Solution of boundary condition by means of auxiliary charges and the method of linear algebraic equations, optical constants of the TGS single crystal irradiated by power pulsed electron beam, interatomic pair potential and n-e amplitude from slow neutron scattering by noble gases, the two-coordinate multiwire proportional chamber of the high spatial resolution and neutron drip line in the region of O-Mg isotopes

  2. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2000-01-01

    The present collection of letters from JINR, Dubna, contains seven separate records on the integral representation for structure functions and target mass effects, multiscale properties of DNA primary structure including cross-scale correlations, dissipative evolution of the elementary act, the fine structure of the M T =1 Gamow-Teller resonance in 147g Tb→ 147 Gd β + /EC decay, the behaviour of the TVO temperature sensors in the magnetic fields, a fast method for searching for tracks in multilayer drift chambers of HADES spectrometer, a novel approach to particle track etching including surfactant enhanced control of pore morphology, azimuthal correlations of secondary particles in 32 S induced interactions with Ag(Br) nuclei at 4.5 GeV/ c/ nucleon

  3. Particles and nuclei, letters

    International Nuclear Information System (INIS)

    2001-01-01

    The present collection of letters from JINR, Dubna, contains eight separate records on status of 116 Cd double β decay study with 116 CdWO 4 scintillators, new limits on 2β processes in 40 Ca and 46 Ca by using low radioactive CaF 2 (Eu) crystal scintillators, the single state dominance in 2νββ-decay transitions to excited 0 + and 2 + final states, present status of the MONOLITH project, technique of neutrino-induced muon detection on the Earth surface, high-sensitive spectrometer of fast neutrons and the results of fast neutron background flux measurements at the gallium-germanium solar neutrino experiment (SAGE), new experimental limits on the electron stability and excitation of nuclear levels in 23 Na, 127 I and 129 Xe induced by the electron decay on the atomic shell and element-loaded organic scintillators for neutron and neutrino physics

  4. MANGO PROPAGATION

    OpenAIRE

    ALBERTO CARLOS DE QUEIROZ PINTO; VICTOR GALÁN SAÚCO; SISIR KUMAR MITRA; FRANCISCO RICARDO FERREIRA

    2018-01-01

    ABSTRACT This Chapter has the objectives to search, through the review of the available literature, important informations on the evolution of mango propagation regarding theoretical and practical aspects from cellular base of sexual propagation, nursery structures and organizations, substrate compositions and uses, importance of rootstock and scion selections, also it will be described the preparation and transport of the grafts (stem and bud) as well as the main asexual propagation methods...

  5. Letter-Sound Knowledge: Exploring Gender Differences in Children When They Start School Regarding Knowledge of Large Letters, Small Letters, Sound Large Letters, and Sound Small Letters

    Directory of Open Access Journals (Sweden)

    Hermundur Sigmundsson

    2017-09-01

    Full Text Available This study explored whether there is a gender difference in letter-sound knowledge when children start at school. 485 children aged 5–6 years completed assessment of letter-sound knowledge, i.e., large letters; sound of large letters; small letters; sound of small letters. The findings indicate a significant difference between girls and boys in all four factors tested in this study in favor of the girls. There are still no clear explanations to the basis of a presumed gender difference in letter-sound knowledge. That the findings have origin in neuro-biological factors cannot be excluded, however, the fact that girls probably have been exposed to more language experience/stimulation compared to boys, lends support to explanations derived from environmental aspects.

  6. A STUDY ON LEGIBILITY OF LETTERING

    Directory of Open Access Journals (Sweden)

    Merve ERSAN,

    2016-04-01

    Full Text Available In the most general sense, lettering is the art of drawing letters, in which the letter forms carry illustrtive features. In this research which is titled "An Analysis on Legibility in Letterings Used in Print Advertisements", letterings used in and specially designed for print ads are analysed and their contribution to the ads are examined. Legibility, which is the fundamental function of writing and typography is examined in the field of lettering that has an illustrative approach. Also, the article puts emphasis on the technique and form’s contribution on content in letterings. Keywords: Lettering, print advertisements, letter design, illustration, legibility.

  7. Radio propagation measurement and channel modelling

    CERN Document Server

    Salous, Sana

    2013-01-01

    While there are numerous books describing modern wireless communication systems that contain overviews of radio propagation and radio channel modelling, there are none that contain detailed information on the design, implementation and calibration of radio channel measurement equipment, the planning of experiments and the in depth analysis of measured data. The book would begin with an explanation of the fundamentals of radio wave propagation and progress through a series of topics, including the measurement of radio channel characteristics, radio channel sounders, measurement strategies

  8. Frameless ALOHA Protocol for Wireless Networks

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesse...

  9. Wireless communication for hearing aid system

    DEFF Research Database (Denmark)

    Nour, Baqer

    This thesis focuses on the wireless coupling between hearing aids close to a human head. Hearing aids constitute devices withadvanced technology and the wireless communication enables the introduction of a range of completely new functionalities. Such devices are small and the available power...... the ear-to-ear wireless communication channel by understanding the mechanisms that control the propagations of the signals and the losses. The second objective isto investigate the properties of magneto-dielectric materials and their potential in antenna miniaturization. There are three approaches...... to study the ear-to-ear wireless communication link; a theoretical approach models the human head asa sphere that has the electrical properties of the head, a numerical approach implements a more realistic geometry of the head, and an experimental approach measures directly the coupling between...

  10. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  11. A Letter to Ahmad Khan

    Directory of Open Access Journals (Sweden)

    I.M. Mirgaleev

    2016-12-01

    Full Text Available We bring to attention of specialists an undated letter of Ottoman ruler Mehmed II Fatih to the Great Horde khan Ahmad from the collection of famous collector of Ottoman charters Feridun-bey [1, S. 289]. The addressee is the famous ruler of the Great Horde, khan Ahmad. Daulat Khan mentioned in the letter is Nur-Davlet. He was connected with khan Ahmad, and, as indicated by the letter, he had also set in close contact with the Ottomans whose ruler openly declares in a letter that “our sight of benevolence and patronage is directed toward him”. Thereby the Sultan made it clear to the “principal” Tatar khan Akhmad that Nur-Davlet was under the patronage of the Ottoman Empire. Considering the period of activity of Nur-Davlet in Crimea, presumably the letter was written in 1477. Famous researcher of the Crimean Khanate V.D. Smirnov had already examined the letter and the question of why Ahmad Khan was named the Crimean khan in the title of the letter [2, p. 221–222].

  12. Letters and Letter Writing in Early Modern Culture: An Introduction

    Directory of Open Access Journals (Sweden)

    Gabriella Del Lungo Camiciotti

    2014-04-01

    Full Text Available The recently renewed scholarly interest in historical letters and letter writing has given rise to several studies which explore the culture of epistolarity from different perspectives. The article offers an introduction to recent scholarship on epistolary discourse and practices in early modern culture. Given the importance of letters as data for several types of diachronic investigation, the article focuses on three points that are crucial for an understanding of the relevance of epistolary discourse itself in early modern European culture. Firstly, letters are invaluable data for historical linguistics, to which they provide information for the history of languages, and sociohistorical and sociolinguistic research. A second recent field of investigation considers letters as documents and material items; the results of research in this area have contributed to the reconstruction of official relationships and information exchanges in past cultures and shed light on social interaction. A third, more traditional area of study, deals with the letter as a form that has given rise to many different genres across the centuries, both practical and literary.

  13. MANGO PROPAGATION

    Directory of Open Access Journals (Sweden)

    ALBERTO CARLOS DE QUEIROZ PINTO

    2018-03-01

    Full Text Available ABSTRACT This Chapter has the objectives to search, through the review of the available literature, important informations on the evolution of mango propagation regarding theoretical and practical aspects from cellular base of sexual propagation, nursery structures and organizations, substrate compositions and uses, importance of rootstock and scion selections, also it will be described the preparation and transport of the grafts (stem and bud as well as the main asexual propagation methods their uses and practices. Finally, pattern and quality of graft mangos and their commercialization aspects will be discussed in this Chapter.

  14. The Complaint Letter and Response.

    Science.gov (United States)

    Shukla, P. K.

    1998-01-01

    Describes an assignment in which students write a letter of complaint, and discusses how this assignment aids students in seeing the importance of effective written communication to their daily lives. (SR)

  15. Letters to a Young Writer.

    Science.gov (United States)

    Waldman, Anne; Becker, Robin

    2002-01-01

    Presents words of encouragement to a young poet. Includes empathetic words and motivating ideas. Presents a letter including a quote from "Tintern Abbey" by William Wordsworth and ideas about that quote. (SG)

  16. Scientific Letter: Monosymptomatic Hypochondriacal Psychosis ...

    African Journals Online (AJOL)

    Scientific Letter: Monosymptomatic Hypochondriacal Psychosis (somatic delusional disorder): A report of two cases. ... African Journal of Psychiatry. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives.

  17. Letter from the Editor

    Directory of Open Access Journals (Sweden)

    Germán A. Prieto

    2018-01-01

    Full Text Available Letter from the editor Our first issue of 2018 is available now. We have 9 articles in this issue, in topics ranging from soil characterization, petrophysical properties of rocks, signal processing of images and GNSS station to asteroid impact effects. Mechanical soil properties in sandy-pebble soil are studied as a function of grain size content in Lu et al. Satellite-derived soil moisture estimation is discussed in Thanabalan and Vidhya, based on a semi-empirical approach and backscattering images. Macroscopic mechanical characteristics of rocks depend on a number of factors, including microstructure damage. Under changing temperature conditions (freeze-thaw rock samples studied by Jiang show significant strength decrease, which has important consequences in engineering. Advanced signal processing methods are used in Zeng et al. for image retrieval applied to remote sensing data, using a Bayesian network approach. Similarly, Oktar and Erdogan use linear trend and wavelet analysis to continuous GNSS data showing both displacements due to tectonic as well as atmospheric and hydrologic effects. Debris flows can in some cases become serious hazards because they can block river flow as a debris flow dam. Chen et al. propose a method to identify the formation of such dams, with an example from the Er river in Taiwan. Mamaseni et al. study the petrophysical properties of three formations in the Duhok Basin, northern Iran, based on well-log data. Results suggest a significant thickness with good moveable hydrocarbons in the study area. Methane adsorption and gas content are strongly influenced by shale composition. Zhu et al. show that Total Organic Content has a stronger influence on methane adsorption and gas content than the mineral composition, studying samples from the southern Sichuan Basin. Our last contribution in this issue discussed a large asteroid impact in eastern Colombia. The impact would have affected the environment and landscape, but

  18. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  19. The letter knowledge assessment tool.

    Science.gov (United States)

    Pedro, Cassandra; Lousada, Marisa; Pereira, Rita; Hall, Andreia; Jesus, Luis M T

    2017-10-10

    There is a need to develop letter knowledge assessment tools to characterise the letter knowledge in Portuguese pre-schoolers and to compare it with pre-schoolers from other countries, but there are no tools for this purpose in Portugal. The aim of this paper is to describe the development and validation procedures of the Prova de Avaliação de Competências de Pré-Literacia (PACPL), which assesses letter knowledge. This study includes data that has been gathered in two phases: pilot and main study. In the pilot study, an expert panel of six speech and language pathologists analysed the instrument. Children (n = 216) aged 5;0-7;11 participated in the main study that reports data related to the psychometric characteristics of the PACPL. Content validity, internal consistency, reliability and contributing factors to performance were examined statistically. A modified Bland-Altman method revealed good agreement amongst evaluators. The main study showed that the PACPL has a very good internal consistency and high inter-rater (96.2% of agreement and a Cohen's k value of 0.92) and intra-rater (95.6% of agreement and a Cohen's k value of 0.91) agreement. Construct validity of the PCAPL was also assured (Cronbach's α of 0.982). Significant differences were found between age groups with children increasing their letter knowledge with age. In addition, they were better at identifying than at producing both letter names and letter sounds. The PACPL is a valid and reliable instrument to assess letter knowledge in Portuguese children.

  20. Wireless energy transfer: Dielectric lens antennas for beam shaping in wireless power-transfer applications

    Science.gov (United States)

    Gonçalves, Ricardo; Carvalho, Nuno B.; Pinho, Pedro

    2017-02-01

    In the current contest of wireless systems, the last frontier remains the cut of the power cord. In that sense, the interest over wireless energy transfer technologies in the past years has grown exponentially. However, there are still many challenges to be overcome in order to enable wireless energy transfer full potential. One of the focus in the development of such systems is the design of very-high-gain, highly efficient, antennas that can compensate for the propagation loss of radio signals over the air. In this paper, we explore the design and manufacturing process of dielectric lenses, fabricated using a professional-grade desktop 3D printer. Lens antennas are used in order to increase beam efficiency and therefore maximize the efficiency of a wireless power-transfer system operating at microwave frequencies in the Ku band. Measurements of two fabricated prototypes showcase a large directivity, as predicted with simulations. xml:lang="fr"

  1. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  2. Field test of wireless sensor network in the nuclear environment

    International Nuclear Information System (INIS)

    Li, L.; Wang, Q.; Bari, A.; Deng, C.; Chen, D.; Jiang, J.; Alexander, Q.; Sur, B.

    2014-01-01

    Wireless sensor networks (WSNs) are appealing options for the health monitoring of nuclear power plants due to their low cost and flexibility. Before they can be used in highly regulated nuclear environments, their reliability in the nuclear environment and compatibility with existing devices have to be assessed. In situ electromagnetic interference tests, wireless signal propagation tests, and nuclear radiation hardness tests conducted on candidate WSN systems at AECL Chalk River Labs are presented. The results are favourable to WSN in nuclear applications. (author)

  3. Field test of wireless sensor network in the nuclear environment

    Energy Technology Data Exchange (ETDEWEB)

    Li, L., E-mail: lil@aecl.ca [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada); Wang, Q.; Bari, A. [Univ. of Western Ontario, London, Ontario (Canada); Deng, C.; Chen, D. [Univ. of Electronic Science and Technology of China, Chengdu, Sichuan (China); Jiang, J. [Univ. of Western Ontario, London, Ontario (Canada); Alexander, Q.; Sur, B. [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada)

    2014-06-15

    Wireless sensor networks (WSNs) are appealing options for the health monitoring of nuclear power plants due to their low cost and flexibility. Before they can be used in highly regulated nuclear environments, their reliability in the nuclear environment and compatibility with existing devices have to be assessed. In situ electromagnetic interference tests, wireless signal propagation tests, and nuclear radiation hardness tests conducted on candidate WSN systems at AECL Chalk River Labs are presented. The results are favourable to WSN in nuclear applications. (author)

  4. Experimental Evaluation of Wireless Communication Channels under Radiation Environment

    International Nuclear Information System (INIS)

    Wang, Quan; Bari, Ataul; Deng, Changjian; Li, Liquan

    2014-01-01

    Deployment of wireless systems in nuclear power plants has attracted a lot of attention recently. However, before wireless systems can be installed in a nuclear power plant, it is necessary to evaluate the effect of radiation environment on electromagnetic wave which is the communication media for all radio wave based wireless systems. This is particular important if the wireless systems are expected to work in a harsh and radioactive environment following a severe accident. This paper presents some results of an experiment for evaluating the effect of radiation on electromagnetic wave. The experiments involve placing transmitter antenna and receiver antenna in a hot cell with variable strength of radiation to study the attenuation effects of the radioactive media. The results indicate that radiation does not effect on the electromagnetic wave propagation. This fact should be considered during the design and deployment wireless systems in a potentially radioactive environment

  5. Enabling Wireless Avionics Intra-Communications

    Science.gov (United States)

    Torres, Omar; Nguyen, Truong; Mackenzie, Anne

    2016-01-01

    The Electromagnetics and Sensors Branch of NASA Langley Research Center (LaRC) is investigating the potential of an all-wireless aircraft as part of the ECON (Efficient Reconfigurable Cockpit Design and Fleet Operations using Software Intensive, Networked and Wireless Enabled Architecture) seedling proposal, which is funded by the Convergent Aeronautics Solutions (CAS) project, Transformative Aeronautics Concepts (TAC) program, and NASA Aeronautics Research Institute (NARI). The project consists of a brief effort carried out by a small team in the Electromagnetic Environment Effects (E3) laboratory with the intention of exposing some of the challenges faced by a wireless communication system inside the reflective cavity of an aircraft and to explore potential solutions that take advantage of that environment for constructive gain. The research effort was named EWAIC for "Enabling Wireless Aircraft Intra-communications." The E3 laboratory is a research facility that includes three electromagnetic reverberation chambers and equipment that allow testing and generation of test data for the investigation of wireless systems in reflective environments. Using these chambers, the EWAIC team developed a set of tests and setups that allow the intentional variation of intensity of a multipath field to reproduce the environment of the various bays and cabins of large transport aircraft. This setup, in essence, simulates an aircraft environment that allows the investigation and testing of wireless communication protocols that can effectively be used as a tool to mitigate some of the risks inherent to an aircraft wireless system for critical functions. In addition, the EWAIC team initiated the development of a computational modeling tool to illustrate the propagation of EM waves inside the reflective cabins and bays of aircraft and to obtain quantifiable information regarding the degradation of signals in aircraft subassemblies. The nose landing gear of a UAV CAD model was used

  6. Letters from a Nightingale nurse.

    Science.gov (United States)

    Denny, E

    1996-01-01

    Mary Cadbury was one of six daughters in a wealthy Birmingham family, all of whom took up professional or unpaid philanthropic work. In 1873 Mary began nurse training at the Nightingale School, St Thomas's Hospital, and regularly sent letters to family and friends, which provide a graphic account of the experience of a nurse in the latter half of the nineteenth century.

  7. Credit Card Debt Hardship Letter Samples

    OpenAIRE

    lissa coffey

    2016-01-01

    Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...

  8. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  9. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  10. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  11. Evaluation of coherence interference in optical wireless communication through multiscattering channels.

    Science.gov (United States)

    Kedar, Debbie; Arnon, Shlomi

    2006-05-10

    Optical wireless communication has been the subject of much research in recent years because of the increasing interest in laser satellite-ground links and urban optical wireless communication. The major sources of performance degradation have been identified as the spatial, angular, and temporal spread of the propagating beam when the propagation channel is multiscattering, resulting in reduced power reception and intersignal interference, as well as turbulence-induced scintillations and noise due to receiver circuitry and background illumination. However, coherence effects due to multipath interference caused by a scattering propagation channel do not appear to have been treated in detail in the scientific literature. We attempt a theoretical analysis of coherence interference in optical wireless communication through scattering channels and try to quantify the resultant performance degradation for different media. We conclude that coherence interference is discernible in optical wireless communication through scattering channels and is highly dependent on the microscopic nature of the propagation medium.

  12. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  13. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  14. Low complexity source and channel coding for mm-wave hybrid fiber-wireless links

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Vegas Olmos, Juan José; Pang, Xiaodan

    2014-01-01

    We report on the performance of channel and source coding applied for an experimentally realized hybrid fiber-wireless W-band link. Error control coding performance is presented for a wireless propagation distance of 3 m and 20 km fiber transmission. We report on peak signal-to-noise ratio perfor...

  15. 48 CFR 42.504 - Postaward letters.

    Science.gov (United States)

    2010-10-01

    ... CONTRACT ADMINISTRATION AND AUDIT SERVICES Postaward Orientation 42.504 Postaward letters. In some circumstances, a letter or other written form of communication to the contractor may be adequate postaward...

  16. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  17. Adaptive Wavelet Coding Applied in a Wireless Control System.

    Science.gov (United States)

    Gama, Felipe O S; Silveira, Luiz F Q; Salazar, Andrés O

    2017-12-13

    Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER) versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  18. Adaptive Wavelet Coding Applied in a Wireless Control System

    Directory of Open Access Journals (Sweden)

    Felipe O. S. Gama

    2017-12-01

    Full Text Available Wireless control systems can sense, control and act on the information exchanged between the wireless sensor nodes in a control loop. However, the exchanged information becomes susceptible to the degenerative effects produced by the multipath propagation. In order to minimize the destructive effects characteristic of wireless channels, several techniques have been investigated recently. Among them, wavelet coding is a good alternative for wireless communications for its robustness to the effects of multipath and its low computational complexity. This work proposes an adaptive wavelet coding whose parameters of code rate and signal constellation can vary according to the fading level and evaluates the use of this transmission system in a control loop implemented by wireless sensor nodes. The performance of the adaptive system was evaluated in terms of bit error rate (BER versus E b / N 0 and spectral efficiency, considering a time-varying channel with flat Rayleigh fading, and in terms of processing overhead on a control system with wireless communication. The results obtained through computational simulations and experimental tests show performance gains obtained by insertion of the adaptive wavelet coding in a control loop with nodes interconnected by wireless link. These results enable the use of this technique in a wireless link control loop.

  19. Open letter to the Vatican.

    Science.gov (United States)

    1999-01-01

    An open letter was published by Latin American and Caribbean women during the Special Session of the UN General Assembly on the International Conference on Population and Development. The letter generally focused on the Church¿s stand on women's reproductive rights. In particular, it questioned the Church on the following aspects of reproductive health, which include: 1) maternal death related to lack of access to reproductive health care; 2) Vatican representatives insisting that only parents can supervise their children education and health, which also lead to many cases of sexual abuse and incest; 3) women's sexual inequality and daily violence; 4) the Vatican delegation blocking the advances of contraception, sexual education, and HIV prevention; 5) problems of migrants and allocation of resources; and 6) the Church failing to recognize the capacity of young people to make decisions based on their own conscience.

  20. John von Neumann selected letters

    CERN Document Server

    2005-01-01

    John von Neuman was perhaps the most influential mathematician of the twentieth century, especially if his broad influence outside mathematics is included. Not only did he contribute to almost all branches of mathematics and created new fields, but he also changed post-World War II history with his work on the design of computers and with being a sought-after technical advisor to many figures in the U.S. military-political establishment in the 1940s and 1950s. The present volume is the first substantial collection of (previously mainly unpublished) letters written by von Neumann to colleagues, friends, government officials, and others. The letters give us a glimpse of the thinking of John von Neumann about mathematics, physics, computer science, science management, education, consulting, politics, and war. Readers of quite diverse backgrounds will find much of interest in this fascinating first-hand look at one of the towering figures of twentieth century science.

  1. Written Communications Simulation: Write Me a Letter.

    Science.gov (United States)

    North Carolina State Dept. of Public Instruction, Raleigh. Div. of Vocational Education.

    This simulation is intended for use as a culminating activity after students have been exposed to personal and/or business letter writing, use of reference manuals, typing of letters, mailing procedures, typing of numbers, punctuation practice, and filing procedures. Stated objectives are to enable students to type a mailable letter; to inspect,…

  2. Letter Dice. Technical Note No. 6.

    Science.gov (United States)

    Gunter, Jock

    Letter and syllable dice devised for a project in rural Ecuador provide inexpensive, easily reproducible learning materials for practice in basic literary skills. Eleven wooden cubes with six letters on each cube are cast onto a surface and the player constructs words from the letters on the top side of the dice. After a word is formed and…

  3. 31 CFR 29.511 - Demand letters.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Demand letters. 29.511 Section 29.511... Overpayments § 29.511 Demand letters. Except as provided in § 29.516(e), before starting collection action to recover an overpayment, the Benefits Administrator must send a demand letter that informs the debtor in...

  4. 7 CFR 3560.709 - Demand letter.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Demand letter. 3560.709 Section 3560.709 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.709 Demand letter. (a) If a... repayment schedule, the Agency will send the borrower a demand letter specifying: (1) The amount of...

  5. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  6. Michelangelo, a Tireless Letter Writer

    Directory of Open Access Journals (Sweden)

    Adelin Charles Fiorato

    2014-04-01

    Full Text Available A titan of artistic creation, the sculptor-painter-architect Michelangelo was also a tireless letter writer. Five hundred and eighteen of his letters have reached us, stretching from his youth to the eve of his death, but we know that many others have been lost. Written in a kind of familiar Florentine and in a style of minimalist ‘realism’ – which does not prevent the presence of either impetuous polemical flights or pages of literary indulgence – these letters deal mainly with everyday subjects: day-by-day relationships, either endearing or resentful, with his relatives, financial or property matters and, above all, the marriage problems which concerned his nephew Leonardo, the sole heir of the family. But one also discovers in them the artist’s warm feelings of friendship and love, his poetic and aesthetic exchanges, his relationships, often conflictual, with his fellow-artists and patrons as well as his reflections on old age and death. All in all, these letters represent a documentary chronicle of a Florentine bourgeois family and the technical hassle of an entrepreneur’s activity. If, on the one hand, the Carteggio does not shed light either on Michelangelo’s conception of art or the way in which he realized his works, on the other it illustrates certain latent aspects of his projects, as well as of his personality, which was at the same time melancholy and aggressive, surprisingly whole and manifold. This luxuriant correspondence presents, so to speak, a ‘genetic’ interest, since it reveals the hidden face of the brilliant conceiver and creator, of the artist and entrepreneur struggling with the obstacles whose overcoming makes creation possible. 

  7. What Do Letter Migration Errors Reveal About Letter Position Coding in Visual Word Recognition?

    Science.gov (United States)

    Davis, Colin J.; Bowers, Jeffrey S.

    2004-01-01

    Dividing attention across multiple words occasionally results in misidentifications whereby letters apparently migrate between words. Previous studies have found that letter migrations preserve within-word letter position, which has been interpreted as support for position-specific letter coding. To investigate this issue, the authors used word…

  8. Beam propagation

    International Nuclear Information System (INIS)

    Hermansson, B.R.

    1989-01-01

    The main part of this thesis consists of 15 published papers, in which the numerical Beam Propagating Method (BPM) is investigated, verified and used in a number of applications. In the introduction a derivation of the nonlinear Schroedinger equation is presented to connect the beginning of the soliton papers with Maxwell's equations including a nonlinear polarization. This thesis focuses on the wide use of the BPM for numerical simulations of propagating light and particle beams through different types of structures such as waveguides, fibers, tapers, Y-junctions, laser arrays and crystalline solids. We verify the BPM in the above listed problems against other numerical methods for example the Finite-element Method, perturbation methods and Runge-Kutta integration. Further, the BPM is shown to be a simple and effective way to numerically set up the Green's function in matrix form for periodic structures. The Green's function matrix can then be diagonalized with matrix methods yielding the eigensolutions of the structure. The BPM inherent transverse periodicity can be untied, if desired, by for example including an absorptive refractive index at the computational window edges. The interaction of two first-order soliton pulses is strongly dependent on the phase relationship between the individual solitons. When optical phase shift keying is used in coherent one-carrier wavelength communication, the fiber attenuation will suppress or delay the nonlinear instability. (orig.)

  9. Indoor Corridor Wideband Radio Propagation Measurements and Channel Models for 5G Millimeter Wave Wireless Communications at 19 GHz, 28 GHz, and 38 GHz Bands

    Directory of Open Access Journals (Sweden)

    Ahmed M. Al-samman

    2018-01-01

    Full Text Available This paper presents millimeter wave (mmWave measurements in an indoor environment. The high demands for the future applications in the 5G system require more capacity. In the microwave band below 6 GHz, most of the available bands are occupied; hence, the microwave band above 6 GHz and mmWave band can be used for the 5G system to cover the bandwidth required for all 5G applications. In this paper, the propagation characteristics at three different bands above 6 GHz (19, 28, and 38 GHz are investigated in an indoor corridor environment for line of sight (LOS and non-LOS (NLOS scenarios. Five different path loss models are studied for this environment, namely, close-in (CI free space path loss, floating-intercept (FI, frequency attenuation (FA path loss, alpha-beta-gamma (ABG, and close-in free space reference distance with frequency weighting (CIF models. Important statistical properties, such as power delay profile (PDP, root mean square (RMS delay spread, and azimuth angle spread, are obtained and compared for different bands. The results for the path loss model found that the path loss exponent (PLE and line slope values for all models are less than the free space path loss exponent of 2. The RMS delay spread for all bands is low for the LOS scenario, and only the directed path is contributed in some spatial locations. For the NLOS scenario, the angle of arrival (AOA is extensively investigated, and the results indicated that the channel propagation for 5G using high directional antenna should be used in the beamforming technique to receive the signal and collect all multipath components from different angles in a particular mobile location.

  10. SSIART: Opening the Way to Wireless Sensor Networks On-Board Spacecraft with an Inter-Agency Research Environment

    Science.gov (United States)

    Gunes-Lasnet, Sev; Dufour, Jean-Francois

    2012-08-01

    The potential uses and benefits of wireless technologies in space are very broad. Since many years the CCSDS SOIS wireless working group has worked at the identification of key applications for which wireless would bring benefits, and at supporting the deployment of wireless in space thanks to documents, in particular a Green informative book and magenta books presenting recommended practices.The Smart Sensor Inter-Agency Research Test bench (SSIART) is being designed to provide the space Agencies and the Industry with a reference smart sensor platform to test wireless sensor technologies in reference representative applications and RF propagation environments, while promoting these technologies at the same time.

  11. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  12. Letter Knowledge in Parent–Child Conversations

    Science.gov (United States)

    Robins, Sarah; Treiman, Rebecca; Rosales, Nicole

    2014-01-01

    Learning about letters is an important component of emergent literacy. We explored the possibility that parent speech provides information about letters, and also that children’s speech reflects their own letter knowledge. By studying conversations transcribed in CHILDES (MacWhinney, 2000) between parents and children aged one to five, we found that alphabetic order influenced use of individual letters and letter sequences. The frequency of letters in children’s books influenced parent utterances throughout the age range studied, but children’s utterances only after age two. Conversations emphasized some literacy-relevant features of letters, such as their shapes and association with words, but not letters’ sounds. Describing these patterns and how they change over the preschool years offers important insight into the home literacy environment. PMID:25598577

  13. Writing more informative letters of reference.

    Science.gov (United States)

    Wright, Scott M; Ziegelstein, Roy C

    2004-05-01

    Writing a meaningful and valuable letter of reference is not an easy task. Several factors influence the quality of any letter of reference. First, the accuracy and reliability of the writer's impressions and judgment depend on how well he knows the individual being described. Second, the writer's frame of reference, which is determined by the number of persons at the same level that he has worked with, will impact the context and significance of his beliefs and estimations. Third, the letter-writing skills of the person composing the letter will naturally affect the letter. To support the other components of a candidate's application, a letter of reference should provide specific examples of how an individual's behavior or attitude compares to a reference group and should assess "intangibles" that are hard to glean from a curriculum vitae or from test scores. This report offers suggestions that should help physicians write more informative letters of reference.

  14. Indoor Wireless RF Energy Transfer for Powering Wireless Sensors

    Directory of Open Access Journals (Sweden)

    H. Visser

    2012-12-01

    Full Text Available For powering wireless sensors in buildings, rechargeable batteries may be used. These batteries will be recharged remotely by dedicated RF sources. Far-field RF energy transport is known to suffer from path loss and therefore the RF power available on the rectifying antenna or rectenna will be very low. As a consequence, the RF-to-DC conversion efficiency of the rectenna will also be very low. By optimizing not only the subsystems of a rectenna but also taking the propagation channel into account and using the channel information for adapting the transmit antenna radiation pattern, the RF energy transport efficiency will be improved. The rectenna optimization, channel modeling and design of a transmit antenna are discussed.

  15. To Domingos: letters, friends, literature

    Directory of Open Access Journals (Sweden)

    Laíse Ribas Bastos

    2017-09-01

    Full Text Available The object for studying and analysis in this work is a set of letters received by Domingos Carvalho da Silva, which points to the constitution of a scene consisted of friendship and dissidences around a common literary and intellectual perspective. The objective of this work is to map the heterogeneity of the group as well as the problematic project involving the literary production in that moment, in order to find, thus, the means and ways of permanence of literature as it was configured between the 1940s and the 1960s.

  16. The "One-Letter-War"

    DEFF Research Database (Denmark)

    Gammeltoft, Peder

    2017-01-01

    The resolve of the naming dispute between Denmark, Norway and Sweden over the sea name Skagerrak has always been hailed as a prime example of how a naming dispute between countries over joint geographical name features should be handled and solved. This is a search into the story behind the scenes...... by the national mapping agencies. Practical Implications: Useful for institutions seeking name dispute resolution. Building on the extensive correspondence of almost fifty letters in the Danish Place-Name Commission’s journal archive, this naming dispute is shown to be of a rather different nature and resolve...

  17. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  18. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  19. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  20. Wireless cardiac action potential transmission with ultrasonically inserted silicon microprobes

    International Nuclear Information System (INIS)

    Shen, C J; Ramkumar, A; Lal, A; Gilmour, R F Jr

    2011-01-01

    This paper reports on the integration of ultrasonically inserted horn-shaped cardiac probes with wireless transmission of 3D cardiac action potential measurement for applications in ex vivo preparations such as monitoring the onset of ventricular fibrillation. Ultrasonically inserted silicon horn probes permit reduced penetration force during insertion, allowing silicon, a brittle material, to penetrate cardiac tissue. The probes also allow recording from multiple sites that are lithographically defined. An application-specific integrated circuit has been designed with a 40 dB amplifying stage and a frequency modulating oscillator at 95 MHz to wirelessly transmit the recorded action potentials. This ultrasonically inserted microprobe wireless system demonstrates the initial results in wireless monitoring of 3D action potential propagation, and the extraction of parameters of interest including the action potential duration and diastolic interval

  1. A Trace-Driven Analysis of Wireless Group Communication Mechanisms

    Directory of Open Access Journals (Sweden)

    Surendar Chandra

    2012-08-01

    Full Text Available Wireless access is increasingly ubiquitous while mobile devices that use them are resource rich. These trends allow wireless users to collaborate with each other. We investigate various group communication paradigms that underly collaboration applications. We synthesize durations when members collaborate using wireless device availability traces. Wireless users operate from a variety of locations. Hence, we analyzed the behavior of wireless users in universities, corporations, conference venues, and city-wide hotspots. We show that the availability durations are longer in corporations followed by university and then in hotspots. The number of simultaneously available wireless users is small in all the scenarios. The session lengths are becoming smaller while the durations between sessions are becoming larger. We observed user churn in all the scenarios. We show that synchronous mechanisms require less effort to maintain update synchronicity among the group members. However, distributed mechanisms require a large number of replicas in order to propagate updates among the users. For asynchronous mechanisms, we show that pull-based mechanisms naturally randomize the times when updates are propagated and thus achieve better performance than push based mechanisms.We develop an adaptive approach that customizes the update frequency using the last session duration and show that this mechanism exhibits good performance when the required update frequency intervals are large. We also show that for a given number of gossips, it is preferable to propagate updates to all available nodes rather than increasing the frequency while correspondingly reducing the number of nodes to propagate updates.We develop a middleware to illustrate the practicality of our approach.

  2. Coherently Enhanced Wireless Power Transfer

    Science.gov (United States)

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alù, Andrea

    2018-04-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and wireless power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load. This condition, however, can be easily affected by changes in the environment, preventing optimal operation of a WPT system. Here, we introduce the concept of coherently enhanced WPT that allows us to bypass this difficulty and achieve dynamic control of power transfer. The approach relies on coherent excitation of the waveguide connected to the antenna load with a backward propagating signal of specific amplitude and phase. This signal creates a suitable interference pattern at the load resulting in a modification of the local wave impedance, which in turn enables conjugate matching and a largely increased amount of extracted energy. We develop a simple theoretical model describing this concept, demonstrate it with full-wave numerical simulations for the canonical example of a dipole antenna, and verify experimentally in both near-field and far-field regimes.

  3. Statistical Characterization of Electromagnetic Wave Propagation in Mine Environments

    KAUST Repository

    Yucel, Abdulkadir C.

    2013-01-01

    A computational framework for statistically characterizing electromagnetic (EM) wave propagation through mine tunnels and galleries is presented. The framework combines a multi-element probabilistic collocation method with a full-wave fast Fourier transform and fast multipole method accelerated surface integral equation-based EM simulator to statistically characterize fields from wireless transmitters in complex mine environments. 1536-1225 © 2013 IEEE.

  4. Statistical characterization of wave propagation in mine environments

    KAUST Repository

    Bakir, Onur

    2012-07-01

    A computational framework for statistically characterizing electromagnetic (EM) wave propagation through mine tunnels and galleries is presented. The framework combines a multi-element probabilistic collocation (ME-PC) method with a novel domain-decomposition (DD) integral equation-based EM simulator to obtain statistics of electric fields due to wireless transmitters in realistic mine environments. © 2012 IEEE.

  5. The legibility of letters and words

    DEFF Research Database (Denmark)

    Beier, Sofie

    2016-01-01

    The saying made famous by Mathew Carter that "type is a beautiful group of letters, not a group of beautiful letters”, highlights the fact that although a typeface consists of a number of letters it is when the letters are assembled in a word that they become type. However, research indicates...... that what makes letters legible in isolation is not necessarily the same as what makes them legible in words. Is it possible to create a typeface where both letters and words have a high level of legibility or are those factors so different that they cannot be combined? Through a literature review...... on relevant experimental investigations, I will in this talk present examples of when the legibility findings on letters and words correlate and when they differ....

  6. Reconfigurable Radio Access Unit for DWDM to W-Band Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, Jarosław P.

    2017-01-01

    In this letter a reconfigurable Remote Access Unit (RAU) is proposed and demonstrated, interfacing dense wavelength division multiplexed (DWDM) optical and W-band wireless links. The RAU is composed of a tunable local oscillator, a narrow optical filter and a control unit, making it reconfigurable...

  7. Experimental validation of wireless communication with chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian [Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing, Xian University of Technology, Xian 710048 (China); Baptista, Murilo S.; Grebogi, Celso [Institute for Complex System and Mathematical Biology, SUPA, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2016-08-15

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  8. Experimental validation of wireless communication with chaos

    International Nuclear Information System (INIS)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S.; Grebogi, Celso

    2016-01-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  9. Experimental validation of wireless communication with chaos.

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  10. Writing More Informative Letters of Reference

    OpenAIRE

    Wright, Scott M; Ziegelstein, Roy C

    2004-01-01

    Writing a meaningful and valuable letter of reference is not an easy task. Several factors influence the quality of any letter of reference. First, the accuracy and reliability of the writer's impressions and judgment depend on how well he knows the individual being described. Second, the writer's frame of reference, which is determined by the number of persons at the same level that he has worked with, will impact the context and significance of his beliefs and estimations. Third, the letter...

  11. Study on the Effect of Frequency on Conductivity of Underground Strata in Coal Mine Through-the-earth Wireless Communication

    OpenAIRE

    Jinyi TAO; Yuchen ZHANG

    2014-01-01

    The relationship of conductivity and the frequency, which is of decisive significance in through-the-earth wireless communication in coal mine, is closely related to the options of frequency range in coal mine wireless communication. When through-the-earth wireless communication is applied, the electromagnetic waves need to spread in the semi-conductive medium rocks. The main factors affecting the electromagnetic wave propagation in rocks is the rock strata electromagnetic parameters. These p...

  12. Resource Letter: GW-1: Global warming

    Science.gov (United States)

    Firor, John W.

    1994-06-01

    This Resource Letter provides a guide to the literature on the possibility of a human-induced climate change—a global warming. Journal articles and books are cited for the following topics: the Greenhouse Effect, sources of infrared-trapping gases, climate models and their uncertainties, verification of climate models, past climate changes, and economics, ethics, and politics of policy responses to climate change. [The letter E after an item indicates elementary level or material of general interest to persons becoming informed in the field. The letter I, for intermediate level, indicates material of somewhat more specialized nature, and the letter A indicates rather specialized or advanced material.

  13. A Remote WIRELESS Facility

    Directory of Open Access Journals (Sweden)

    Kees Uiterwijk

    2007-10-01

    Full Text Available Continuing need for available distance learning facilities has led to the development of a remote lab facility focusing on wireless technology. In the field of engineering there is a student need of gaining experience in set-up, monitoring and maintenance of 802.11A/B/G based wireless LAN environments.

  14. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  15. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  16. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  17. Effect of orthographic processes on letter-identity and letter-position encoding in dyslexic children

    Directory of Open Access Journals (Sweden)

    Caroline eReilhac

    2012-05-01

    Full Text Available The ability to identify letters and encode their position is a crucial step of the word recognition process. However and despite their word identification problem, the ability of dyslexic children to encode letter-identity and letter-position within strings was not systematically investigated. This study aimed at filling this gap and further explored how letter identity and letter position encoding is modulated by letter context in developmental dyslexia. For this purpose, a letter-string comparison task was administered to French dyslexic children and two chronological-age (CA and reading-age (RA-matched control groups. Children had to judge whether two successively and briefly presented 4-letter-strings were identical or different. Letter-position and letter-identity were manipulated through the transposition (e.g., RTGM vs. RMGT or substitution of two letters (e.g., TSHF vs. TGHD. Non-words, pseudo-words and words were used as stimuli to investigate sub-lexical and lexical effects on letter encoding. Dyslexic children showed both substitution and transposition detection problems relative to CA controls. A substitution advantage over transpositions was only found for words in dyslexic children whereas it extended to pseudo-words in RA controls and to all type of items in CA controls. Letters were better identified in the dyslexic group when belonging to orthographically familiar strings. Letter position encoding was very impaired in dyslexic children who did not show any word context effect in contrast to CA controls. Overall, the current findings point to a strong letter identity and letter position encoding disorder in developmental dyslexia.

  18. Signal Processing for Improved Wireless Receiver Performance

    DEFF Research Database (Denmark)

    Christensen, Lars P.B.

    2007-01-01

    This thesis is concerned with signal processing for improving the performance of wireless communication receivers for well-established cellular networks such as the GSM/EDGE and WCDMA/HSPA systems. The goal of doing so, is to improve the end-user experience and/or provide a higher system capacity...... by allowing an increased reuse of network resources. To achieve this goal, one must first understand the nature of the problem and an introduction is therefore provided. In addition, the concept of graph-based models and approximations for wireless communications is introduced along with various Belief...... Propagation (BP) methods for detecting the transmitted information, including the Turbo principle. Having established a framework for the research, various approximate detection schemes are discussed. First, the general form of linear detection is presented and it is argued that this may be preferable...

  19. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  20. Optical wireless communications an emerging technology

    CERN Document Server

    Capsoni, Carlo; Ghassemlooy, Zabih; Boucouvalas, Anthony; Udvary, Eszter

    2016-01-01

    This book focuses on optical wireless communications (OWC), an emerging technology with huge potential for the provision of pervasive and reliable next-generation communications networks. It shows how the development of novel and efficient wireless technologies can contribute to a range of transmission links essential for the heterogeneous networks of the future to support various communications services and traffic patterns with ever-increasing demands for higher data-transfer rates. The book starts with a chapter reviewing the OWC field, which explains different sub-technologies (visible-light, ultraviolet (UV) and infrared (IR) communications) and introduces the spectrum of application areas (indoor, vehicular, terrestrial, underwater, intersatellite, deep space, etc.). This provides readers with the necessary background information to understand the specialist material in the main body of the book, which is in four parts. The first of these deals with propagation modelling and channel characterization of ...

  1. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  2. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  3. Sixty-Minute Review of Letter Writing

    Science.gov (United States)

    Cunningham, Donald H.; Graham, Louise

    1974-01-01

    The article describes a one-hour presentation which provides a basic stereotyped pattern of letter organization for the four types of letters (order, request, claim, and reply) the business of secretarial student is most likely to have to write. The four paragraphs of the pattern are: purpose, explanation, optional, and closing. (AG)

  4. Culture and subculture in transactional letter writing

    DEFF Research Database (Denmark)

    Shaw, Philip; Okamura, Akiko

    2000-01-01

    This study examines the relative contributions of subculture membership and mother-tongue status/target culture membership in writing transactional letters. We examined the letters accompanying articles initially submitted for publication by 26 NSE and 23 NNSE academics, and compared them with ef...

  5. When Do First Letters Mnemonics Aid Recall?

    Science.gov (United States)

    Morris, P. E.; Cook, N.

    1978-01-01

    The evidence for the effectiveness of the first letter mnemonic technique is confused. There are at least three studies showing no effect, and one where an improvement in recall occurred. Reports two experiments which attempted to locate the conditions under which the first letter mnemonic is effective. (Author/RK)

  6. The Indirect Empathic Approach to Claim Letters.

    Science.gov (United States)

    Bell, James D.

    1985-01-01

    In discussing letter-writing methods for business communication classes, the article explains that claim letter formats other than the direct approach are not only legitimate, but also effective, and suggests that the approach selected should depend upon the circumstances surrounding the claim. (CT)

  7. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  8. Propagation modeling in a manufacturing environment

    Energy Technology Data Exchange (ETDEWEB)

    Birdwell, J.D.; Horn, R.D.; Rader, M.S. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Electrical Engineering; Shourbaji, A.A. [Oak Ridge Centers for Mfg. Technology, TN (United States)

    1995-12-31

    Wireless sensors which utilize low power spread spectrum data transmission have significant potential in industrial environments due to low cabling and installation costs. In addition, this technology imposes fewer constraints upon placement due to cable routing, allowing sensors to be installed in areas with poor access. Limitations are imposed on sensor and receiver placement by electromagnetic propagation effects in the industrial environment, including multipath and the presence of absorbing media. This paper explores the electromagnetic analysis of potential wireless sensor applications using commercially available finite element software. In addition, since the applications environment is often at least partially specified in electronic form using computer-aided drafting software, the importation of information from this software is discussed. Both three-dimensional and two-dimensional examples are presented which demonstrate the utility and limitations of the method.

  9. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  10. A Stimulus Sampling Theory of Letter Identity and Order

    Science.gov (United States)

    Norris, Dennis; Kinoshita, Sachiko; van Casteren, Maarten

    2010-01-01

    Early on during word recognition, letter positions are not accurately coded. Evidence for this comes from transposed-letter (TL) priming effects, in which letter strings generated by transposing two adjacent letters (e.g., "jugde") produce large priming effects, more than primes with the letters replaced in the corresponding position (e.g.,…

  11. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  12. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  13. Critical contrastive rhetoric: The influence of L2 letter writing instruction on L1letter writing

    Directory of Open Access Journals (Sweden)

    Mehrnoosh Fakharzadeh

    2014-08-01

    Full Text Available The present study employed critical contrastive rhetoric to investigate the L2 to L1 transfer of organizational pattern and directness level of speech acts in business complaint letters. By examining the L1 complaint letters of 30 tourism university students in two phases of study, pre and post instruction of English complaint letter, the study revealed that the rhetorical organization of Persian letters are in a state of hybridity. The post instruction comparison of letters, however, showed a tendency towards applying English conventions both in organization and directness level of complaint speech act in the L1 complaint letters. The results also revealed that after instruction the expert in the field of tourism viewed some letters as inappropriate in terms of politeness which is reflected through some lexical items.

  14. Part two: Error propagation

    International Nuclear Information System (INIS)

    Picard, R.R.

    1989-01-01

    Topics covered in this chapter include a discussion of exact results as related to nuclear materials management and accounting in nuclear facilities; propagation of error for a single measured value; propagation of error for several measured values; error propagation for materials balances; and an application of error propagation to an example of uranium hexafluoride conversion process

  15. Wireless data transfer in saliniferous formations

    International Nuclear Information System (INIS)

    Wilsnack, T.; Grafe, F.; Roessel, A.

    2012-01-01

    The metrological surveillance of processes and long-term monitoring is an important requirement for closed mines or radioactive waste repositories. The available measuring technology is usually based on electrical power supply using existing underground power network. This is in contradiction with the targeted sealing of the monitored mine caverns and/or the integrity of hydraulic barriers. The authors developed a concept of wireless data transfer based on the radio wave propagation in mostly dry saliniferous formations. The system was tests at several reference sites.

  16. A red-letter day !

    CERN Multimedia

    2008-01-01

    Today is a red-letter day for the LHC and CERN as a beam of protons has travelled around the LHC ring for the very first time! The start of LHC operation marks the end of a long period in which you have given your all, and this first particle beam circulating in the accelerator now paves the way for discoveries that will open up a whole new field of knowledge. The history of the LHC began in 1984 with a debate on the possible objectives of a future accelerator, based on the state of our knowledge at that time. The CERN Council then approved the single-stage construction of the LHC in 1996, giving the go-ahead for the work that has now reached completion. For the past twelve years, physicists, engineers and technicians from CERN and its associated institutes have been engaged in constructing the three pillars of the LHC: the accelerator (including the upgrade of the existing accelerator chain), the four experiments, and the computing ...

  17. EDITORIAL: Letter from the Editor Letter from the Editor

    Science.gov (United States)

    Pashinin, Pavel P.

    2013-01-01

    Dear readers, contributors, and members of the world laser physics community. It is a great honour for us to introduce to you our new publishing partner, IOP Publishing, a subsidiary of the Institute of Physics, United Kingdom. IOP Publishing is a world renowned authority in producing journals, magazines, websites and services that enable researchers and research organizations to present their work to a world-wide audience. Laser Physics, the first English-language scientific journal in Russia, was founded in 1990 on the initiative of Alexander M Prokhorov, a pioneer and leader in laser physics research. Professor Prokhorov served as the first Editor-in-Chief of the journal until 2002. We are proud that it is our 23rd year of publishing Laser Physics and our 10th year of publishing Laser Physics Letters. We would like to honour the memory of our friend, late Professor Igor Yevseyev, whose enthusiasm and unwavering dedication to our journals contributed most significantly to their success. It was initially his idea in 2011 to approach IOP with a partnership proposal. We deeply regret that he is no longer with us as we enter this productive alliance. Now, in partnership with IOP, we are turning a new page in providing world-wide access to the cutting-edge research results in our journals, serving our well established global audience. We see new horizons opening for our journals for years to come and hope that our readers share our enthusiasm and aspirations. Please accept our best wishes for all your new scientific endeavors in the exciting field of laser physics.

  18. The effect of letter string length and report condition on letter recognition accuracy.

    Science.gov (United States)

    Raghunandan, Avesh; Karmazinaite, Berta; Rossow, Andrea S

    Letter sequence recognition accuracy has been postulated to be limited primarily by low-level visual factors. The influence of high level factors such as visual memory (load and decay) has been largely overlooked. This study provides insight into the role of these factors by investigating the interaction between letter sequence recognition accuracy, letter string length and report condition. Letter sequence recognition accuracy for trigrams and pentagrams were measured in 10 adult subjects for two report conditions. In the complete report condition subjects reported all 3 or all 5 letters comprising trigrams and pentagrams, respectively. In the partial report condition, subjects reported only a single letter in the trigram or pentagram. Letters were presented for 100ms and rendered in high contrast, using black lowercase Courier font that subtended 0.4° at the fixation distance of 0.57m. Letter sequence recognition accuracy was consistently higher for trigrams compared to pentagrams especially for letter positions away from fixation. While partial report increased recognition accuracy in both string length conditions, the effect was larger for pentagrams, and most evident for the final letter positions within trigrams and pentagrams. The effect of partial report on recognition accuracy for the final letter positions increased as eccentricity increased away from fixation, and was independent of the inner/outer position of a letter. Higher-level visual memory functions (memory load and decay) play a role in letter sequence recognition accuracy. There is also suggestion of additional delays imposed on memory encoding by crowded letter elements. Copyright © 2016 Spanish General Council of Optometry. Published by Elsevier España, S.L.U. All rights reserved.

  19. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  20. Wireless radio a history

    CERN Document Server

    Coe, Lewis

    2006-01-01

    ""Informative...recommended""--Choice; ""interesting...a good read...well worth reading""--Contact Magazine. This history first looks at Marconi's wireless communications system and then explores its many applications, including marine radio, cellular telephones, police and military uses, television and radar. Radio collecting is also discussed, and brief biographies are provided for the major figures in the development and use of the wireless.

  1. Alphabetical: How Every Letter Tells a Story

    OpenAIRE

    Rosen, Michael

    2013-01-01

    From minding your Ps and Qs to wondering why X should mark the spot, Alphabetical is a book for everyone who loves words and language. Whether it's how letters are arranged on keyboards or Viking runes, textspeak or zip codes, this book will change the way you think about letters for ever. How on Earth did we fix upon our twenty-six letters, what do they really mean, and how did we come to write them down in the first place? Michael Rosen takes you on an unforgettable adventure through the hi...

  2. DEVELOPMENT OF WIRELESS TECHNIQUES IN DATA AND POWER TRANSMISSION APPLICATION FOR PARTICLE-PHYSICS DETECTORS

    CERN Document Server

    Brenner, R; Dehos, C; De Lurgio, P; Djurcic, Z; Drake, G; Gonzales Gimenez, JL; Gustafsson, L; Kim, DW; Locci, E; Pfeiffer, U; Röhrich, D; Rydberg, D; Schöning, A; Siligaris, A; Soltveit, HK; Ullaland, K; Vincent, P; Vasquez, PR; Wiedner, D; Yang, S

    2017-01-01

    In the WADAPT project described in this Letter of Intent, we propose to develop wireless techniques for data and power transmission in particle-physics detectors. Wireless techniques have developed extremely fast over the last decade and are now mature for being considered as a promising alternative to cables and optical links that would revolutionize the detector design. The WADAPT consortium has been formed to identify the specific needs of different projects that might benefit from wireless techniques with the objective of providing a common platform for research and development in order to optimize effectiveness and cost. The proposed R&D will aim at designing and testing wireless demonstrators for large instrumentation systems.

  3. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  4. Optical frequency upconversion technique for transmission of wireless MIMO-type signals over optical fiber.

    Science.gov (United States)

    Shaddad, R Q; Mohammad, A B; Al-Gailani, S A; Al-Hetar, A M

    2014-01-01

    The optical fiber is well adapted to pass multiple wireless signals having different carrier frequencies by using radio-over-fiber (ROF) technique. However, multiple wireless signals which have the same carrier frequency cannot propagate over a single optical fiber, such as wireless multi-input multi-output (MIMO) signals feeding multiple antennas in the fiber wireless (FiWi) system. A novel optical frequency upconversion (OFU) technique is proposed to solve this problem. In this paper, the novel OFU approach is used to transmit three wireless MIMO signals over a 20 km standard single mode fiber (SMF). The OFU technique exploits one optical source to produce multiple wavelengths by delivering it to a LiNbO3 external optical modulator. The wireless MIMO signals are then modulated by LiNbO3 optical intensity modulators separately using the generated optical carriers from the OFU process. These modulators use the optical single-sideband with carrier (OSSB+C) modulation scheme to optimize the system performance against the fiber dispersion effect. Each wireless MIMO signal is with a 2.4 GHz or 5 GHz carrier frequency, 1 Gb/s data rate, and 16-quadrature amplitude modulation (QAM). The crosstalk between the wireless MIMO signals is highly suppressed, since each wireless MIMO signal is carried on a specific optical wavelength.

  5. Why doctors do not answer referral letters

    African Journals Online (AJOL)

    Referral letters act as permission slips to allow patients easy access to ... Methods: A qualitative study method was used, as the purpose of this study was to .... The total list of topics ..... Research design: qualitative and quantitative approaches.

  6. Advice letter on policy instruments renewable electricity

    International Nuclear Information System (INIS)

    2011-01-01

    In a letter of July 2010 the Energy Council made recommendations for a policy framework with more obligations and fewer subsidies. This included the Energy Council's advice to investigate whether the introduction of a supplier obligation could play a major role in the realisation of the CO2 emission target of the Netherlands and increase the share of renewable energy in line with European agreements. This advice letter deals with one aspect of the broader considerations: the share of renewable electricity and the kind of incentive framework that is needed to achieve the target concerned. In this letter we will examine the possibilities of the SDE+ support (financial incentive for renewable energy) scheme and the supplier obligation, the effects on the market and the consequences for achieving the target. This letter closes with conclusions and recommendations. [nl

  7. Distributed Software-Attestation Defense against Sensor Worm Propagation

    Directory of Open Access Journals (Sweden)

    Jun-Won Ho

    2015-01-01

    Full Text Available Wireless sensor networks are vulnerable to sensor worm attacks in which the attacker compromises a few nodes and makes these compromised nodes initiate worm spread over the network, targeting the worm infection of the whole nodes in the network. Several defense mechanisms have been proposed to prevent worm propagation in wireless sensor networks. Although these proposed schemes use software diversity technique for worm propagation prevention under the belief that different software versions do not have common vulnerability, they have fundamental drawback in which it is difficult to realize the aforementioned belief in sensor motes. To resolve this problem, we propose on-demand software-attestation based scheme to defend against worm propagation in sensor network. The main idea of our proposed scheme is to perform software attestations against sensor nodes in on-demand manner and detect the infected nodes by worm, resulting in worm propagation block in the network. Through analysis, we show that our proposed scheme defends against worm propagation in efficient and robust manner. Through simulation, we demonstrate that our proposed scheme stops worm propagation at the reasonable overhead while preventing a majority of sensor nodes from being infected by worm.

  8. Maritime Geo-Fence Letter Report

    Science.gov (United States)

    2016-07-01

    1 Classification | CG-926 RDC | author | audience | month year Maritime Geo-Fence Letter Report Authors: Irene Gonin and Gregory...Johnson   Distribution Statement A: Approved for public release; distribution is unlimited. July 2016 Report No. CG-D-10-16 Maritime Geo-Fence...United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Geo-Fence Letter Report 1

  9. Burroughs's Postcolonial Visions in The Yage Letters

    OpenAIRE

    Keomany, Melanie

    2016-01-01

    In her article "Burroughs's Postcolonial Visions in The Yage Letters" Melanie Keomany discusses the contents of William S. Burroughs and Allen Ginsberg's The Yage Letters which could be dismissed as openly bigoted and racist. Keomany posits that the text reveals valuable connections between the colonial expansion of the eighteenth century and 1950s USA and Latin America. By re-shaping Burroughs's lived experiences in the Amazon into a text where the narrator William Lee mimics sardonically an...

  10. Communication on SWIPT and EH Using Electromagnetic Behaviour for Power Allocation in Wireless Networks

    Science.gov (United States)

    Khan, Sohel Rana; Ajij, Sayyad

    2017-12-01

    This review paper focuses on the basic relations between wireless power transfer, wireless information transfer and combined phenomenon of simultaneous wireless information and power transfer. The authors reviewed and discussed electromagnetic fields behaviour (EMB) for enhancing the power allocation strategies (PAS) in energy harvesting (EH) wireless communication systems. Further, this paper presents relations between Friis transmission equation and Maxwell's equations to be used in propagation models for reduction in specific absorption rate (SAR). This paper provides a review of various methods and concepts reported in earlier works. This paper also reviews Poynting vector and power densities along with boundary conditions for antennas and human body. Finally, this paper explores the usage of electromagnetic behaviour for the possible enhancement in power saving methods for electromagnetic behaviour centered-wireless energy harvesting (EMBC-WEH). At the same time, possibilities of PAS for reduction in SAR are discussed.

  11. Physics-based statistical model and simulation method of RF propagation in urban environments

    Science.gov (United States)

    Pao, Hsueh-Yuan; Dvorak, Steven L.

    2010-09-14

    A physics-based statistical model and simulation/modeling method and system of electromagnetic wave propagation (wireless communication) in urban environments. In particular, the model is a computationally efficient close-formed parametric model of RF propagation in an urban environment which is extracted from a physics-based statistical wireless channel simulation method and system. The simulation divides the complex urban environment into a network of interconnected urban canyon waveguides which can be analyzed individually; calculates spectral coefficients of modal fields in the waveguides excited by the propagation using a database of statistical impedance boundary conditions which incorporates the complexity of building walls in the propagation model; determines statistical parameters of the calculated modal fields; and determines a parametric propagation model based on the statistical parameters of the calculated modal fields from which predictions of communications capability may be made.

  12. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  13. Structured printed referral letter (form letter; saves time and improves communication

    Directory of Open Access Journals (Sweden)

    R.P.J.C. Ramanayake

    2013-01-01

    Full Text Available Referral of patients to hospitals, specialists and other institutions is an essential part of primary health care. Patients are referred to specialists when investigation or therapeutic options are exhausted in primary care or when opinion or advice is needed from them. Referral has considerable implications for patients, health care system and health care costs. Good communication between primary and secondary care is essential for the smooth running of any health care system. Referral and reply letters are the sole means of communication between doctors most of the time and breakdown in communication could lead to poor continuity of care, delayed diagnoses, polypharmacy, increased litigation risk and unnecessary testing. A referral letter also helps to avoid patient dissatisfaction and loss of confidence in family physician. Studies of referral letters have reported that specialists are dissatisfied with their quality and content. Inclusion of letter writing skills in the medical curriculum, peer assessment and feedback have shown to improve the quality of referral letters. . Form letters have shown to enhance information content and communication in referral process. In Sri Lanka referral letters are usually hand written and frequent complaints are that these letters do not contain adequate information and retrieval of information is a problem due to poor legibility and clarity. Sometimes Primary care doctors refer patients to hospitals and specialists with only verbal instructions. To address these short comings this form letter was introduced. Based on the guidelines and systematic review of published articles, items of information to be included were decided. Printed forms of the letter are kept in the practice and the doctor has to just fill up relevant information under each heading. The objectives of introducing this structured referral letter was to improve the quality and standard of referral letters and save time for both general

  14. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  15. 30-Gb/s bidirectional transparent optical transmission with an MMF access and an indoor optical wireless link

    NARCIS (Netherlands)

    Chen, H.; Boom, van den H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    This letter describes a 30-Gb/s bidirectional transparent optical transmission, over a 4.4-km multimode fiber (MMF) in combination with an indoor optical wireless (OW) link, which could provide limited mobility. Due to MMF's advantages, such as lower installation costs and easy maintenance, it is

  16. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  17. Distributed estimation based on observations prediction in wireless sensor networks

    KAUST Repository

    Bouchoucha, Taha

    2015-03-19

    We consider wireless sensor networks (WSNs) used for distributed estimation of unknown parameters. Due to the limited bandwidth, sensor nodes quantize their noisy observations before transmission to a fusion center (FC) for the estimation process. In this letter, the correlation between observations is exploited to reduce the mean-square error (MSE) of the distributed estimation. Specifically, sensor nodes generate local predictions of their observations and then transmit the quantized prediction errors (innovations) to the FC rather than the quantized observations. The analytic and numerical results show that transmitting the innovations rather than the observations mitigates the effect of quantization noise and hence reduces the MSE. © 2015 IEEE.

  18. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  19. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  20. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  1. An Immunization Strategy Based on Propagation Mechanism

    Directory of Open Access Journals (Sweden)

    Yixin Zhu

    2014-01-01

    Full Text Available With the ubiquity of smart phones, wearable equipment, and wireless sensors, the topologies of networks composed by them change along with time. The immunization strategies in which network immune nodes are chosen by analyzing the static aggregation network topologies have been challenged. The studies about interaction propagations between two pathogens show that the interaction can change propagation threshold and the final epidemic size of each other, which provides a new thinking of immunization method. The eradication or inhibition of the virus can be achieved through the spread of its opposite party. Here, we put forward an immunization strategy whose implementation does not depend on the analysis of network topology. The immunization agents are randomly placed on a few of individuals of network and spread out from these individuals on network in a propagation method. The immunization agents prevent virus infecting their habitat nodes with certain immune success rate. The analysis and simulation of evolution equation of the model show that immune propagation has a significant impact on the spread threshold and steady-state density of virus on a finite size of BA networks. Simulations on some real-world networks also suggest that the immunization strategy is feasible and effective.

  2. Analysis of reliability of professor recommendation letters based on concordance with self-introduction letter.

    Science.gov (United States)

    Kim, Sang Hyun

    2013-12-01

    The purpose of this study was to examine the concordance between a checklist's categories of professor recommendation letters and characteristics of the self-introduction letter. Checklists of professor recommendation letters were analyzed and classified into cognitive, social, and affective domains. Simple correlation was performed to determine whether the characteristics of the checklists were concordant with those of the self-introduction letter. The difference in ratings of the checklists by pass or fail grades was analyzed by independent sample t-test. Logistic regression analysis was performed to determine whether a pass or fail grade was influenced by ratings on the checklists. The Cronbach alpha value of the checklists was 0.854. Initiative, as an affective domain, in the professor's recommendation letter was highly ranked among the six checklist categories. Self-directed learning in the self-introduction letter was influenced by a pass or fail grade by logistic regression analysis (pprofessor recommendation letters and the sum of all characteristics in the self-introduction letter.

  3. Can "CANISO" Activate "CASINO"? Transposed-Letter Similarity Effects with Nonadjacent Letter Positions

    Science.gov (United States)

    Perea, Manuel; Lupker, Stephen J.

    2004-01-01

    Nonwords created by transposing two "adjacent" letters (i.e., transposed-letter (TL) nonwords like "jugde") are very effective at activating the lexical representation of their base words. This fact poses problems for most computational models of word recognition (e.g., the interactive-activation model and its extensions), which assume that exact…

  4. Letter and symbol identification: No evidence for letter-specific crowding mechanisms.

    Science.gov (United States)

    Castet, Eric; Descamps, Marine; Denis-Noël, Ambre; Colé, Pascale

    2017-09-01

    It has been proposed that letters, as opposed to symbols, trigger specialized crowding processes, boosting identification of the first and last letters of words. This hypothesis is based on evidence that single-letter accuracy as a function of within-string position has a W shape (the classic serial position function [SPF] in psycholinguistics) whereas an inverted V shape is obtained when measured with symbols. Our main goal was to test the robustness of the latter result. Our hypothesis was that any letter/symbol difference might result from short-term visual memory processes (due to the partial report [PR] procedures used in SPF studies) rather than from crowding. We therefore removed the involvement of short-term memory by precueing target-item position and compared SPFs with precueing and postcueing. Perimetric complexity was stringently matched between letters and symbols. In postcueing conditions similar to previous studies, we did not reproduce the inverted V shape for symbols: Clear-cut W shapes were observed with an overall smaller accuracy for symbols compared to letters. This letter/symbol difference was dramatically reduced in precueing conditions in keeping with our prediction. Our results are not consistent with the claim that letter strings trigger specialized crowding processes. We argue that PR procedures are not fit to isolate crowding processes.

  5. Letter-Transposition Effects Are Not Universal: The Impact of Transposing Letters in Hebrew

    Science.gov (United States)

    Velan, Hadas; Frost, Ram

    2009-01-01

    We examined the effects of letter-transposition in Hebrew in three masked-priming experiments. Hebrew, like English has an alphabetic orthography where sequential and contiguous letter strings represent phonemes. However, being a Semitic language it has a non-concatenated morphology that is based on root derivations. Experiment 1 showed that…

  6. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  7. Wireless Testbed Bonsai

    Science.gov (United States)

    2006-02-01

    wireless sensor device network, and a about 200 Stargate nodes higher-tier multi-hop peer- to-peer 802.11b wireless network. Leading up to the full ExScal...deployment, we conducted spatial scaling tests on our higher-tier protocols on a 7 × 7 grid of Stargates nodes 45m and with 90m separations respectively...onW and its scaled version W̃ . III. EXPERIMENTAL SETUP Description of Kansei testbed. A stargate is a single board linux-based computer [7]. It uses a

  8. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  9. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  10. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  11. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  12. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  13. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  14. Radio Wave Propagation Scene Partitioning for High-Speed Rails

    Directory of Open Access Journals (Sweden)

    Bo Ai

    2012-01-01

    Full Text Available Radio wave propagation scene partitioning is necessary for wireless channel modeling. As far as we know, there are no standards of scene partitioning for high-speed rail (HSR scenarios, and therefore we propose the radio wave propagation scene partitioning scheme for HSR scenarios in this paper. Based on our measurements along the Wuhan-Guangzhou HSR, Zhengzhou-Xian passenger-dedicated line, Shijiazhuang-Taiyuan passenger-dedicated line, and Beijing-Tianjin intercity line in China, whose operation speeds are above 300 km/h, and based on the investigations on Beijing South Railway Station, Zhengzhou Railway Station, Wuhan Railway Station, Changsha Railway Station, Xian North Railway Station, Shijiazhuang North Railway Station, Taiyuan Railway Station, and Tianjin Railway Station, we obtain an overview of HSR propagation channels and record many valuable measurement data for HSR scenarios. On the basis of these measurements and investigations, we partitioned the HSR scene into twelve scenarios. Further work on theoretical analysis based on radio wave propagation mechanisms, such as reflection and diffraction, may lead us to develop the standard of radio wave propagation scene partitioning for HSR. Our work can also be used as a basis for the wireless channel modeling and the selection of some key techniques for HSR systems.

  15. Effects of wireless packet loss in industrial process control systems.

    Science.gov (United States)

    Liu, Yongkang; Candell, Richard; Moayeri, Nader

    2017-05-01

    Timely and reliable sensing and actuation control are essential in networked control. This depends on not only the precision/quality of the sensors and actuators used but also on how well the communications links between the field instruments and the controller have been designed. Wireless networking offers simple deployment, reconfigurability, scalability, and reduced operational expenditure, and is easier to upgrade than wired solutions. However, the adoption of wireless networking has been slow in industrial process control due to the stochastic and less than 100% reliable nature of wireless communications and lack of a model to evaluate the effects of such communications imperfections on the overall control performance. In this paper, we study how control performance is affected by wireless link quality, which in turn is adversely affected by severe propagation loss in harsh industrial environments, co-channel interference, and unintended interference from other devices. We select the Tennessee Eastman Challenge Model (TE) for our study. A decentralized process control system, first proposed by N. Ricker, is adopted that employs 41 sensors and 12 actuators to manage the production process in the TE plant. We consider the scenario where wireless links are used to periodically transmit essential sensor measurement data, such as pressure, temperature and chemical composition to the controller as well as control commands to manipulate the actuators according to predetermined setpoints. We consider two models for packet loss in the wireless links, namely, an independent and identically distributed (IID) packet loss model and the two-state Gilbert-Elliot (GE) channel model. While the former is a random loss model, the latter can model bursty losses. With each channel model, the performance of the simulated decentralized controller using wireless links is compared with the one using wired links providing instant and 100% reliable communications. The sensitivity of the

  16. Traditions of martyrdom in the Ignatian Letters

    Directory of Open Access Journals (Sweden)

    S. Fuhrmann

    2011-06-01

    Full Text Available The letters of Ignatius represent one of the key texts for the emergence of martyrdom during the second century AD in Christianity. This article is concerned with the question whether Ignatius contributed to a “theology of martyrdom” or whether he rather relied on previous traditions. The author argues, by undertaking an analysis of certain pragmatics and semantics, that the motif of martyrdom is solely used to buttress Ignatius’ claim for authority among his intended addressees by referring to an understanding of martyrdom that has its roots in the New Testament. An identification of the author of the letters with a historical martyr is regarded as unlikely.

  17. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  18. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  19. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  20. Future of wireless communication

    Energy Technology Data Exchange (ETDEWEB)

    Barker, M

    1996-12-31

    This document reproduces slides from a conference presentation giving an overview of current and upcoming wireless communication methods of interest to Canadian electric utilities. Both voice and data communication methods are considered, including cellular telephone, satellite communications, personal communication services, regulated licensed arrowband data systems, and integrated services.

  1. Wired vs. Wireless.

    Science.gov (United States)

    Fielding, Randall

    2000-01-01

    Presents a debate on which technology will be in tomorrow's classrooms and the pros and cons of wiring classrooms and using a wireless network. Concluding comments address the likelihood, and desirability, of placing computers throughout the entire educational process and what types of computers and capabilities are needed. (GR)

  2. Wireless Remote Control System

    Directory of Open Access Journals (Sweden)

    Adrian Tigauan

    2012-06-01

    Full Text Available This paper presents the design of a wireless remote control system based on the ZigBee communication protocol. Gathering data from sensors or performing control tasks through wireless communication is advantageous in situations in which the use of cables is impractical. An Atmega328 microcontroller (from slave device is used for gathering data from the sensors and transmitting it to a coordinator device with the help of the XBee modules. The ZigBee standard is suitable for low-cost, low-data-rate and low-power wireless networks implementations. The XBee-PRO module, designed to meet ZigBee standards, requires minimal power for reliable data exchange between devices over a distance of up to 1600m outdoors. A key component of the ZigBee protocol is the ability to support networking and this can be used in a wireless remote control system. This system may be employed e.g. to control temperature and humidity (SHT11 sensor and light intensity (TSL230 sensor levels inside a commercial greenhouse.

  3. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  4. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  5. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  6. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  7. NASA Bluetooth Wireless Communications

    Science.gov (United States)

    Miller, Robert D.

    2007-01-01

    NASA has been interested in wireless communications for many years, especially when the crew size of the International Space Station (ISS) was reduced to two members. NASA began a study to find ways to improve crew efficiency to make sure the ISS could be maintained with limited crew capacity and still be a valuable research testbed in Low-Earth Orbit (LEO). Currently the ISS audio system requires astronauts to be tethered to the audio system, specifically a device called the Audio Terminal Unit (ATU). Wireless communications would remove the tether and allow astronauts to freely float from experiment to experiment without having to worry about moving and reconnecting the associated cabling or finding the space equivalent of an extension cord. A wireless communication system would also improve safety and reduce system susceptibility to Electromagnetic Interference (EMI). Safety would be improved because a crewmember could quickly escape a fire while maintaining communications with the ground and other crewmembers at any location. In addition, it would allow the crew to overcome the volume limitations of the ISS ATU. This is especially important to the Portable Breathing Apparatus (PBA). The next generation of space vehicles and habitats also demand wireless attention. Orion will carry up to six crewmembers in a relatively small cabin. Yet, wireless could become a driving factor to reduce launch weight and increase habitable volume. Six crewmembers, each tethered to a panel, could result in a wiring mess even in nominal operations. In addition to Orion, research is being conducted to determine if Bluetooth is appropriate for Lunar Habitat applications.

  8. Power Optimization With BLER Constraint for Wireless Fronthauls in C-RAN

    OpenAIRE

    Vu, Thang Xuan; Nguyen, Thang Van; Quek, Tony Q.S.

    2016-01-01

    Cloud radio access network (C-RAN) is a novel architecture for future mobile networks to sustain the exponential traffic growth thanks to the exploitation of centralized processing. In C-RAN, one data processing center or baseband unit (BBU) communicates with users via distributed remote radio heads (RRHs), which are connected to the BBU via high capacity, low latency fronthaul links. In this letter, we study C-RAN with wireless fronthauls due to their flexibility in deployment and management...

  9. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    OpenAIRE

    Krikidis, Ioannis

    2015-01-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by usi...

  10. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  11. Letters in the Forest: Global precedence effect disappears for letters but not for non-letters under reading-like conditions

    Directory of Open Access Journals (Sweden)

    Thomas eLachmann

    2014-07-01

    Full Text Available Normally-skilled reading involves special processing strategies for letters, which are habitually funneled into an abstract letter code. On the basis of previous studies we argue that this habit leads to the preferred usage of an analytic strategy for the processing of letters, while non-letters are preferably processed via a holistic strategy. The well-known Global Precedence Effect (GPE seems to contradict to this assumption, since, with compound, hierarchical figures, including letter items, faster responses are observed to the global than to the local level of the figure, as well as an asymmetric interference effect from global to local level. We argue that with letters these effects depend on presentation conditions; only when they elicit the processing strategies automatized for reading, an analytic strategy for letters in contrast to non-letters is to be expected. We compared the GPE for letters and non-letters in central viewing, with the global stimulus size close to the functional visual field in whole word reading (6.5o of visual angle and local stimuli close to the critical size for fluent reading of individual letters (.5o of visual angle. Under these conditions, the GPE remained robust for non-letters. For letters, however, it disappeared: letters showed no overall response time advantage for the global level and symmetric congruence effects (local-to-global as well as global-to local interference. We interpret these results as according to the view that reading is based on resident analytic visual processing strategies for letters.

  12. Suspending Damage: A Letter to Communities

    Science.gov (United States)

    Tuck, Eve

    2009-01-01

    In this open letter, Eve Tuck calls on communities, researchers, and educators to reconsider the long-term impact of "damage-centered" research--research that intends to document peoples' pain and brokenness to hold those in power accountable for their oppression. This kind of research operates with a flawed theory of change: it is often used to…

  13. "Physical Review Letters" in the Classroom

    Science.gov (United States)

    Angiolillo, Paul J.; Lynch, Jonathan

    2010-01-01

    Ask any physicist what the preeminent journal in the field is, and I think the almost unanimous answer will be "Physical Review Letters" ("PRL"). This weekly journal of the American Physical Society publishes high-impact research from all the major subdisciplines of physics. This journal is not the one you would think is the first place a high…

  14. Varsity letters documenting modern colleges and universities

    CERN Document Server

    Samuels, Helen Willa

    1998-01-01

    A study of the functions of colleges and universities, Varsity Letters is intended to aid those responsible for the documentation of these institutions. Samuels offers specific advice about the records of modern colleges and universities and proposes a method to ensure their adequate documentation. She also offers a method to analyze and plan the preservation of records for any type of institution.

  15. African Journals Online: Browse Alphabetically -- letter D

    African Journals Online (AJOL)

    Dar Es Salaam Medical Students' Journal. The journal publishes original research, case report/case series, letter to the editor, reviews of health related issues in medicine, pharmacy, dentistry, nursing, public and allied health sciences. Furthermore the DMSJ endeavours to disseminate research findings mainly of medical ...

  16. Suggestopaedia-Canada. Information Letter, No. 4.

    Science.gov (United States)

    Racle, Gabriel

    This issue of the information letter consists of two articles, "Music Therapy" and "Research and Applications of Psychomusical Techniques"; a review of the book, "La musicotherapie et les methods nouvelles d'association des techniques" by Guilhot and Cecourt, and a bibliography of books on music therapy written in…

  17. Reply to letter to the editor

    NARCIS (Netherlands)

    Woelders, H.

    2006-01-01

    In response to the letter by Dr. Amir Arav I would like to mention the following. The application of the principle of directional solidification to cryopreservation of living cells was, as far as I am aware, not the invention of Dr. Arav. It was first published and patented by Rubinsky (Berkeley,

  18. SiD Letter of Intent

    CERN Document Server

    Aihara, H.; Oreglia, M.; Berger, E.L.; Guarino, V.; Repond, J.; Weerts, H.; Xia, L.; Zhang, J.; Zhang, Q.; Srivastava, A.; Butler, J.M.; Goldstein, Joel; Velthuis, J.; Radeka, V.; Zhu, R.-Y.; Lutz, P.; de Roeck, A.; Elsener, K.; Gaddi, A.; Gerwig, H.; Grefe, C.; Klempt, W.; Linssen, L.; Schlatter, D.; Speckmayer, P.; Thom, J.; Yang, J.; Christian, D.C.; Cihangir, S.; Cooper, W.E.; Demarteau, M.; Fisk, H.E.; Garren, L.A.; Krempetz, K.; Kutschke, R.K.; Lipton, R.; Para, A.; Tschirhart, R.; Wenzel, H.; Yarema, R.; Grunewald, M.; Pankov, A.; U., Gomel State Tech.; Dutta, T.; Dauncey, P.D.; Balbuena, J.P.; Fleta, C.; Lozano, M.; Ullan, M.; Christian, G.B.; Faus-Golfe, A.; Fuster, J.; Lacasta, C.; Marinnas, C.; Vos, M.; Duarte, J.; Fernandez, M.; Gonzalez, J.; Jaramillo, R.; Lopez, Virto A.; Martinez-Eivero, C.; Moya, D.; Ruiz-Mimeno, A.; Vila, I.; Colledani, C.; Dorokhov, A.; Hu-Guo, C.; Winter, M.; Moortgat-Pick, G.; Onoprienko, D.V.; Kim, G.N.; Park, H.; Adloff, C.; Blaha, J.; Blaising, J.-J.; Cap, S.; Chefdeville, M.; Drancourt, C.; Espargiliare, A.; Gaglione, R.; Geffroy, N.; Jacquemier, J.; Karyotakis, Y.; Prast, J.; Vouters, G.; Gronberg, J.; Walston, S.; Wright, D.; Sawyer, L.; Laloum, M.; Ciobanu, C.; Chauveau, J.; Savoy-Navarro, A.; Andricek, L.; Moser, H.-G.; Cowan, R.f.; Fisher, P.; Yamamoto, R.K.; Kenney, ClMl; Boos, E.E.; Merkin, M.; Chen, S.; Chakraborty, D.; Dyshkant, A.; Hedin, D.; Zutshi, V.; Galkin, V.; D'Ascenzo, N.; Ossetski, D.; Saveliev, V.; Kapusta, F.; De Masi, R.; Vrba, V.; Lu, C.; McDonald, K.T.; Smith, A.J.S.; Bortoletto, D.; Coath, R.; Crooks, J.; Damerell, C.; Gibson, M.; Nichols, A.; Stanitzki, M.; Strube, J.; Turchetta, R.; Tyndel, M.; Weber, M.; Worm, S.; Zhang, Z.; Barklow, T.L.; Belymam, A.; Breidenbach, M.; Cassell, R.; Craddock, W.; Deaconu, C.; Dragone, A.; Graf, N.A.; Haller, G.; Herbst, R.; Hewett, J.L.; Jaros, J.A.; Johnson, A.S.; Kim, P.C.; MacFarlane, D.B.; Markiewicz, T.; Maruyama, T.; McCormick, J.; Moffeit, K.; Neal, H.A.; Nelson, T.K.; Oriunno, M.; Partridge, R.; Peskin, M.E.; Rizzo, T.G.; Rowson, P.; Su, D.; Woods, M.; Chakrabarti, S.; Dieguez, A.; Garrido, Ll.; Kaminski, J.; Conway, J.S.; Chertok, M.; Gunion, J.; Holbrook, B.; Lander, R.L.; Tripathi, S.M.; Fadeyev, V.; Schumm, B.A.; Oreglia, M.; Gill, J.; Nauenberg, U.; Oleinik, G.; Wagner, S.R.; Ranjan, K.; Shivpuri, R.; Varner, G.S.; Orava, R.; Van Kooten, R.; Bilki, B.; Charles, M.; Kim, T.J.; Mallik, U.; Norbeck, E.; Onel, Y.; Brau, B.P.; Willocq, S.; Taylor, G.N.; Riles, Keith; Yang, H.-J.; Kriske, R.; Cremaldi, L.; Rahmat, R.; Lastovicka-Medin, G.; Seidel, S.; Hildreth, M.D.; Wayne, M.; Brau, J.E.; Frey, R.; Sinev, N.; Strom, D.M.; Torrence, E.; Banda, Y.; Burrows, P.N.; Devetak, E.; Foster, B.; Lastovicka, T.; Li, Y.-M.; Nomerotski, A.; Riera-Babures, J.; Vilasis-Cardona, X.; Manly, S.; Adeva, B.; Iglesias Escudero, C.; Vazquez Regueiro, P.; Saborido Silva, J.J.; Gallas Torreira, A.; Gao, D.; Jie, W.; Jungfeng, Y.; Li, C.; Liu, S.; Liu, Y.; Sun, Y.; Wang, Q.; Yi, J.; Yonggang, W.; Zhao, Z.; De, K.; Farbin, A.; Park, S.; Smith, J.; White, A.P.; Yu, J.; Lou, X.C.; Abe, T.; Iwasaki, M.; Lubatti, H.J.; Band, H.R.; Feyzi, F.; Prepost, R.; Karchin, P.E.; Milstene, C.; Baltay, C.; Dhawan, S.; Kwon, Y.-J.

    2009-01-01

    Letter of intent describing SiD (Silicon Detector) for consideration by the International Linear Collider IDAG panel. This detector concept is founded on the use of silicon detectors for vertexing, tracking, and electromagnetic calorimetry. The detector has been cost-optimized as a general-purpose detector for a 500 GeV electron-positron linear collider.

  19. 46 CFR 28.60 - Exemption letter.

    Science.gov (United States)

    2010-10-01

    ... VESSELS General Provisions § 28.60 Exemption letter. (a) Types of exemptions. (1) Specific exemption means... for an exemption of either type must be in writing, have specific reasons for the request, and be sent... vessel to which any exemption applies. (e) Right of appeal. Any person directly affected by a decision or...

  20. The anthrax letters: a medical detective story

    National Research Council Canada - National Science Library

    Cole, Leonard A

    2003-01-01

    .... Library of Congress Cataloging-in-Publication Data Cole, Leonard A., 1933The anthrax letters : a medical detective story / Leonard A. Cole. p. cm. Includes bibliographical references and index. ISBN 0-309-08881-X - ISBN 0-309-52584-5 (PDF) 1. Bioterrorism- United States. 2. Anthrax- United States. 3. Postal service- United States. 4. Victims of...

  1. Readerly and Writerly "Letters from the Park."

    Science.gov (United States)

    Conde, Susana

    1993-01-01

    Discusses in depth the film "Cartas del parque" ("Letters from the Park"), the first of six films in the "Amores Dificiles" series. Notes that the film is pervaded by the traditional overdetermination of gender roles. Suggests that an intrusive and authoritative narrator makes of this both a "readerly" and a…

  2. African Journals Online: Browse Alphabetically -- letter T

    African Journals Online (AJOL)

    Items 1 - 19 of 19 ... African Journals Online: Browse Alphabetically -- letter T ... and economic aspects of management and conservation of tropical flora and fauna. ... Les principaux thèmes qui y sont abordés recouvrent les axes de recherche ...

  3. 42 CFR 93.202 - Charge letter.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Charge letter. 93.202 Section 93.202 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...

  4. Power requirements and battery life measurement for wireless transmission between two nodes in different mediums

    Directory of Open Access Journals (Sweden)

    Radouane Karli

    2017-06-01

    Full Text Available One of the most important roles of the wireless sensor networks (WSN is to avoid wiring costs, be self-sustainable and be able to function for several years. However, due to the slow progress in battery technology, power continues to be a limited resource in wireless sensor communication and electric energy storage remains to be an important issue. On the other hand, if batteries must be replaced often, many remote sensing applications may become impractical. Therefore, batteries with long life on the order of several years are needed. This paper is an extension of work originally presented in The 5th International Conference on Electronic Devices, Systems and Applications to investigate further the power requirements for wireless data transfer between two nodes using batteries with different capacities (55 mAh, 550 mAh and 5500 mAh. In particular, the effect of a propagation medium such as air, distilled water and engine oil on the wireless communication inside a one meter long metallic pipe was investigated. Our first result shows a successful transmission of wireless signal through air, distilled water and oil medium with very low transmission losses. The second result shows that an increase in the battery capacity will increase the two-node wireless sensor operation time even in different propagation medium. This result can be used to determine the required battery capacity for extending the WSN operation time.

  5. Effect of LOS/NLOS Propagation on 5G Ultra-Dense Networks

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Pratas, Nuno; Doyle, Linda

    2017-01-01

    The combined presence of Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) components in the radio propagation environment can severely degrade the Ultra-Dense Networks (UDNs) performance. Backed by a stochastic geometry model, we show that when the LOS/NLOS propagation components are taken into a...... and to take advantage of extreme cell densification in the upcoming 5G wireless networks....

  6. Wireless Communications Device Wakeup Method and System

    NARCIS (Netherlands)

    Drago, S.; Sebastiano, F.; Leenaerts, D.M.W.; Breems, L.J.

    2008-01-01

    Abstract of WO 2009044368 Disclosed are wakeable wireless communications devices, and methods for waking wireless communications devices, for use in a wireless network of such devices. The devices communicate during respectively-designated timeslots according to a communications protocol. The

  7. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  8. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  9. Matching theory for wireless networks

    CERN Document Server

    Han, Zhu; Saad, Walid

    2017-01-01

    This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource. .

  10. Modelling the gluon propagator

    Energy Technology Data Exchange (ETDEWEB)

    Leinweber, D.B.; Parrinello, C.; Skullerud, J.I.; Williams, A.G

    1999-03-01

    Scaling of the Landau gauge gluon propagator calculated at {beta} = 6.0 and at {beta} = 6.2 is demonstrated. A variety of functional forms for the gluon propagator calculated on a large (32{sup 3} x 64) lattice at {beta} = 6.0 are investigated.

  11. Sound propagation in cities

    NARCIS (Netherlands)

    Salomons, E.; Polinder, H.; Lohman, W.; Zhou, H.; Borst, H.

    2009-01-01

    A new engineering model for sound propagation in cities is presented. The model is based on numerical and experimental studies of sound propagation between street canyons. Multiple reflections in the source canyon and the receiver canyon are taken into account in an efficient way, while weak

  12. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  13. Impact of a half-space interface on the wireless link between tiny sensor nodes

    NARCIS (Netherlands)

    Penkin, D.; Janssen, G.; Yarovoy, A.

    2014-01-01

    The power budget of a wireless link between two electrically small sensor nodes located close to an interface between two media is studied. The model includes both the propagation channel losses and input impedance of the radio frequency antennas. It is shown that a highly inductive half-space

  14. An Assessment of Emerging Wireless Broadband Technologies

    National Research Council Canada - National Science Library

    Fountanas, Leonidas

    2001-01-01

    ... technologies in providing broadband services today, emerging wireless broadband technologies are expected to significantly increase their market share over the next years, Deploying a wireless network...

  15. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  16. Wireless infrared computer control

    Science.gov (United States)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  17. Letter-transposition effects are not universal: The impact of transposing letters in Hebrew.

    Science.gov (United States)

    Velan, Hadas; Frost, Ram

    2009-10-01

    We examined the effects of letter transposition in Hebrew in three masked-priming experiments. Hebrew, like English has an alphabetic orthography where sequential and contiguous letter strings represent phonemes. However, being a Semitic language it has a non-concatenated morphology that is based on root derivations. Experiment 1 showed that transposed-letter (TL) root primes inhibited responses to targets derived from the non-transposed root letters, and that this inhibition was unrelated to relative root frequency. Experiment 2 replicated this result and showed that if the transposed letters of the root created a nonsense-root that had no lexical representation, then no inhibition and no facilitation were obtained. Finally, Experiment 3 demonstrated that in contrast to English, French, or Spanish, TL nonword primes did not facilitate recognition of targets, and when the root letters embedded in them consisted of a legal root morpheme, they produced inhibition. These results suggest that lexical space in alphabetic orthographies may be structured very differently in different languages if their morphological structure diverges qualitatively. In Hebrew, lexical space is organized according to root families rather than simple orthographic structure, so that all words derived from the same root are interconnected or clustered together, independent of overall orthographic similarity.

  18. Adaptive Wireless Transceiver, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  19. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  20. Reduced-Complexity Wireless Transceiver Architectures and Techniques for Space-Time Communications

    DEFF Research Database (Denmark)

    Tsakalaki, Elpiniki

    2012-01-01

    The dissertation sheds light on the performance gains of multi-antenna systems when the antenna aspects and the associated signal processing and coding aspects are integrated together in a multidisciplinary approach, addressing a variety of challenging tasks pertaining to the joint design of smart...... wireless transceivers and communication techniques. These tasks are at the intersection of different scientific disciplines including signal processing, communications, antennas and propagation. Specifically, the thesis deals with reduced-complexity space-time wireless transceiver architectures...... and associated communication techniques for multi-input multi-output (MIMO) and cognitive radio (CR) systems as well as wireless sensor networks (WSNs). The low-complexity architectures are obtained by equipping the wireless transceiver with passive control ports which require the minimum amount of RF hardware...

  1. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  2. Cognitive wireless networks

    CERN Document Server

    Feng, Zhiyong; Zhang, Ping

    2015-01-01

    This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures suppo

  3. Wearable wireless photoplethysmography sensors

    Science.gov (United States)

    Spigulis, Janis; Erts, Renars; Nikiforovs, Vladimirs; Kviesis-Kipge, Edgars

    2008-04-01

    Wearable health monitoring sensors may support early detection of abnormal conditions and prevention of their consequences. Recent designs of three wireless photoplethysmography monitoring devices embedded in hat, glove and sock, and connected to PC or mobile phone by means of the Bluetooth technology, are described. First results of distant monitoring of heart rate and pulse wave transit time using the newly developed devices are presented.

  4. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  5. Chromatic aberration compensation in numerical reconstruction of digital holograms by Fresnel-Bluestein propagation.

    Science.gov (United States)

    Hincapie, Diego; Velasquez, Daniel; Garcia-Sucerquia, Jorge

    2017-12-15

    In this Letter, we present a method for chromatic compensation in numerical reconstruction of digitally recorded holograms based on Fresnel-Bluestein propagation. The proposed technique is applied to correct the chromatic aberration that arises in the reconstruction of RGB holograms of both millimeter- and micrometer-sized objects. The results show the feasibility of this strategy to remove the wavelength dependence of the size of the numerically propagated wavefields.

  6. Patient information letters on nutrition: development and implementation.

    NARCIS (Netherlands)

    Binsbergen, J.J. van; Drenthen, A.J.

    2003-01-01

    BACKGROUND: In 1998 the Dutch College of General Practitioners (NHG) began developing patient information letters (PILs), based on the practice guidelines for family physicians (FPs) (NHG standards). Five nutritional guidance letters have since been developed with the Dutch Nutrition Center.

  7. Use of Standard Guidelines for Department of Medicine Summary Letters.

    Science.gov (United States)

    Fitz, Matthew; La Rochelle, Jeffrey; Lang, Valerie; DeWaay, Deborah; Adams, William; Nasraty, Farah

    2018-04-12

    Phenomenon: Fourth-year medical students obtain Department of Medicine (DOM) letters ("Chair" letters) to support their residency applications. Writing and interpreting DOM letters are challenging. There is heterogeneity in the letters that makes it difficult to both write and read these letters. The purpose of this study is to determine the value of new guidelines developed by a task force of clerkship directors and program directors in internal medicine and assess the implementation of these guidelines. The Clerkship Directors in Internal Medicine performed a cross-sectional survey of internal medicine clerkship directors at U.S. and Canadian medical schools in 2014. In addition, the primary author's institution reviewed 1,347 DOM letters between 2012 and 2014 to assess the implementation of these guidelines. The survey response rate was 78%. DOM letter writers reported the guidelines were better, easier to implement, and more compatible with the purpose of DOM letters than previously. Most letter readers reported that letters using the guidelines were more credible. Writers of DOM letters in lower academic ranks rated the letters with guidelines higher in several domains than those in higher academic ranks. Readers of DOM letters in higher academic ranks rated the letters with guidelines higher in several domains than those in lower academic ranks. In the DOM letters examined, the odds of meeting each guideline increased with each additional year. However, for 3 guidelines there was an initial decline in adherence from 2012 to 2013 before increasing again in 2014-the recommended length, clerkship description, and detailed narrative guidelines. Letters solely written by a chair were less likely to incorporate the guidelines. Insights: Clerkship directors often write the DOM letters and identify with the purpose of the guidelines. As writers, lower ranking academic faculty value the guidelines more than higher ranking academic faculty. As readers of DOM letters

  8. Progress in Body-Worn Antennas for On-Body Propagation (invited)

    DEFF Research Database (Denmark)

    Jakobsen, Kaj Bjarne

    2016-01-01

    On-body propagation and on-body antennas for body-centric wireless communications are presented. The onbody communications rely on creeping waves launched and received by the antennas, respectively. Path gain and bandwidth at 2.4 GHz for different types of body-worn antennas for head-centric comm...

  9. Propagation Path Loss Models for 5G Urban Micro- and Macro-Cellular Scenarios

    DEFF Research Database (Denmark)

    Sun, Shu; Rappaport, Theodore S.; Rangan, Sundeep

    2016-01-01

    This paper presents and compares two candidate large-scale propagation path loss models, the alpha-beta-gamma (ABG) model and the close-in (CI) free space reference distance model, for the design of fifth generation (5G) wireless communication systems in urban micro- and macro-cellular scenarios....

  10. Analysis of 38 GHz mmWave Propagation Characteristics of Urban Scenarios

    DEFF Research Database (Denmark)

    Rodriguez Larrad, Ignacio; Nguyen, Huan Cong; Sørensen, Troels Bundgaard

    2015-01-01

    The 38 GHz mm-wave frequency band is a strong candidate for the future deployment of wireless systems. Compared to lower frequency bands, propagation in the 38 GHz band is relatively unexplored for access networks in urban scenarios. This paper presents a detailed measurement-based analysis of ur...

  11. 100-GHz Wireless-Over-Fiber Links With Up to 16-Gb/s QPSK Modulation Using Optical Heterodyne Generation and Digital Coherent Detection

    DEFF Research Database (Denmark)

    Sambaraju, R.; Zibar, Darko; Caballero Jambrina, Antonio

    2010-01-01

    In this letter, a novel technique for direct conversion of an optical baseband quadrature phase-shift keying (QPSK) signal to a millimeter-wave wireless signal and subsequent signal demodulation is reported. Optical heterodyne mixing of the optical baseband QPSK signal with a free-running unmodul...

  12. Michael Maier--nine newly discovered letters.

    Science.gov (United States)

    Lenke, Nils; Roudet, Nicolas; Tilton, Hereward

    2014-02-01

    The authors provide a transcription, translation, and evaluation of nine newly discovered letters from the alchemist Michael Maier (1568-1622) to Gebhardt Johann von Alvensleben (1576-1631), a noble landholder in the vicinity of Magdeburg. Stemming from the final year of his life, this correspondence casts new light on Maier's biography, detailing his efforts to secure patronage amid the financial crisis of the early Thirty Years' War. While his ill-fated quest to perfect potable gold continued to form the central focus of his patronage suits, Maier also offered his services in several arts that he had condemned in his printed works, namely astrology and "supernatural" magic. Remarks concerning his previously unknown acquaintance with Heinrich Khunrath call for a re-evaluation of Maier's negotiation of the discursive boundaries between Lutheran orthodoxy and Paracelsianism. The letters also reveal Maier's substantial contribution to a work previously ascribed solely to the English alchemist Francis Anthony.

  13. Exploring Corporate Rhetoric: Metadiscourse in the CEO's Letter.

    Science.gov (United States)

    Hyland, Ken

    1998-01-01

    Examines how metadiscourse is used to create a positive corporate image in 137 CEOs' letters, showing how CEOs use nonpropositional material to realize rational, credible, and affective appeals. Reveals the essentially rhetorical nature of CEOs' letters by comparing the frequency and distribution of metadiscourse in their letters and directors'…

  14. Return to sender: Constantijn Huygens as a man of letters

    NARCIS (Netherlands)

    Gosseye, L.; Blom, F.; Leerintveld, A.

    2013-01-01

    Return to Sender takes as its starting point Constantijn Huygens’ letters and shows us the author in his different guises: intimus of René Descartes, translator of John Donne, collector of art, writer of flirtatious love letters and the author of a long consolatory letter-poem for an ailing friend

  15. Student Teacher Letters of Reference: A Critical Analysis

    Science.gov (United States)

    Mason, Richard W.; Schroeder, Mark P.

    2012-01-01

    Letters of reference are commonly used in acquiring a job in education. Despite serious issues of validity and reliability in writing and evaluating letters, there is a dearth of research that systematically examines the evaluation process and defines the constructs that define high quality letters. The current study used NVivo to examine 160…

  16. The Predictive Validity of Teacher Candidate Letters of Reference

    Science.gov (United States)

    Mason, Richard W.; Schroeder, Mark P.

    2014-01-01

    Letters of reference are widely used as an essential part of the hiring process of newly licensed teachers. While the predictive validity of these letters of reference has been called into question it has never been empirically studied. The current study examined the predictive validity of the quality of letters of reference for forty-one student…

  17. Evidence for magnocellular involvement in the identification of flanked letters

    NARCIS (Netherlands)

    Omtzigt, D.; Hendriks, A.W.C.J.; Kolk, H.H.J.

    2002-01-01

    Little is known about the role of the magno system in reading. One important hypothesis is that this system is involved in the allocation of attention. We reasoned that the presentation of a single letter automatically draws attention to this letter, whereas in the case of a flanked letter, an

  18. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  19. Chaos-based wireless communication resisting multipath effects

    Science.gov (United States)

    Yao, Jun-Liang; Li, Chen; Ren, Hai-Peng; Grebogi, Celso

    2017-09-01

    In additive white Gaussian noise channel, chaos has been shown to be the optimal coherent communication waveform in the sense of using a very simple matched filter to maximize the signal-to-noise ratio. Recently, Lyapunov exponent spectrum of the chaotic signals after being transmitted through a wireless channel has been shown to be unaltered, paving the way for wireless communication using chaos. In wireless communication systems, inter-symbol interference caused by multipath propagation is one of the main obstacles to achieve high bit transmission rate and low bit-error rate (BER). How to resist the multipath effect is a fundamental problem in a chaos-based wireless communication system (CWCS). In this paper, a CWCS is built to transmit chaotic signals generated by a hybrid dynamical system and then to filter the received signals by using the corresponding matched filter to decrease the noise effect and to detect the binary information. We find that the multipath effect can be effectively resisted by regrouping the return map of the received signal and by setting the corresponding threshold based on the available information. We show that the optimal threshold is a function of the channel parameters and of the information symbols. Practically, the channel parameters are time-variant, and the future information symbols are unavailable. In this case, a suboptimal threshold is proposed, and the BER using the suboptimal threshold is derived analytically. Simulation results show that the CWCS achieves a remarkable competitive performance even under inaccurate channel parameters.

  20. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  1. Analysis Of Packets Delay In Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Krivchenkov Aleksandr

    2015-12-01

    Full Text Available The networks with wireless links for automation control applications traffic transmission when packets have small size and application payload is predictable are under consideration. Analytical model for packets delay on their propagation path through the network is proposed. Estimations for network architectures based on WiFi and Bluetooth wireless technologies are made. The specifications for physical layer 802.11 a/b/g/n and 802.15.1 are under consideration. Analytical and experimental results for delivered network bandwidth for different network architecture, traffic structure and wireless technologies were compared to validate that basic mechanisms are correctly taken into account in the model. It is shown that basic effects are taken into account and further accuracy “improvement” of the model will give not more than 5%. As a result that is important for automation control applications we have reliably received the lowest possible level for packets delay in one wireless link. For 802.11 it is of order of 0.2 ms, for 802.15.1 it is 1.25 ms and is true when application packet can be transferred by one data frame.

  2. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  3. Composing chaotic music from the letter m

    Science.gov (United States)

    Sotiropoulos, Anastasios D.

    Chaotic music is composed from a proposed iterative map depicting the letter m, relating the pitch, duration and loudness of successive steps. Each of the two curves of the letter m is based on the classical logistic map. Thus, the generating map is xn+1 = r xn(1/2 - xn) for xn between 0 and 1/2 defining the first curve, and xn+1 = r (xn - 1/2)(1 - xn) for xn between 1/2 and 1 representing the second curve. The parameter r which determines the height(s) of the letter m varies from 2 to 16, the latter value ensuring fully developed chaotic solutions for the whole letter m; r = 8 yielding full chaotic solutions only for its first curve. The m-model yields fixed points, bifurcation points and chaotic regions for each separate curve, as well as values of the parameter r greater than 8 which produce inter-fixed points, inter-bifurcation points and inter-chaotic regions from the interplay of the two curves. Based on this, music is composed from mapping the m- recurrence model solutions onto actual notes. The resulting musical score strongly depends on the sequence of notes chosen by the composer to define the musical range corresponding to the range of the chaotic mathematical solutions x from 0 to 1. Here, two musical ranges are used; one is the middle chromatic scale and the other is the seven- octaves range. At the composer's will and, for aesthetics, within the same composition, notes can be the outcome of different values of r and/or shifted in any octave. Compositions with endings of non-repeating note patterns result from values of r in the m-model that do not produce bifurcations. Scores of chaotic music composed from the m-model and the classical logistic model are presented.

  4. Hamlet and Japanese Men of Letters

    Directory of Open Access Journals (Sweden)

    Kawachi Yoshiko

    2016-12-01

    Full Text Available Shakespeare has exerted a powerful influence on Japanese literature since he was accepted in the second half of the nineteenth century. Particularly Hamlet has had a strong impact on Japanese men of letters and provided them with the impetus to revive the play in contemporary literature. In this paper I discuss how they have utilized Hamlet for their creative activity and enriched Japanese literature.

  5. Letters of credit getting more expensive.

    Science.gov (United States)

    Nemes, J

    1991-09-02

    Hospital executives who haven't been in the market recently for a new or renewed letter of credit will find it a more expensive way to back their variable-rate debt. Annual fees are surging, for reasons ranging from an international banking agreement that goes into effect next year to more conservative fee structures being instituted because of bad loans made by some banks in the past decade.

  6. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  7. Green Wireless Power Transfer Networks

    NARCIS (Netherlands)

    Liu, Q.; Golinnski, M.; Pawelczak, P.; Warnier, M.

    2016-01-01

    wireless power transfer network (WPTN) aims to support devices with cable-less energy on-demand. Unfortunately, wireless power transfer itself-especially through radio frequency radiation rectification-is fairly inefficient due to decaying power with distance, antenna polarization, etc.

  8. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  9. Next Generation Intelligent Wireless Infrastructure

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg

    2010-01-01

    Given the commercial success of wireless technologies that has already taken place over the last couple of decades, with a global mobile communication penetration beyond 3 billion subscribers as well as the enormous success of wireless data communication through IEEE 802.11x and Bluetooth, people...

  10. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  11. Experimental and simulation analysis of the W-band SC-FDMA hybrid optical-wireless transmission

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Pang, Xiaodan; Deng, Lei

    2014-01-01

    We report on the experimental demonstration of the W-band hybrid optical-wireless SC-FDMA with 1.49 Gbit/s transmission over up to 2.3 m of air propagation. Provided simulation performance analysis proves a potential to reach 12.1 Gbit/s.......We report on the experimental demonstration of the W-band hybrid optical-wireless SC-FDMA with 1.49 Gbit/s transmission over up to 2.3 m of air propagation. Provided simulation performance analysis proves a potential to reach 12.1 Gbit/s....

  12. Geometry on the parameter space of the belief propagation algorithm on Bayesian networks

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, Yodai [National Institute of Informatics, Research Organization of Information and Systems, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430 (Japan); Laboratory for Mathematical Neuroscience, RIKEN Brain Science Institute, 2-1 Hirosawa, Wako-shi, Saitama 351-0198 (Japan)

    2006-01-30

    This Letter considers a geometrical structure on the parameter space of the belief propagation algorithm on Bayesian networks. The statistical manifold of posterior distributions is introduced, and the expression for the information metric on the manifold is derived. The expression is used to construct a cost function which can be regarded as a measure of the distance in the parameter space.

  13. Investigation of propagation dynamics of truncated vector vortex beams.

    Science.gov (United States)

    Srinivas, P; Perumangatt, C; Lal, Nijil; Singh, R P; Srinivasan, B

    2018-06-01

    In this Letter, we experimentally investigate the propagation dynamics of truncated vector vortex beams generated using a Sagnac interferometer. Upon focusing, the truncated vector vortex beam is found to regain its original intensity structure within the Rayleigh range. In order to explain such behavior, the propagation dynamics of a truncated vector vortex beam is simulated by decomposing it into the sum of integral charge beams with associated complex weights. We also show that the polarization of the truncated composite vector vortex beam is preserved all along the propagation axis. The experimental observations are consistent with theoretical predictions based on previous literature and are in good agreement with our simulation results. The results hold importance as vector vortex modes are eigenmodes of the optical fiber.

  14. Database for propagation models

    Science.gov (United States)

    Kantak, Anil V.

    1991-07-01

    A propagation researcher or a systems engineer who intends to use the results of a propagation experiment is generally faced with various database tasks such as the selection of the computer software, the hardware, and the writing of the programs to pass the data through the models of interest. This task is repeated every time a new experiment is conducted or the same experiment is carried out at a different location generating different data. Thus the users of this data have to spend a considerable portion of their time learning how to implement the computer hardware and the software towards the desired end. This situation may be facilitated considerably if an easily accessible propagation database is created that has all the accepted (standardized) propagation phenomena models approved by the propagation research community. Also, the handling of data will become easier for the user. Such a database construction can only stimulate the growth of the propagation research it if is available to all the researchers, so that the results of the experiment conducted by one researcher can be examined independently by another, without different hardware and software being used. The database may be made flexible so that the researchers need not be confined only to the contents of the database. Another way in which the database may help the researchers is by the fact that they will not have to document the software and hardware tools used in their research since the propagation research community will know the database already. The following sections show a possible database construction, as well as properties of the database for the propagation research.

  15. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  16. Wireless Distributed Antenna MIMO

    DEFF Research Database (Denmark)

    2015-01-01

    The present disclosure relates to system applications of multicore optical fibers. One embodiment relates to a base transceiver station for a wireless telecommunication system comprising a plurality of antenna units arranged in a MIMO configuration and adapted for transmission and/or reception...... of radio-frequency signals, an optical transmitter in the form of an electro-optic conversion unit for each of said plurality of antenna units, each electro-optic conversion unit adapted for converting an RF signal into an optical signal, a plurality of a single core optical fibers for guiding the optical...

  17. Dynamic wireless sensor networks

    CERN Document Server

    Oteafy, Sharief M A

    2014-01-01

    In this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled

  18. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  19. Deployable wireless Fresnel lens

    Science.gov (United States)

    Kennedy, Timothy F. (Inventor); Fink, Patrick W. (Inventor); Chu, Andrew W. (Inventor); Lin, Gregory Y. (Inventor)

    2013-01-01

    Apparatus and methods for enhancing the gain of a wireless signal are provided. In at least one specific embodiment, the apparatus can include a screen comprised of one or more electrically conductive regions for reflecting electromagnetic radiation and one or more non-conductive regions for permitting electromagnetic radiation therethrough. The one or more electrically conductive regions can be disposed adjacent to at least one of the one or more non-conductive regions. The apparatus can also include a support member disposed about at least a portion of the screen. The screen can be capable of collapsing by twisting the support member in opposite screw senses to form interleaved concentric sections.

  20. Wireless Headset Communication System

    Science.gov (United States)

    Lau, Wilfred K.; Swanson, Richard; Christensen, Kurt K.

    1995-01-01

    System combines features of pagers, walkie-talkies, and cordless telephones. Wireless headset communication system uses digital modulation on spread spectrum to avoid interference among units. Consists of base station, 4 radio/antenna modules, and as many as 16 remote units with headsets. Base station serves as network controller, audio-mixing network, and interface to such outside services as computers, telephone networks, and other base stations. Developed for use at Kennedy Space Center, system also useful in industrial maintenance, emergency operations, construction, and airport operations. Also, digital capabilities exploited; by adding bar-code readers for use in taking inventories.

  1. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  2. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  3. Wireless installation standard

    International Nuclear Information System (INIS)

    Lim, Hwang Bin

    2007-12-01

    This is divided six parts which are radio regulation law on securing of radio resource, use of radio resource, protection of radio resource, radio regulation enforcement ordinance with securing, distribution and assignment of radio regulation, radio regulation enforcement regulation on utility of radio resource and technical qualification examination, a wireless installation regulation of technique standard and safety facility standard, radio regulation such as certification regulation of information communicative machines and regulation of radio station on compliance of signal security, radio equipment in radio station, standard frequency station and emergency communication.

  4. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  5. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  6. Low-power wireless micromanometer system for acute and chronic bladder-pressure monitoring.

    Science.gov (United States)

    Majerus, Steve J A; Fletter, Paul C; Damaser, Margot S; Garverick, Steven L

    2011-03-01

    This letter describes the design, fabrication, and testing of a wireless bladder-pressure-sensing system for chronic, point-of-care applications, such as urodynamics or closed-loop neuromodulation. The system consists of a miniature implantable device and an external RF receiver and wireless battery charger. The implant is small enough to be cystoscopically implanted within the bladder wall, where it is securely held and shielded from the urine stream. The implant consists of a custom application-specific integrated circuit (ASIC), a pressure transducer, a rechargeable battery, and wireless telemetry and recharging antennas. The ASIC includes instrumentation, wireless transmission, and power-management circuitry, and on an average draws less than 9 μA from the 3.6-V battery. The battery charge can be wirelessly replenished with daily 6-h recharge periods that can occur during the periods of sleep. Acute in vivo evaluation of the pressure-sensing system in canine models has demonstrated that the system can accurately capture lumen pressure from a submucosal implant location.

  7. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  8. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  9. Household wireless electroencephalogram hat

    Science.gov (United States)

    Szu, Harold; Hsu, Charles; Moon, Gyu; Yamakawa, Takeshi; Tran, Binh

    2012-06-01

    We applied Compressive Sensing to design an affordable, convenient Brain Machine Interface (BMI) measuring the high spatial density, and real-time process of Electroencephalogram (EEG) brainwaves by a Smartphone. It is useful for therapeutic and mental health monitoring, learning disability biofeedback, handicap interfaces, and war gaming. Its spec is adequate for a biomedical laboratory, without the cables hanging over the head and tethered to a fixed computer terminal. Our improved the intrinsic signal to noise ratio (SNR) by using the non-uniform placement of the measuring electrodes to create the proximity of measurement to the source effect. We computing a spatiotemporal average the larger magnitude of EEG data centers in 0.3 second taking on tethered laboratory data, using fuzzy logic, and computing the inside brainwave sources, by Independent Component Analysis (ICA). Consequently, we can overlay them together by non-uniform electrode distribution enhancing the signal noise ratio and therefore the degree of sparseness by threshold. We overcame the conflicting requirements between a high spatial electrode density and precise temporal resolution (beyond Event Related Potential (ERP) P300 brainwave at 0.3 sec), and Smartphone wireless bottleneck of spatiotemporal throughput rate. Our main contribution in this paper is the quality and the speed of iterative compressed image recovery algorithm based on a Block Sparse Code (Baranuick et al, IEEE/IT 2008). As a result, we achieved real-time wireless dynamic measurement of EEG brainwaves, matching well with traditionally tethered high density EEG.

  10. Algoritmi matematici nelle lettere di Gerbert

    Science.gov (United States)

    Rossi, P.

    The content of Gerbert's "scientific" letters is analyzed in detail, with special emphasis on arithmetical and geometrical issues, such as multiplication and division rules related to the use of abacus, superparticular numbers and evaluation of the area of an equilateral triangle. It is shown that Gerbert's area formula, albeit based on rational fractions, could hardly be conceived without knowledge of Pythagoras' theorem. This fact casts a light also on the astronomical tools created by Gerbert, where the didactical aspect cannot be separated from the accuracy of the demonstrations and of the measurements.

  11. The Jamaica Letter and its intellectual genealogy

    Directory of Open Access Journals (Sweden)

    Germán A. de la Reza

    2018-01-01

    Full Text Available ABSTRACT One of the fundamental objectives of The Jamaica Letter is the reflection on the features that should have the international order after the fall of the Spanish Empire. For its organization, Simon Bolívar appeals to the amphictyonic assemblies of classical Greece and invokes the Pan-European project of the Abbe Saint Pierre. This article traces the documentary sources from which Bolivar derives his notion of confederal union and inspires the unions treaties from 1822 to 1826.

  12. Energies and raw materials. Letter n.28

    International Nuclear Information System (INIS)

    2007-01-01

    This letter of the DGEMP (General Direction of the Energy and the Raw Materials) deals with the following four main topics: the main recommendations of the final report of the working Group ''Factor 4'' concerning the energy policy; the energy conservation certificates as a tool of the energy control with their implication in the residential and ternary sector; the increase of the solar water heaters and heat pumps sales thanks to the tax credits; the California example facing the climatic change and the energy policy. (A.L.B.)

  13. Resource Letter OSE-1: Observing Solar Eclipses

    Science.gov (United States)

    Pasachoff, Jay M.; Fraknoi, Andrew

    2017-07-01

    This Resource Letter provides a guide to the available literature, listing selected books, articles, and online resources about scientific, cultural, and practical issues related to observing solar eclipses. It is timely, given that a total solar eclipse will cross the continental United States on August 21, 2017. The next total solar eclipse path crossing the U.S. and Canada will be on April 8, 2024. In 2023, the path of annularity of an annular eclipse will cross Mexico, the United States, and Canada, with partial phases visible throughout those countries.

  14. Subsurface Event Detection and Classification Using Wireless Signal Networks

    Directory of Open Access Journals (Sweden)

    Muhannad T. Suleiman

    2012-11-01

    Full Text Available Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs. The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  15. Subsurface event detection and classification using Wireless Signal Networks.

    Science.gov (United States)

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T

    2012-11-05

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  16. Microwave materials for wireless applications

    CERN Document Server

    Cruickshank, David B

    2011-01-01

    This practical resource offers you an in-depth, up-to-date understanding of the use of microwave magnetic materials for cutting-edge wireless applications. The book discusses device applications used in wireless infrastructure base stations, point-to-point radio links, and a range of more specialized microwave systems. You find detailed discussions on the attributes of each family of magnetic materials with respect to specific wireless applications. Moreover, the book addresses two of the hottest topics in the field today - insertion loss and intermodulation. This comprehensive reference also

  17. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  18. Structural processing for wireless communications

    CERN Document Server

    Lu, Jianhua; Ge, Ning

    2015-01-01

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  19. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  20. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  1. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    Science.gov (United States)

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  2. Site-Specific Study of In-Building Wireless Solutions with Poisson Traffic

    DEFF Research Database (Denmark)

    Liu, Zhen; Sørensen, Troels Bundgaard; Mogensen, Preben

    2011-01-01

    Due to the poor outdoor-to-indoor propagation into buildings, dedicated wireless systems installed inside the buildings is often preferred for providing indoor users with high-data-rate services. We study the typical in-building wireless solutions - distributed antenna system and small cell Femto...... system - together with another multi-cell system using our proposed centralized scheduling scheme. In our previous work, their performance is evaluated and compared in the LTE downlink context with full buffer traffic. Compared to real mobile networks, the full buffer traffic model is usually a worst...

  3. RF and microwave engineering fundamentals of wireless communications

    CERN Document Server

    Gustrau, Frank

    2012-01-01

    This book provides a fundamental and practical introduction to radio frequency and microwave engineering and physical aspects of wireless communication In this book, the author addresses a wide range of radio-frequency and microwave topics with emphasis on physical aspects including EM and voltage waves, transmission lines, passive circuits, antennas, radio wave propagation. Up-to-date RF design tools like RF circuit simulation, EM simulation and computerized smith charts, are used in various examples to demonstrate how these methods can be applied effectively in RF engineering

  4. Wireless data transfer in saliniferous formations; Kabellose Datenuebertragung im Salinar

    Energy Technology Data Exchange (ETDEWEB)

    Wilsnack, T.; Grafe, F. [IBeWa-Ingenieurpartnerschaft, Freiberg (Germany); Roessel, A. [RCS-Technik, Freiberg (Germany)

    2012-07-01

    The metrological surveillance of processes and long-term monitoring is an important requirement for closed mines or radioactive waste repositories. The available measuring technology is usually based on electrical power supply using existing underground power network. This is in contradiction with the targeted sealing of the monitored mine caverns and/or the integrity of hydraulic barriers. The authors developed a concept of wireless data transfer based on the radio wave propagation in mostly dry saliniferous formations. The system was tests at several reference sites.

  5. Entropy Rate of Time-Varying Wireless Networks

    DEFF Research Database (Denmark)

    Cika, Arta; Badiu, Mihai Alin; Coon, Justin P.

    2018-01-01

    In this paper, we present a detailed framework to analyze the evolution of the random topology of a time-varying wireless network via the information theoretic notion of entropy rate. We consider a propagation channel varying over time with random node positions in a closed space and Rayleigh...... fading affecting the connections between nodes. The existence of an edge between two nodes at given locations is modeled by a Markov chain, enabling memory effects in network dynamics. We then derive a lower and an upper bound on the entropy rate of the spatiotemporal network. The entropy rate measures...

  6. Performance analysis of LDPC codes on OOK terahertz wireless channels

    International Nuclear Information System (INIS)

    Liu Chun; Wang Chang; Cao Jun-Cheng

    2016-01-01

    Atmospheric absorption, scattering, and scintillation are the major causes to deteriorate the transmission quality of terahertz (THz) wireless communications. An error control coding scheme based on low density parity check (LDPC) codes with soft decision decoding algorithm is proposed to improve the bit-error-rate (BER) performance of an on-off keying (OOK) modulated THz signal through atmospheric channel. The THz wave propagation characteristics and channel model in atmosphere is set up. Numerical simulations validate the great performance of LDPC codes against the atmospheric fading and demonstrate the huge potential in future ultra-high speed beyond Gbps THz communications. (paper)

  7. ERP correlates of letter identity and letter position are modulated by lexical frequency

    Science.gov (United States)

    Vergara-Martínez, Marta; Perea, Manuel; Gómez, Pablo; Swaab, Tamara Y.

    2013-01-01

    The encoding of letter position is a key aspect in all recently proposed models of visual-word recognition. We analyzed the impact of lexical frequency on letter position assignment by examining the temporal dynamics of lexical activation induced by pseudowords extracted from words of different frequencies. For each word (e.g., BRIDGE), we created two pseudowords: A transposed-letter (TL: BRIGDE) and a replaced-letter pseudoword (RL: BRITGE). ERPs were recorded while participants read words and pseudowords in two tasks: Semantic categorization (Experiment 1) and lexical decision (Experiment 2). For high-frequency stimuli, similar ERPs were obtained for words and TL-pseudowords, but the N400 component to words was reduced relative to RL-pseudowords, indicating less lexical/semantic activation. In contrast, TL- and RL-pseudowords created from low-frequency stimuli elicited similar ERPs. Behavioral responses in the lexical decision task paralleled this asymmetry. The present findings impose constraints on computational and neural models of visual-word recognition. PMID:23454070

  8. Open letter to Mr Christian Bataille, Deputy of Nord region, France. Open letter on nuclear energy

    International Nuclear Information System (INIS)

    Delacroix P

    2007-02-01

    The author, by means of a letter to the deputy Christian Bataille, presents arguments to the shutdown of old nuclear power plants. He points out the environmental and economical arguments in favor of a decrease of the nuclear power use in France. (A.L.B.)

  9. Letter report: Cold crucible melter assessment

    International Nuclear Information System (INIS)

    Elliott, M.L.

    1996-03-01

    One of the activities of the PNL Vitrification Technology Development (PVTD) Project is to assist the Tank Waste Remediation Systems (TWRS) Program in determining which melter systems should be performance tested for potential implementation in the high-level waste (HLW) vitrification plant. The Richland Operations Office (RL) has recommended that the Cold Crucible Melter (CCM) be evaluated as a candidate ''next generation'' melter. As a result, the CCM System Evaluation cost account was established under the PVTD Project so that the CCM could be initially assessed on a high-priority basis. This letter report summarizes a brief initial review and assessment of the CCM. Using the recommendations made in this document, Westinghouse Hanford Company (WHC) and RL will make a decision regarding the urgency of performance testing the CCM. If the decision is favorable, a subcontract will be negotiated for performance testing of a CCM using Hanford HLW simulants in a pilot-scale facility. Because of the aggressive nature of the schedule, the CCM evaluation was not rigorous. The evaluation consisted of a literature review and interviews with proponents of the technology during a recent trip to France. This letter report summarizes the evaluation and makes recommendations regarding further work in this area

  10. Resource letter SH-1: superfluid helium

    International Nuclear Information System (INIS)

    Hallock, R.B.

    1982-01-01

    The resource letter covers the general subject of superfluid helium and treats 3 He and 3 He-- 4 He mixtures as well as 4 He. No effort has been made to include the fascinating experiments on either solid helium or the equally fascinating work on adsorbed helium where the helium coverage is below that necessary for superfluidity. An earlier resource letter by C. T. Lane [Am. J. Phys. 35, 367 (1967)] may be consulted for additional comments on some of the cited earlier manuscripts, but the present work is self-contained and may be used independently. Many high-quality research reports have not been cited here. Rather, the author has tried in most cases to include works particularly readable or relevant. There is a relatively heavy emphasis on experimental references. The primary reason is that these works tend to be more generally readable. No doubt some works that might have been included, have not, and for this the author takes responsibility with apology. Articles selected for incorporation in a reprint volume (to be published separately by the American Association of Physics Teachers) are marked with an asterisk(*). Following each referenced work the general level of difficulty is indicated by E, I, or A for elementary, intermediate, or advanced

  11. African Journals Online: Browse Alphabetically -- letter B

    African Journals Online (AJOL)

    Items 1 - 9 of 9 ... Also, areas of Laboratory Science, Technology, Mathematical Sciences, Microbiology, Physics, Medical Sciences and Zoology form part of the contents of the Journal. Scientists in the academia, research institutes and industries are therefore encouraged to participate actively in the propagation of their works ...

  12. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...

  13. Propagation of waves

    CERN Document Server

    David, P

    2013-01-01

    Propagation of Waves focuses on the wave propagation around the earth, which is influenced by its curvature, surface irregularities, and by passage through atmospheric layers that may be refracting, absorbing, or ionized. This book begins by outlining the behavior of waves in the various media and at their interfaces, which simplifies the basic phenomena, such as absorption, refraction, reflection, and interference. Applications to the case of the terrestrial sphere are also discussed as a natural generalization. Following the deliberation on the diffraction of the "ground? wave around the ear

  14. Ultrasonic wireless health monitoring

    Science.gov (United States)

    Petit, Lionel; Lefeuvre, Elie; Guyomar, Daniel; Richard, Claude; Guy, Philippe; Yuse, Kaori; Monnier, Thomas

    2006-03-01

    The integration of autonomous wireless elements in health monitoring network increases the reliability by suppressing power supplies and data transmission wiring. Micro-power piezoelectric generators are an attractive alternative to primary batteries which are limited by a finite amount of energy, a limited capacity retention and a short shelf life (few years). Our goal is to implement such an energy harvesting system for powering a single AWT (Autonomous Wireless Transmitter) using our SSH (Synchronized Switch Harvesting) method. Based on a non linear process of the piezoelement voltage, this SSH method optimizes the energy extraction from the mechanical vibrations. This AWT has two main functions : The generation of an identifier code by RF transmission to the central receiver and the Lamb wave generation for the health monitoring of the host structure. A damage index is derived from the variation between the transmitted wave spectrum and a reference spectrum. The same piezoelements are used for the energy harvesting function and the Lamb wave generation, thus reducing mass and cost. A micro-controller drives the energy balance and synchronizes the functions. Such an autonomous transmitter has been evaluated on a 300x50x2 mm 3 composite cantilever beam. Four 33x11x0.3 mm 3 piezoelements are used for the energy harvesting and for the wave lamb generation. A piezoelectric sensor is placed at the free end of the beam to track the transmitted Lamb wave. In this configuration, the needed energy for the RF emission is 0.1 mJ for a 1 byte-information and the Lamb wave emission requires less than 0.1mJ. The AWT can harvested an energy quantity of approximately 20 mJ (for a 1.5 Mpa lateral stress) with a 470 μF storage capacitor. This corresponds to a power density near to 6mW/cm 3. The experimental AWT energy abilities are presented and the damage detection process is discussed. Finally, some envisaged solutions are introduced for the implementation of the required data

  15. An Improved Split-Step Wavelet Transform Method for Anomalous Radio Wave Propagation Modelling

    Directory of Open Access Journals (Sweden)

    A. Iqbal

    2014-12-01

    Full Text Available Anomalous tropospheric propagation caused by ducting phenomenon is a major problem in wireless communication. Thus, it is important to study the behavior of radio wave propagation in tropospheric ducts. The Parabolic Wave Equation (PWE method is considered most reliable to model anomalous radio wave propagation. In this work, an improved Split Step Wavelet transform Method (SSWM is presented to solve PWE for the modeling of tropospheric propagation over finite and infinite conductive surfaces. A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM and Split-Step Fourier transform Method (SSFM. A very good agreement is found between SSWM and published techniques. It is also observed that the proposed algorithm is about 18 times faster than WGM and provide more details of propagation effects as compared to SSFM.

  16. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  17. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  18. Wireless Damage Location Sensing System

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  19. Wireless sensor network adaptive cooling

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, T. [SynapSense Corp., Folsom, CA (United States)

    2009-07-01

    Options for reducing data centre cooling energy requirements and their cost savings were discussed with particular reference to a wireless control solution developed by SynapSense Corporation. The wireless sensor network reduces cooling energy use at data centres by providing improved air flow management through the installation of cold aisle containment. The use of this low cost, non-invasive wireless sensor network has reduced the cooling energy use in a data center at BC Hydro by 30 per cent. The system also reduced the server and storage fan energy by 3 per cent by maintaining inlet air temperature below ASHRAE recommended operating range. The distribution of low power, low cost wireless sensors has enabled visualization tools that are changing the way that data centres are managed. The annual savings have been estimated at 4,560,000 kWh and the annual carbon dioxide abatement is approximately 1,400 metric tons. tabs., figs.

  20. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  1. Implied reading direction and prioritization of letter encoding.

    Science.gov (United States)

    Holcombe, Alex O; Nguyen, Elizabeth H L; Goodbourn, Patrick T

    2017-10-01

    Capacity limits hinder processing of multiple stimuli, contributing to poorer performance for identifying two briefly presented letters than for identifying a single letter. Higher accuracy is typically found for identifying the letter on the left, which has been attributed to a right-hemisphere dominance for selective attention. Here, we use rapid serial visual presentation (RSVP) of letters in two locations at once. The letters to be identified are simultaneous and cued by rings. In the first experiment, we manipulated implied reading direction by rotating or mirror-reversing the letters to face to the left rather than to the right. The left-side performance advantage was eliminated. In the second experiment, letters were positioned above and below fixation, oriented such that they appeared to face downward (90° clockwise rotation) or upward (90° counterclockwise rotation). Again consistent with an effect of implied reading direction, performance was better for the top position in the downward condition, but not in the upward condition. In both experiments, mixture modeling of participants' report errors revealed that attentional sampling from the two locations was approximately simultaneous, ruling out the theory that the letter on one side was processed first, followed by a shift of attention to sample the other letter. Thus, the orientation of the letters apparently controls not when the letters are sampled from the scene, but rather the dynamics of a subsequent process, such as tokenization or memory consolidation. Implied reading direction appears to determine the letter prioritized at a high-level processing bottleneck. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  3. Wireless power transfer system

    Science.gov (United States)

    Wu, Hunter; Sealy, Kylee; Gilchrist, Aaron

    2016-02-23

    A system includes a first stage of an inductive power transfer system with an LCL load resonant converter with a switching section, an LCL tuning circuit, and a primary receiver pad. The IPT system includes a second stage with a secondary receiver pad, a secondary resonant circuit, a secondary rectification circuit, and a secondary decoupling converter. The secondary receiver pad connects to the secondary resonant circuit. The secondary resonant circuit connects to the secondary rectification circuit. The secondary rectification circuit connects to the secondary decoupling converter. The second stage connects to a load. The load includes an energy storage element. The second stage and load are located on a vehicle and the first stage is located at a fixed location. The primary receiver pad wirelessly transfers power to the secondary receiver pad across a gap when the vehicle positions the secondary receiver pad with respect to the primary receiver pad.

  4. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  5. Wireless data link for FBTR

    International Nuclear Information System (INIS)

    Sundararajan, M.K.; Prabhakara Rao, G.; Ilango Sambasivan, S.; Swaminathan, P.; Ramakrishna, P.V.

    2004-01-01

    This paper deals with the design and development of a wireless data link for transmission of block pile signals at the Fast Breeder Test Reactor (FBTR) of Indira Gandhi Center for Atomic Research (IGCAR). This link is to establish wireless connectivity, typically at RS232C rates, over distances of the order of 50 m, and is expected to operate under electrically hostile conditions. (author)

  6. Wireless Sensor Network Safety Study

    OpenAIRE

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  7. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  8. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  9. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  10. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  11. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  12. Propagation environments [Chapter 4

    Science.gov (United States)

    Douglass F. Jacobs; Thomas D. Landis; Tara Luna

    2009-01-01

    An understanding of all factors influencing plant growth in a nursery environment is needed for the successful growth and production of high-quality container plants. Propagation structures modify the atmospheric conditions of temperature, light, and relative humidity. Native plant nurseries are different from typical horticultural nurseries because plants must be...

  13. Uncertainty Propagation in OMFIT

    Science.gov (United States)

    Smith, Sterling; Meneghini, Orso; Sung, Choongki

    2017-10-01

    A rigorous comparison of power balance fluxes and turbulent model fluxes requires the propagation of uncertainties in the kinetic profiles and their derivatives. Making extensive use of the python uncertainties package, the OMFIT framework has been used to propagate covariant uncertainties to provide an uncertainty in the power balance calculation from the ONETWO code, as well as through the turbulent fluxes calculated by the TGLF code. The covariant uncertainties arise from fitting 1D (constant on flux surface) density and temperature profiles and associated random errors with parameterized functions such as a modified tanh. The power balance and model fluxes can then be compared with quantification of the uncertainties. No effort is made at propagating systematic errors. A case study will be shown for the effects of resonant magnetic perturbations on the kinetic profiles and fluxes at the top of the pedestal. A separate attempt at modeling the random errors with Monte Carlo sampling will be compared to the method of propagating the fitting function parameter covariant uncertainties. Work supported by US DOE under DE-FC02-04ER54698, DE-FG2-95ER-54309, DE-SC 0012656.

  14. The Weinberg propagators

    International Nuclear Information System (INIS)

    Dvoeglazov, V.V.

    1997-01-01

    An analog of the j = 1/2 Feynman-Dyson propagator is presented in the framework of the j = 1 Weinberg's theory. The basis for this construction is the concept of the Weinberg field as a system of four field functions differing by parity and by dual transformations. (orig.)

  15. UWB Propagation through Walls

    Czech Academy of Sciences Publication Activity Database

    Schejbal, V.; Bezoušek, P.; Čermák, D.; NĚMEC, Z.; Fišer, Ondřej; Hájek, M.

    2006-01-01

    Roč. 15, č. 1 (2006), s. 17-24 ISSN 1210-2512 R&D Projects: GA MPO(CZ) FT-TA2/030 Institutional research plan: CEZ:AV0Z30420517 Keywords : Ultra wide band * UWB antennas * UWB propagation * multipath effects Subject RIV: JB - Sensors, Measurment, Regulation

  16. Tropical Cyclone Propagation

    National Research Council Canada - National Science Library

    Gray, William

    1994-01-01

    This paper discusses the question of tropical cyclone propagation or why the average tropical cyclone moves 1-2 m/s faster and usually 10-20 deg to the left of its surrounding (or 5-7 deg radius) deep layer (850-300 mb) steering current...

  17. Underwater wireless communication system

    International Nuclear Information System (INIS)

    Goh, J H; Shaw, A; Al-Shamma'a, A I

    2009-01-01

    Underwater communication has a range of applications including remotely operated vehicle (ROV) and autonomous underwater vehicle (AUV) communication and docking in the offshore industry. Current underwater transmission techniques is primarily utilise sound waves for large distance at lower frequencies and the velocity of sound in water is approximately 1500m/s the resultant communications have problems with multi-path propagation and low bandwidth problems. The use of electromagnetic (EM) techniques underwater has largely been overlooked because of the attenuation due to the conductivity of seawater. However, for short range applications, the higher frequencies and much higher velocity can prove advantageous. This paper will outline a project which will utilise recent investigations that demonstrate EM wave propagation up to the MHz frequency range is possible in seawater.

  18. A MIMO-OFDM Testbed for Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Conrat Jean-Marc

    2006-01-01

    Full Text Available We describe the design steps and final implementation of a MIMO OFDM prototype platform developed to enhance the performance of wireless LAN standards such as HiperLAN/2 and 802.11, using multiple transmit and multiple receive antennas. We first describe the channel measurement campaign used to characterize the indoor operational propagation environment, and analyze the influence of the channel on code design through a ray-tracing channel simulator. We also comment on some antenna and RF issues which are of importance for the final realization of the testbed. Multiple coding, decoding, and channel estimation strategies are discussed and their respective performance-complexity trade-offs are evaluated over the realistic channel obtained from the propagation studies. Finally, we present the design methodology, including cross-validation of the Matlab, C++, and VHDL components, and the final demonstrator architecture. We highlight the increased measured performance of the MIMO testbed over the single-antenna system.

  19. Wireless distributed functional electrical stimulation system

    Directory of Open Access Journals (Sweden)

    Jovičić Nenad S

    2012-08-01

    Full Text Available Abstract Background The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. Methods The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype’s software. Results The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers. One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. Conclusions The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  20. Wireless distributed functional electrical stimulation system.

    Science.gov (United States)

    Jovičić, Nenad S; Saranovac, Lazar V; Popović, Dejan B

    2012-08-09

    The control of movement in humans is hierarchical and distributed and uses feedback. An assistive system could be best integrated into the therapy of a human with a central nervous system lesion if the system is controlled in a similar manner. Here, we present a novel wireless architecture and routing protocol for a distributed functional electrical stimulation system that enables control of movement. The new system comprises a set of miniature battery-powered devices with stimulating and sensing functionality mounted on the body of the subject. The devices communicate wirelessly with one coordinator device, which is connected to a host computer. The control algorithm runs on the computer in open- or closed-loop form. A prototype of the system was designed using commercial, off-the-shelf components. The propagation characteristics of electromagnetic waves and the distributed nature of the system were considered during the development of a two-hop routing protocol, which was implemented in the prototype's software. The outcomes of this research include a novel system architecture and routing protocol and a functional prototype based on commercial, off-the-shelf components. A proof-of-concept study was performed on a hemiplegic subject with paresis of the right arm. The subject was tasked with generating a fully functional palmar grasp (closing of the fingers). One node was used to provide this movement, while a second node controlled the activation of extensor muscles to eliminate undesired wrist flexion. The system was tested with the open- and closed-loop control algorithms. The system fulfilled technical and application requirements. The novel communication protocol enabled reliable real-time use of the system in both closed- and open-loop forms. The testing on a patient showed that the multi-node system could operate effectively to generate functional movement.

  1. Open Letter to the European Commission

    DEFF Research Database (Denmark)

    Savin, Andrej; Schwemer, Sebastian Felix

    2016-01-01

    to the information society. A key component of this acquis is the prohibition of general monitoring obligations to the benefit of providers of intermediary services. It is a means to achieve at least two central objectives: the encouragement of innovation as well as the protection of fundamental rights of all...... Internet users, namely the rights protected by Articles 8 and 11 of the European Convention of Human Rights. Yet, the proposed Copyright Directive, in particular, seems to negatively affect both the domain and effect of Article 15 of the E-commerce Directive. The signatories of this open letter therefore...... urge the European Commission to take into account the human rights dimension of Article 15 of the E-commerce Directive, as made explicit by the Court of the Justice of the European Union, and to make sure its implications are carefully examined across sectors. Authors: Sophie Stalla-Bourdillon Eleonora...

  2. Commentary to the Letter of Robert Arasimowicz

    Directory of Open Access Journals (Sweden)

    Agnieszka Rosa

    2015-05-01

    Full Text Available The author in his letter to the editor presents his own vision of carrying out archives’ tasks that arise from the public principle of archives. He is concerned especially with stagnation and passive role of archives in promoting their collections. To justify his theses the author conducted a survey among a group of his friends. He asked them four questions that tested their knowledge of archives and archival collections. Answers proved earlier conjectures to be true and were similar to the author’s experience; they showed that the society has poor knowledge of archives and their collections. The author proposed some general solutions, referring especially to actions taken by museums.

  3. Letter contrast sensitivity function of the eye.

    Science.gov (United States)

    Liou, H L; Brennan, N A

    1998-06-01

    To provide empirical data of letter CSF for various levels of defocus under controlled conditions of luminance and age. Corrected distance visual acuities were tested at different levels of contrast and defocus. An experiment was conducted using the Medmont visual acuity tester on 10 young subjects and under normal room lighting. Empirical data of visual acuity were obtained for 7 levels of contrast (5, 10, 15, 25, 40, 60, 80%) and defocus levels of 0, +1 and +2D. A mathematical model was derived (R2=0.995) and this can be used to estimate visual acuity at various contrast levels for defocus of < or =+2D. This information is useful for the clinician as normative data and for further development of optical models to predict visual performance of the eye.

  4. Maker of patterns an autobiography through letters

    CERN Document Server

    Dyson, Freeman

    2018-01-01

    While recognizing that quantum mechanics demands serious attention, Albert Einstein in 1926 admonished fellow physicist Max Born that the theory does not bring us closer to the secrets of the Old One. Aware that there are deep mysteries that Nature intends to keep for herself, Freeman Dyson, the 94-year-old theoretical physicist, has nonetheless chronicled the stories of those who were engaged in solving some of the most challenging quandaries of twentieth-century physics. Written between 1940and the early 1980s, these letters to relatives form an historic account of modern science and its greatest players, including J.Robert Oppenheimer, Richard Feynman, Stephen Hawking,and Hans Bethe. Whether reflecting on the horrors of World War II, the moral dilemmas of nuclear development, the challenges of the space program, or the considerable demands of raising six children, Dyson offers a firsthand account of one of the greatest periods of scientific discovery of our modern age.

  5. Study on the Effect of Frequency on Conductivity of Underground Strata in Coal Mine Through-the-earth Wireless Communication

    Directory of Open Access Journals (Sweden)

    Jinyi TAO

    2014-09-01

    Full Text Available The relationship of conductivity and the frequency, which is of decisive significance in through-the-earth wireless communication in coal mine, is closely related to the options of frequency range in coal mine wireless communication. When through-the-earth wireless communication is applied, the electromagnetic waves need to spread in the semi-conductive medium rocks. The main factors affecting the electromagnetic wave propagation in rocks is the rock strata electromagnetic parameters. These parameters are magnetic permeability m (H/m, dielectric constant e (F/m and electrical conductivity s (S/m. In these parameters, electrical conductivity is not constant. Under the influence of various factors, it will be great changes. This paper, for the specific circumstances of coal mine rock, discuses and conduct dada mining the effect frequency on the electrical conductivity of underground rock in coal mine with through-the-earth wireless communication.

  6. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  7. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  8. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  9. Wireless Connectivity to ATM Communication Grid

    National Research Council Canada - National Science Library

    Rajaravivarma, Veeramuthu

    1998-01-01

    The AFOSR funds were used to purchase a 12 port Fore ATM switch, ATM network interface cards, a SUN UltraSPARC workstation, Lucent WavePoint wireless bridge, and Lucent WaveLAN wireless network interface cards...

  10. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  11. Energy efficiency in future wireless broadband networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2012-10-01

    Full Text Available greener economy and environment. In this research, we investigate the concept of green radio communications in wireless networks and discuss approaches for energy efficient solutions in wireless broadband network deployments. These solutions include...

  12. REVIEW OF WIRELESS MIMO CHANNEL MODELS

    African Journals Online (AJOL)

    user

    MIMO wireless system, the transmitted signal interacts ... delay spread information, power delay profile, angle of arrival and ... With the advent of the MIMO wireless systems, there arose a ..... associated with channel transmission and reception.

  13. DISA Wireless E-Mail Trial

    National Research Council Canada - National Science Library

    Haney, Steven

    1997-01-01

    .... Correspondingly unique wireless modems were obtained and mated to the PCMCIA slot of notebook computers in the user/evaluation population, consisting of InfoTac and Mobedem wireless modems for use...

  14. Kali Linux wireless penetration testing beginner's guide

    CERN Document Server

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  15. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-01-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users

  16. Electric Vehicle and Wireless Charging Laboratory

    Science.gov (United States)

    2018-03-23

    Wireless charging tests of electric vehicles (EV) have been conducted at the EVTC Wireless Laboratory located at the Florida Solar Energy Center, Cocoa, FL. These tests were performed to document testing protocols, evaluate standards and evaluate ope...

  17. Propagator of stochastic electrodynamics

    International Nuclear Information System (INIS)

    Cavalleri, G.

    1981-01-01

    The ''elementary propagator'' for the position of a free charged particle subject to the zero-point electromagnetic field with Lorentz-invariant spectral density proportionalω 3 is obtained. The nonstationary process for the position is solved by the stationary process for the acceleration. The dispersion of the position elementary propagator is compared with that of quantum electrodynamics. Finally, the evolution of the probability density is obtained starting from an initial distribution confined in a small volume and with a Gaussian distribution in the velocities. The resulting probability density for the position turns out to be equal, to within radiative corrections, to psipsi* where psi is the Kennard wave packet. If the radiative corrections are retained, the present result is new since the corresponding expression in quantum electrodynamics has not yet been found. Besides preceding quantum electrodynamics for this problem, no renormalization is required in stochastic electrodynamics

  18. Preventing Unofficial Information Propagation

    Science.gov (United States)

    Le, Zhengyi; Ouyang, Yi; Xu, Yurong; Ford, James; Makedon, Fillia

    Digital copies are susceptible to theft and vulnerable to leakage, copying, or manipulation. When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagation problem of digital credentials, which may contain sensitive information about a credential holder. Existing work such as access control policies and the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.

  19. Letter position coding across modalities: the case of Braille readers.

    Directory of Open Access Journals (Sweden)

    Manuel Perea

    Full Text Available The question of how the brain encodes letter position in written words has attracted increasing attention in recent years. A number of models have recently been proposed to accommodate the fact that transposed-letter stimuli like jugde or caniso are perceptually very close to their base words.Here we examined how letter position coding is attained in the tactile modality via Braille reading. The idea is that Braille word recognition may provide more serial processing than the visual modality, and this may produce differences in the input coding schemes employed to encode letters in written words. To that end, we conducted a lexical decision experiment with adult Braille readers in which the pseudowords were created by transposing/replacing two letters.We found a word-frequency effect for words. In addition, unlike parallel experiments in the visual modality, we failed to find any clear signs of transposed-letter confusability effects. This dissociation highlights the differences between modalities.The present data argue against models of letter position coding that assume that transposed-letter effects (in the visual modality occur at a relatively late, abstract locus.

  20. Teaching Braille Letters, Numerals, Punctuation, and Contractions to Sighted Individuals

    Science.gov (United States)

    Putnam, Brittany C.; Tiger, Jeffrey H.

    2015-01-01

    Braille-character recognition is one of the foundational skills required for teachers of braille. Prior research has evaluated computer programming for teaching braille-to-print letter relations (e.g., Scheithauer & Tiger, 2012). In the current study, we developed a program (the Visual Braille Trainer) to teach not only letters but also…

  1. Letter position coding across modalities: the case of Braille readers.

    Science.gov (United States)

    Perea, Manuel; García-Chamorro, Cristina; Martín-Suesta, Miguel; Gómez, Pablo

    2012-01-01

    The question of how the brain encodes letter position in written words has attracted increasing attention in recent years. A number of models have recently been proposed to accommodate the fact that transposed-letter stimuli like jugde or caniso are perceptually very close to their base words. Here we examined how letter position coding is attained in the tactile modality via Braille reading. The idea is that Braille word recognition may provide more serial processing than the visual modality, and this may produce differences in the input coding schemes employed to encode letters in written words. To that end, we conducted a lexical decision experiment with adult Braille readers in which the pseudowords were created by transposing/replacing two letters. We found a word-frequency effect for words. In addition, unlike parallel experiments in the visual modality, we failed to find any clear signs of transposed-letter confusability effects. This dissociation highlights the differences between modalities. The present data argue against models of letter position coding that assume that transposed-letter effects (in the visual modality) occur at a relatively late, abstract locus.

  2. Pirates at Parties: Letter Position Processing in Developing Readers

    Science.gov (United States)

    Kohnen, Saskia; Castles, Anne

    2013-01-01

    There has been much recent interest in letter position coding in adults, but little is known about the development of this process in children learning to read. Here, the letter position coding abilities of 127 children in Grades 2, 3, and 4 (aged 7-10 years) were examined by comparing their performance in reading aloud "migratable" words (e.g.,…

  3. Letters to a Young Baller: Exploring Epistolary Criticism

    Science.gov (United States)

    Chawansky, Megan

    2010-01-01

    This article explores the possibilities of epistolary criticism within the realm of sport studies and aspires to encourage scholars to consider the use of non-traditional sport memorabilia and source materials when telling emotive stories about sport and sport practices. The use of letters and the letter-writing format to tell a personal narrative…

  4. Analyzing International Letters in a Business Communication Class.

    Science.gov (United States)

    Devet, Bonnie

    1998-01-01

    Shows how students can use persuasive principles of communication (format and writer's purpose) and of classical rhetoric (organization, ethos, pathos, logos, and style) to improve their ability to analyze business letters. Shows how applying these principles to the analysis of business letters from other countries helps students write better and…

  5. Scientific Letter: Stabbing nails into the neck: an unusual self ...

    African Journals Online (AJOL)

    Scientific Letter: Stabbing nails into the neck: an unusual self-damaging behavior mandating neurosurgery. A Aghabiklooei, R Aghabiklooei, N Zamani. Abstract. Scientific Letter - No Abstract Available. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  6. The Syntax of Persuasion: Two Business Letters of Request.

    Science.gov (United States)

    Limaye, Mohan R.

    1983-01-01

    Business letter-writers are advised to develop reader empathy and benefit before they ask a favor. The author analyzed two model 16th century letters of request to determine if similar advice was given in the past, and found that the request was subordinate to building a mutually beneficial relationship. (PD)

  7. 22 CFR 201.71 - Terms of letters of credit.

    Science.gov (United States)

    2010-04-01

    ... shall not be inconsistent with or contrary to the terms of the letter of commitment. Any such letter of credit or agreement may be modified or extended at any time in such a manner and to such extent as is acceptable to the approved applicant and the bank: Provided, That such modification or extension may not be...

  8. Why Doctors Do Not Answer Referral Letters | Smith | South African ...

    African Journals Online (AJOL)

    Background: Healthcare workers at primary healthcare (PHC) clinics are frustrated by the fact that they do not receive replies to their referral letters to doctors. Referral letters act as permission slips to allow patients easy access to treatment by specialists at secondary and tertiary service levels and communicate reasons for ...

  9. Referral letters to the psychiatrist in Nigeria: is communication ...

    African Journals Online (AJOL)

    Result: A majority (>80%) of the referral letters had no information on the current medication list, relevant psychosocial history, outline of management to date, results of investigations to date, and known allergies. Conclusion: Deficits in communication or information transfer through referral letters to the psychiatrist are ...

  10. Intertextuality in Ba's So Long a Letter and Umunnakwe's Dear ...

    African Journals Online (AJOL)

    Intertextuality takes for granted the interdependence of literary texts because every artistic creation is a re-echoing of past knowledge. Mariama Ba's So Long A Letter and Ndubisi Umunnakwe's Dear Ramatoulaye are African examples. This work examines how Ba's So Long A Letter intertextualises with Umunnakwe's Dear ...

  11. Mud, Blood, and Bullet Holes: Teaching History with War Letters

    Science.gov (United States)

    Carroll, Andrew

    2013-01-01

    From handwritten letters of the American Revolution to typed emails from Iraq and Afghanistan, correspondence from U.S. troops offers students deep insight into the specific conflicts and experiences of soldiers. Over 100,000 correspondences have been donated to the Legacy Project, a national initiative launched in 1998 to preserve war letters by…

  12. Referral letters to the psychiatrist in Nigeria: is communication ...

    African Journals Online (AJOL)

    history, may not be elements that non-psychiatrist phy- sicians routinely collect during their examinations and, therefore, one would not expect such information to be available to be included in referral letters. Conclusion. Deficits in communication or information transfer through referral letters to the psychiatrist are common.

  13. 50 CFR 216.257 - Letters of Authorization.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.257 Letters of Authorization. (a) A Letter of Authorization, unless suspended or revoked...

  14. 50 CFR 216.258 - Renewal of Letters of Authorization.

    Science.gov (United States)

    2010-10-01

    ... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.258 Renewal of Letters of Authorization. (a) A Letter of Authorization...

  15. Open letter to EU Commission about proposed EDC Criteria

    DEFF Research Database (Denmark)

    Ågerstrand, Marlene; Bero, Lisa; Beronius, Anna

    2016-01-01

    Open letter in response to the proposed criteria for identification and regulation of endocrine disrupting chemicals, under the PPP and Biocides Regulations......Open letter in response to the proposed criteria for identification and regulation of endocrine disrupting chemicals, under the PPP and Biocides Regulations...

  16. Professional Citation Practices in Child Maltreatment Forensic Letters

    Science.gov (United States)

    Schryer, Catherine F.; Bell, Stephanie; Mian, Marcellina; Spafford, Marlee M.; Lingard, Lorelei

    2011-01-01

    Using rhetorical genre theory and research on reported speech, this study investigates the citation practices in 81 forensic letters written by paediatricians and nurse practitioners that provide their opinion for the courts as to whether a child has experienced maltreatment. These letters exist in a complex social situation where a lack of…

  17. Experimental test of contemporary mathematical models of visual letter recognition.

    Science.gov (United States)

    Townsend, J T; Ashby, F G

    1982-12-01

    A letter confusion experiment that used brief durations manipulated payoffs across the four stimulus letters, which were composed of line segments equal in length. The observers were required to report the features they perceived as well as to give a letter response. The early feature-sampling process is separated from the later letter-decision process in the substantive feature models, and predictions are thus obtained for the frequencies of feature report as well as letter report. Four substantive visual feature-processing models are developed and tested against one another and against three models of a more descriptive nature. The substantive models predict the decisional letter report phase much better than they do the feature-sampling phase, but the best overall 4 X 4 letter confusion matrix fits are obtained with one of the descriptive models, the similarity choice model. The present and other recent results suggest that the assumption that features are sampled in a stochastically independent manner may not be generally valid. The traditional high-threshold conceptualization of feature sampling is also falsified by the frequent reporting by observers of features not contained in the stimulus letter.

  18. Pseudo-synesthesia through reading books with colored letters

    NARCIS (Netherlands)

    Colizoli, O.; Murre, J.M.J.; Rouw, R.

    2012-01-01

    Background Synesthesia is a phenomenon where a stimulus produces consistent extraordinary subjective experiences. A relatively common type of synesthesia involves perception of color when viewing letters (e.g. the letter ‘a’ always appears as light blue). In this study, we examine whether traits

  19. 7 CFR 1737.80 - Description of characteristics letter.

    Science.gov (United States)

    2010-01-01

    ... the amount of the proposed loan, its purposes, rate of interest, loan security requirements, and other... SERVICE, DEPARTMENT OF AGRICULTURE PRE-LOAN POLICIES AND PROCEDURES COMMON TO INSURED AND GUARANTEED TELECOMMUNICATIONS LOANS Characteristics Letter § 1737.80 Description of characteristics letter. (a) After all of the...

  20. 32 CFR 884.17 - Commander's instruction letter to member.

    Science.gov (United States)

    2010-07-01

    ... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...

  1. 40 CFR 280.99 - Letter of credit.

    Science.gov (United States)

    2010-07-01

    ... (UST) Financial Responsibility § 280.99 Letter of credit. (a) An owner or operator may satisfy the... brackets are to be replaced with the relevant information and the brackets deleted: Irrevocable Standby.... We certify that the wording of this letter of credit is identical to the wording specified in 40 CFR...

  2. Trends in the Employment Process: Resumes and Job Application Letters.

    Science.gov (United States)

    Spinks, Neld; Wells, Barron

    1999-01-01

    Surveys of Fortune 500 companies in 1978, 1985, and 1995 revealed trends and preferences in content of resumes and cover letters. Compared to earlier years, current preferences were for both letters and resumes in the initial contact, more emphasis on grammar and spelling, and acceptance of two-page resumes. (SK)

  3. Open Letter to Religious Leaders about Sex Education

    Science.gov (United States)

    American Journal of Sexuality Education, 2011

    2011-01-01

    The "Open Letter to Religious Leaders about Sex Education" reinforces scriptural and theological commitments to truth-telling in calling for "full and honest education about sexual and reproductive health." This "Open Letter" was published in 2002, at about the midpoint of a decade-long federal government commitment to…

  4. Jamming Attack in Wireless Sensor Network: From Time to Space

    Science.gov (United States)

    Sun, Yanqiang; Wang, Xiaodong; Zhou, Xingming

    Classical jamming attack models in the time domain have been proposed, such as constant jammer, random jammer, and reactive jammer. In this letter, we consider a new problem: given k jammers, how does the attacker minimize the pair-wise connectivity among the nodes in a Wireless Sensor Network (WSN)? We call this problem k-Jammer Deployment Problem (k-JDP). To the best of our knowledge, this is the first attempt at considering the position-critical jamming attack against wireless sensor network. We mainly make three contributions. First, we prove that the decision version of k-JDP is NP-complete even in the ideal situation where the attacker has full knowledge of the topology information of sensor network. Second, we propose a mathematical formulation based on Integer Programming (IP) model which yields an optimal solution. Third, we present a heuristic algorithm HAJDP, and compare it with the IP model. Numerical results show that our heuristic algorithm is computationally efficient.

  5. Prediction of transmission distortion for wireless video communication: analysis.

    Science.gov (United States)

    Chen, Zhifeng; Wu, Dapeng

    2012-03-01

    Transmitting video over wireless is a challenging problem since video may be seriously distorted due to packet errors caused by wireless channels. The capability of predicting transmission distortion (i.e., video distortion caused by packet errors) can assist in designing video encoding and transmission schemes that achieve maximum video quality or minimum end-to-end video distortion. This paper is aimed at deriving formulas for predicting transmission distortion. The contribution of this paper is twofold. First, we identify the governing law that describes how the transmission distortion process evolves over time and analytically derive the transmission distortion formula as a closed-form function of video frame statistics, channel error statistics, and system parameters. Second, we identify, for the first time, two important properties of transmission distortion. The first property is that the clipping noise, which is produced by nonlinear clipping, causes decay of propagated error. The second property is that the correlation between motion-vector concealment error and propagated error is negative and has dominant impact on transmission distortion, compared with other correlations. Due to these two properties and elegant error/distortion decomposition, our formula provides not only more accurate prediction but also lower complexity than the existing methods.

  6. Overt use of a tactile-kinesthetic strategy shifts to covert processing in rehabilitation of letter-by-letter reading.

    Science.gov (United States)

    Lott, Susan Nitzberg; Carney, Aimee Syms; Glezer, Laurie S; Friedman, Rhonda B

    2010-11-01

    BACKGROUND: Letter-by-letter readers identify each letter of the word they are reading serially in left to right order before recognizing the word. When their letter naming is also impaired, letter-by-letter reading is inaccurate and can render even single word reading very poor. Tactile and/or kinesthetic strategies have been reported to improve reading in these patients, but only under certain conditions or for a limited set of stimuli. AIMS: The primary aim of the current study was to determine whether a tactile/kinesthetic treatment could significantly improve reading specifically under normal reading conditions, i.e. reading untrained words presented in free vision and read without overt use of the strategy. METHODS #ENTITYSTARTX00026; PROCEDURES: Three chronic letter-by-letter readers participated in a tactile/kinesthetic treatment aimed at first improving letter naming accuracy (phase 1) and then letter-by-letter reading speed (phase 2). In a multiple case series design, accuracy and speed of reading untrained words without overt use of the trained tactile/kinesthetic strategy was assessed before phase 1, after phase 1 and again after phase 2. OUTCOMES #ENTITYSTARTX00026; RESULTS: All three patients significantly improved both their speed and accuracy reading untrained words without overt use of the trained tactile/kinesthetic strategy. All three patients required the additional practice in phase 2 to achieve significant improvement. Treatment did not target sentence level reading, yet two of the three patients became so adept that they could read entire sentences. CONCLUSIONS: This study replicates previous findings on the efficacy of tactile/kinesthetic treatment for letter-by-letter readers with poor letter naming. It further demonstrates that this treatment can alter cognitive processing such that words never specifically trained can be read in free vision without overtly using the trained strategy. The data suggest that an important element in achieving

  7. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  8. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  9. An Improved Wireless Battery Charging System

    OpenAIRE

    Woo-Seok Lee; Jin-Hak Kim; Shin-Young Cho; Il-Oun Lee

    2018-01-01

    This paper presents a direct wireless battery charging system. The output current of the series-series compensated wireless power transfer (SS-WPT) system is used as a current source, and the output voltage of AC-DC converter controls the current source. Therefore, the proposed wireless battery charging system needs no battery charging circuit to carry out charging profiles, and can solve space constraints and thermal problems in many battery applications. In addition, the proposed wireless b...

  10. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  11. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  12. Digit and letter alexia in carbon monoxide poisoning

    Institute of Scientific and Technical Information of China (English)

    Qingyu Shen; Xiaoming Rong; Rui Pan; Ying Peng; Wei Peng; Yamei Tang

    2012-01-01

    This study examined a 24-year-old patient with delayed encephalopathy, who was admitted to hospital with complaints of headache and visual impairment 1 week after acute carbon monoxide poisoning. The results of a visual field assessment, electroencephalography and head magnetic resonance imaging indicated damage to the cerebral cortex. After a 2-week treatment period, the patient had recovered from the visual impairment, but exhibited digit- and letter-reading difficulty. The Chinese aphasia battery and the number and letter battery supplement were conducted. The results revealed that the patient exhibited digit and letter alexia, while the ability to read Chinese characters was preserved. In contrast, the patient exhibited a deficit in Chinese character writing, while number and letter writing remained intact. Following treatment, reading and writing ability was improved and electroencephalographic abnormalities were ameliorated. Overall, our experimental findings demonstrated that delayed encephalopathy following acute carbon monoxide poisoning was characterized by digit and letter alexia.

  13. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  14. A matched Bow-tie antenna at 433MHz for use in underwater wireless sensor networks

    International Nuclear Information System (INIS)

    Abdou, A A; Shaw, A; Mason, A; Al-Shamma'a, A; Cullen, J; Wylie, S; Diallo, M

    2013-01-01

    Electromagnetic (EM) wave propagation underwater is been disregarded because of attenuation at high frequencies, however the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band. Common transceivers rely on narrowband antennas and matching circuit. The aim of this paper is to design a broadband 433MHz bow-tie antenna and experiment it in air and water without a matching circuit. This antenna could be attached to wireless transceivers and form a Wireless Sensor Network for deployment in various underwater applications. The bow-tie antennas were designed, simulated and constructed in laboratory. Experiments were setup carefully by using a completely isolated transmitter from electronics to avoid airborne transmission. The 433MHz. bow-tie proved its suitability for use in Underwater.

  15. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  16. Teaching Complaint and Adjustment Letters--And Tact (My Favorite Assignment).

    Science.gov (United States)

    Deimling, Paula

    1992-01-01

    Describes a three-part assignment in which each student writes a complaint letter and an adjustment letter responding to another student's complaint letter. Discusses how the third part of the assignment--journal entries--allows students to formulate their own criteria for excellent letters based upon their reactions to the letters they receive.…

  17. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  18. Peer assessment of outpatient consultation letters – feasibility and satisfaction

    Directory of Open Access Journals (Sweden)

    Dojeiji Suzan

    2007-05-01

    Full Text Available Abstract Background Written correspondence is one of the most important forms of communication between health care providers, yet there is little feedback provided to specialists. The objective of this study was to determine the feasibility and satisfaction of a peer assessment program on consultation letters and to determine inter-rater reliability between family physicians and specialists. Methods A rating scale of nine 5-point Likert scale items including specific content, style items, education value of the letter and an overall rating was developed from a previous validated tool. Nine Internal Medicine specialists/subspecialists from two tertiary care centres submitted 10 letters with patient and physician identifiers removed. Two Internal Medicine specialists, and 2 family physicians from the other centre rated each letter (to protect writer anonymity. A satisfaction survey was sent to each writer and rater after collation of the results. A follow-up survey was sent 6–8 months later. Results There was a high degree of satisfaction with the process and feedback. The rating scale information was felt to be useful and appropriate for evaluating the quality of consultation letters by 6/7 writers. 5/7 seven writers felt that the feedback they received resulted in immediate changes to their letters. Six months later, 6/9 writers indicated they had maintained changes in their letters. Raters rank ordered letters similarly (Cronbach's alpha 0.57–0.84 but mean scores were highly variant. At site 1 there were significant differences in scoring brevity (p Conclusion Most participants found peer assessment of letters feasible and beneficial and longstanding changes occurred in some individuals. Family physicians and specialists appear to have different expectations on some items. Further studies on reliability and validity, with a larger sample, are required before high stakes professional assessments include consultation letters.

  19. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  20. An application of nonlinear supratransmission to the propagation of binary signals in weakly damped, mechanical systems of coupled oscillators

    International Nuclear Information System (INIS)

    Macias-Diaz, J.E.; Puri, A.

    2007-01-01

    In the present Letter, we simulate the propagation of binary signals in semi-infinite, mechanical chains of coupled oscillators harmonically driven at the end, by making use of the recently discovered process of nonlinear supratransmission. Our numerical results-which are based on a brand-new computational technique with energy-invariant properties-show an efficient and reliable transmission of information

  1. Ultra-High Temperature Distributed Wireless Sensors

    Energy Technology Data Exchange (ETDEWEB)

    May, Russell; Rumpf, Raymond; Coggin, John; Davis, Williams; Yang, Taeyoung; O' Donnell, Alan; Bresnahan, Peter

    2013-03-31

    Research was conducted towards the development of a passive wireless sensor for measurement of temperature in coal gasifiers and coal-fired boiler plants. Approaches investigated included metamaterial sensors based on guided mode resonance filters, and temperature-sensitive antennas that modulate the frequency of incident radio waves as they are re-radiated by the antenna. In the guided mode resonant filter metamaterial approach, temperature is encoded as changes in the sharpness of the filter response, which changes with temperature because the dielectric loss of the guided mode resonance filter is temperature-dependent. In the mechanically modulated antenna approach, the resonant frequency of a vibrating cantilever beam attached to the antenna changes with temperature. The vibration of the beam perturbs the electrical impedance of the antenna, so that incident radio waves are phase modulated at a frequency equal to the resonant frequency of the vibrating beam. Since the beam resonant frequency depends on temperature, a Doppler radar can be used to remotely measure the temperature of the antenna. Laboratory testing of the guided mode resonance filter failed to produce the spectral response predicted by simulations. It was concluded that the spectral response was dominated by spectral reflections of radio waves incident on the filter. Laboratory testing of the mechanically modulated antenna demonstrated that the device frequency shifted incident radio waves, and that the frequency of the re-radiated waves varied linearly with temperature. Radio wave propagation tests in the convection pass of a small research boiler plant identified a spectral window between 10 and 13 GHz for low loss propagation of radio waves in the interior of the boiler.

  2. Simple statistical channel model for weak temperature-induced turbulence in underwater wireless optical communication systems

    KAUST Repository

    Oubei, Hassan M.

    2017-06-16

    In this Letter, we use laser beam intensity fluctuation measurements to model and describe the statistical properties of weak temperature-induced turbulence in underwater wireless optical communication (UWOC) channels. UWOC channels with temperature gradients are modeled by the generalized gamma distribution (GGD) with an excellent goodness of fit to the measured data under all channel conditions. Meanwhile, thermally uniform channels are perfectly described by the simple gamma distribution which is a special case of GGD. To the best of our knowledge, this is the first model that comprehensively describes both thermally uniform and gradient-based UWOC channels.

  3. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    Science.gov (United States)

    Krikidis, Ioannis

    2015-11-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by using high order statistics and stochastic geometry.

  4. Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks

    OpenAIRE

    Li, Wei; Yang, Zhen; Hu, Haifeng

    2014-01-01

    Graphical models have been widely applied in solving distributed inference problems in wireless networks. In this paper, we formulate the cooperative localization problem in a mobile network as an inference problem on a factor graph. Using a sequential schedule of message updates, a sequential uniformly reweighted sum-product algorithm (SURW-SPA) is developed for mobile localization problems. The proposed algorithm combines the distributed nature of belief propagation (BP) with the improved p...

  5. Propagation Characterization Based on Geographic Location Variation for 5G Small Cells

    Directory of Open Access Journals (Sweden)

    Byung-Jin Lee

    2017-01-01

    Full Text Available Developments in next-generation wireless transmission technology and efficient frequency-use research are based on understanding the characteristics of the exact radio channel. With regard to developments in next-generation mobile communication systems, performance verification of the development system is essential, for which it is necessary to estimate the exact wireless-space channel. This paper presents results of the analysis of radio propagation characteristics based on location variation in outdoor environments for small-cell 5th generation (5G mobile systems. Changes due to variation in location were measured using a channel sounder in a microcell environment with a 0.5 km radius in Korea. In order to analyze the propagation characteristics, the best distribution model reflecting the characteristics of the locations was derived. A comparison between actual measurements and three-dimensional ray-tracing simulation results confirmed the validity of the measurement result.

  6. Resource letter for Accelerated Matter Program

    International Nuclear Information System (INIS)

    Rossi, F.

    1989-07-01

    This resource letter covers diverse literature(400 titles) relevant to the Accelerated Matter Program in the Particles and Fields Group at the University of Melbourne. Specifically, the research areas covered are: inertia induced electric fields in accelerated matter; strain induced contact potentials; the patch effect/surface potentials. There are no claims made for completeness. The areas of gravity, acceleration and strain induced effects in matter, and drift tube experiments with matter/antimatter are extensively covered, if not complete. The literature on acceleration/inertia induced effects in metals has a long history dating back to the 19th century and the reader is referred to the review by Barnett (1935) for an extensive list of references not included here. All other work following this 1935 review, has been included here. The literature on surface physics is very extensive and no attempt has been made to cover it all. Every major paper on metal surfaces has been cited. Several other references have been included which fall only loosely into the above areas and they represent useful and/or interesting material for this research program

  7. Open letter to Pope John Paul II.

    Science.gov (United States)

    Sai, F

    1991-01-01

    In an Open Letter to Pope John Paul II, written on World Population Day (July 11) 1991, Dr. Fred Sai, President of International Planned Parenthood Federation (IPPF), called for a dialogue on voluntary family planning as a means of avoiding unwanted pregnancy. A half million women die each year from pregnancy-related causes--a death toll that could be dramatically reduced by universal access to low cost, effective contraception. Family planning further represents the best protection against abortion. The Catholic Church's vehement opposition to abortion and family planning methods other than periodic abstinence is in marked contrast to its support to human rights in other settings. The Church has supported struggles for economic ju stice in and among nations, sided with the poor, and advocated for transitions to democracy. At the same time, the family planning movement--which has as its overall objective the protection of the health and welfare of women, children, and families--is viewed by the Vatican as a vehicle for the enslavement rather than liberation of women. The opening of a sensitive dialogue between the Catholic Church and supporters of voluntary family planning could help couples make sound moral decisions about their families and contribute to saving the lives of millions of women, most of them poor.

  8. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  9. [Development of Bluetooth wireless sensors].

    Science.gov (United States)

    Moor, C; Schwaibold, M; Roth, H; Schöchlin, J; Bolz, A

    2002-01-01

    Wireless communication could help to overcome current obstacles in medical devices and could enable medical services to offer completely new scenarios in health care. The Bluetooth technology which is the upcoming global market leader in wireless communication turned out to be perfectly suited not only for consumer market products but also in the medical environment [1]. It offers a low power, low cost connection in the medium range of 1-100 m with a bandwidth of currently 723.2 kbaud. This paper describes the development of a wireless ECG device and a Pulse Oximeter. Equipped with a Bluetooth port, the measurement devices are enabled to transmit data between the sensor and a Bluetooth-monitor. Therefore, CSR's Bluetooth protocol embedded two-processor and embedded single-processor architecture has been used.

  10. Wave propagation in elastic solids

    CERN Document Server

    Achenbach, Jan

    1984-01-01

    The propagation of mechanical disturbances in solids is of interest in many branches of the physical scienses and engineering. This book aims to present an account of the theory of wave propagation in elastic solids. The material is arranged to present an exposition of the basic concepts of mechanical wave propagation within a one-dimensional setting and a discussion of formal aspects of elastodynamic theory in three dimensions, followed by chapters expounding on typical wave propagation phenomena, such as radiation, reflection, refraction, propagation in waveguides, and diffraction. The treat

  11. Temporal scaling in information propagation

    Science.gov (United States)

    Huang, Junming; Li, Chao; Wang, Wen-Qiang; Shen, Hua-Wei; Li, Guojie; Cheng, Xue-Qi

    2014-06-01

    For the study of information propagation, one fundamental problem is uncovering universal laws governing the dynamics of information propagation. This problem, from the microscopic perspective, is formulated as estimating the propagation probability that a piece of information propagates from one individual to another. Such a propagation probability generally depends on two major classes of factors: the intrinsic attractiveness of information and the interactions between individuals. Despite the fact that the temporal effect of attractiveness is widely studied, temporal laws underlying individual interactions remain unclear, causing inaccurate prediction of information propagation on evolving social networks. In this report, we empirically study the dynamics of information propagation, using the dataset from a population-scale social media website. We discover a temporal scaling in information propagation: the probability a message propagates between two individuals decays with the length of time latency since their latest interaction, obeying a power-law rule. Leveraging the scaling law, we further propose a temporal model to estimate future propagation probabilities between individuals, reducing the error rate of information propagation prediction from 6.7% to 2.6% and improving viral marketing with 9.7% incremental customers.

  12. Wireless Integrated Microelectronic Vacuum Sensor System

    Science.gov (United States)

    Krug, Eric; Philpot, Brian; Trott, Aaron; Lawrence, Shaun

    2013-01-01

    -gauge measurements automatically and wirelessly, in near-real time - using a low-maintenance, lowpower sensor mesh network. The WIMVSS operates by using a self-configuring mesh network of wireless sensor units. Mesh networking is a type of networking where each sensor or node can capture and disseminate its own data, but also serve as a relay to receive and transmit data from other sensors. Each sensor node can synchronize with adjacent sensors, and propagate data from one sensor to the next, until the destination is reached. In this case, the destination is a Network Interface Unit (NIU). The WIMVSS sensors are mounted on the existing vacuum gauges. Information gathered by the sensors is sent to the NIU. Because of the mesh networking, if a sensor cannot directly send the data to the NIU, it can be propagated through the network of sensors. The NIU requires antenna access to the sensor units, AC power, and an Ethernet connection. The NIU bridges the sensor network to a WIMVSS server via an Ethernet connection. The server is configured with a database, a Web server, and proprietary interface software that makes it possible for the vacuum measurements from vacuum jacketed fluid lines to be saved, retrieved, and then displayed from any Web-enabled PC that has access to the Internet. Authorized users can then simply access the data from any PC with Internet connection. Commands can also be sent directly from the Web interface for control and maintenance of the sensor network. The technology enabled by the WIMVSS decreases labor required for gathering vacuum measurements, increases access to vacuum data by making it available on any computer with access to the Internet, increases the frequency with which data points can be acquired for evaluating the system, and decreases the recurring cost of the sensors by using off-the-shelf components and integrating these with heritage vacuum gauges.

  13. Performance of a TV white space database with different terrain resolutions and propagation models

    Directory of Open Access Journals (Sweden)

    A. M. Fanan

    2017-11-01

    Full Text Available Cognitive Radio has now become a realistic option for the solution of the spectrum scarcity problem in wireless communication. TV channels (the primary user can be protected from secondary-user interference by accurate prediction of TV White Spaces (TVWS by using appropriate propagation modelling. In this paper we address two related aspects of channel occupancy prediction for cognitive radio. Firstly we investigate the best combination of empirical propagation model and spatial resolution of terrain data for predicting TVWS by examining the performance of three propagation models (Extended-Hata, Davidson-Hata and Egli in the TV band 470 to 790 MHz along with terrain data resolutions of 1000, 100 and 30 m, when compared with a comprehensive set of propagation measurements taken in randomly-selected locations around Hull, UK. Secondly we describe how such models can be integrated into a database-driven tool for cognitive radio channel selection within the TVWS environment.

  14. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  15. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  16. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  17. Artificial intelligence in wireless communications

    CERN Document Server

    Rondeau, Thomas W

    2009-01-01

    This cutting-edge resource offers practical overview of cognitive radio, a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and t

  18. Wireless technology for ABC Assessment

    DEFF Research Database (Denmark)

    Kristensen, Margit; Kyng, Morten; Christensen, Erika Frischknecht

    are developing: A wireless biomonitoring system (WBMS), where data, collected from (injured) persons is distributed wirelessly to displays, available for any rescuer in need of accessing the data, independently of the rescuers location. A biosensor for measuring respiration sound and frequency, to give direct....... Firstly in the daily EMS work where the collected data can be available at the hospital before the victim arrives and data can be used in the before-arrival-planning process. Secondly in larger incidents with several victims where a WBMS can support rescuers at the incident site in the assessment...

  19. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  20. Coherently Enhanced Wireless Power Transfer

    OpenAIRE

    Krasnok, Alex; Baranov, Denis G.; Generalov, Andrey; Li, Sergey; Alu, Andrea

    2017-01-01

    Extraction of electromagnetic energy by an antenna from impinging external radiation is at the basis of wireless communications and power transfer (WPT). The maximum of transferred energy is ensured when the antenna is conjugately matched, i.e., when it is resonant and it has an equal coupling with free space and its load, which is not easily implemented in near-field WPT. Here, we introduce the concept of coherently enhanced wireless power transfer. We show that a principle similar to the on...

  1. Embracing interference in wireless systems

    CERN Document Server

    Gollakota, Shyamnath

    2014-01-01

    The wireless medium is a shared resource. If nearby devices transmit at thesame time, their signals interfere, resulting in a collision. In traditionalnetworks, collisions cause the loss of the transmitted information. For thisreason, wireless networks have been designed with the assumption thatinterference is intrinsically harmful and must be avoided.This book, a revised version of the author's award-winning Ph.D.dissertation, takes an alternate approach: Instead of viewing interferenceas an inherently counterproductive phenomenon that should to be avoided, wedesign practical systems that tra

  2. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  3. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  4. Angles of Refraction: The Letters of Mary Delany

    Directory of Open Access Journals (Sweden)

    Eleonora Chiavetta

    2014-04-01

    Full Text Available Mary Delany (1700-1788 is particularly famous for her paper-cuttings or ‘mosaicks’ based on botanical subjects. A very lively woman of fashion, she was close to Queen Charlotte and one of the Bluestocking Ladies. She left a vivid portrait of life and society in eighteenth century England and Ireland in the six volumes of her Autobiography and Letters, edited in 1861 by her descendant Lady Llanover. Her autobiography is made up of 18 letters sent to her most intimate friend, Margaret Cavendish, Duchess of Portland. The first letter is dated 1740, but in this, as in the following ones, Mrs. Delany narrates her past life to her friend, starting from the early years of her life, describing her unhappy marriage, financial difficulties as a widow, and family relationships. Along with these ‘autobiographical’ letters, other letters written by her to her sister Ann are introduced, which date to the periods of life Mrs. Delany is dealing with. The aim of this paper is to focus on the textual, linguistic and content differences between the two letter types, and analyse how the identity of Mary Delany is differently constructed and perceived in the explicit autobiographical letters addressed to the Duchess of Portland, and the ones written to her sister. 

  5. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  6. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  7. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  8. David Bohm : causality and chance, letters to three women

    CERN Document Server

    2017-01-01

    The letters transcribed in this book were written by physicist David Bohm to three close female acquaintances in the period 1950 to 1956. They provide a background to his causal interpretation of quantum mechanics and the Marxist philosophy that inspired his scientific work in quantum theory, probability and statistical mechanics. In his letters, Bohm reveals the ideas that led to his ground breaking book Causality and Chance in Modern Physics. The political arguments as well as the acute personal problems contained in these letters help to give a rounded, human picture of this leading scientist and twentieth century thinker.

  9. Bolt beam propagation analysis

    Science.gov (United States)

    Shokair, I. R.

    BOLT (Beam on Laser Technology) is a rocket experiment to demonstrate electron beam propagation on a laser ionized plasma channel across the geomagnetic field in the ion focused regime (IFR). The beam parameters for BOLT are: beam current I(sub b) = 100 Amps, beam energy of 1--1.5 MeV (gamma =3-4), and a Gaussian beam and channel of radii r(sub b) = r(sub c) = 1.5 cm. The N+1 ionization scheme is used to ionize atomic oxygen in the upper atmosphere. This scheme utilizes 130 nm light plus three IR lasers to excite and then ionize atomic oxygen. The limiting factor for the channel strength is the energy of the 130 nm laser, which is assumed to be 1.6 mJ for BOLT. At a fixed laser energy and altitude (fixing the density of atomic oxygen), the range can be varied by adjusting the laser tuning, resulting in a neutralization fraction axial profile of the form: f(z) = f(sub 0) e(exp minus z)/R, where R is the range. In this paper we consider the propagation of the BOLT beam and calculate the range of the electron beam taking into account the fact that the erosion rates (magnetic and inductive) vary with beam length as the beam and channel dynamically respond to sausage and hose instabilities.

  10. International Large Detector. Letter of intent

    Energy Technology Data Exchange (ETDEWEB)

    Stoeck, Holger [Sydney Univ., NSW (Australia). Falkiner High Energy Physics Group; Bergauer, Thomas; Dragicevic, Marko [Oesterreichische Akademie der Wissenschaften, Vienna (AT). Inst. fuer Hochenergiephysik] (and others)

    2010-07-01

    In the summer of 2007, the GLD concept study group, whose membership was largely based in Asia, and the LDC concept study group, which was mostly based in Europe with a strong north american membership, joined forces to produce a single Letter of Intent for a detector at the International Linear Collider, and formed the ILD concept group. Both the GLD and LDC concepts used the particle flow algorithm for jet reconstruction and a TPC for the central tracker. The basic parameters of the two concepts such as the size of the detector and the strength of the solenoid field, however, were quite different and had to be unified in order to write this letter of intent for ILD. Also, other critical details such as the interaction region design had to be unified. This was a non-trivial task, neither politically nor sociologically. The newly-formed concept study group, the ILD group, created a management team and engaged in intense studies to define the ILD detector concept by scientifically optimising the detector designs. The process has worked remarkably well, and we present here the outcome of this study as well as the large amount of studies that preceded separately by the two older concept groups. The ILD detector concept is now well defined, even though some technology choices are still open. One of the merits of unifying the detector concepts was that it revitalised the studies on physics performance and detector designs. We believe that the level of sophistication of the simulation and physics analyses has reached a high degree of sophistication for a detector group at this stage. This was achieved through collaboration and competition, and is the result of a productive learning process. The unification had also positive effects on the subdetector R and D efforts. Most R and D on detector technologies relevant to the GLD and LDC groups is being performed within the framework of detector R and D collaborations such as LCTPC, SiLC, CALICE, and FCAL which pursue their

  11. International Large Detector. Letter of intent

    International Nuclear Information System (INIS)

    Stoeck, Holger; Bergauer, Thomas; Dragicevic, Marko

    2010-01-01

    In the summer of 2007, the GLD concept study group, whose membership was largely based in Asia, and the LDC concept study group, which was mostly based in Europe with a strong north american membership, joined forces to produce a single Letter of Intent for a detector at the International Linear Collider, and formed the ILD concept group. Both the GLD and LDC concepts used the particle flow algorithm for jet reconstruction and a TPC for the central tracker. The basic parameters of the two concepts such as the size of the detector and the strength of the solenoid field, however, were quite different and had to be unified in order to write this letter of intent for ILD. Also, other critical details such as the interaction region design had to be unified. This was a non-trivial task, neither politically nor sociologically. The newly-formed concept study group, the ILD group, created a management team and engaged in intense studies to define the ILD detector concept by scientifically optimising the detector designs. The process has worked remarkably well, and we present here the outcome of this study as well as the large amount of studies that preceded separately by the two older concept groups. The ILD detector concept is now well defined, even though some technology choices are still open. One of the merits of unifying the detector concepts was that it revitalised the studies on physics performance and detector designs. We believe that the level of sophistication of the simulation and physics analyses has reached a high degree of sophistication for a detector group at this stage. This was achieved through collaboration and competition, and is the result of a productive learning process. The unification had also positive effects on the subdetector R and D efforts. Most R and D on detector technologies relevant to the GLD and LDC groups is being performed within the framework of detector R and D collaborations such as LCTPC, SiLC, CALICE, and FCAL which pursue their

  12. Secret letters cast light on Copenhagen

    Energy Technology Data Exchange (ETDEWEB)

    Durrani, Matin

    2001-11-01

    Letters by Niels Bohr that have been kept secret since his death could explain the mystery of why Werner Heisenberg visited him in Copenhagen in 1941. When the author Michael Frayn spent two years writing Copenhagen, he had no idea how successful the play would become. He doubted that audiences would sit through a historical drama about a war-time meeting between Werner Heisenberg - head of Germany's nuclear programme - and his old mentor Niels Bohr in the Nazi-occupied Danish capital in 1941. But Frayn's efforts paid off. Audiences and critics alike have thrilled at the way the award-winning play probes the historical uncertainty that surrounds the encounter. Was Heisenberg fishing for information about the Allies' atomic plans - or was he trying to recruit Bohr for Germany's bomb programme? Did Heisenberg want to suggest that the Germans were close to finishing a bomb so that the Allies would make peace with Hitler? Maybe he was simply seeking approval from Bohr for his own atomic work. There is also a moral debate: did Heisenberg know how to build a bomb, but decided not to - or did he want to build one, but got his calculations wrong? Unfortunately, no-one was there to record or observe the encounter and we cannot know for sure what was said or implied between the two men. All we do know is that the pair dined together and took a short walk - and that the incident damaged Bohr and Heisenberg's friendship forever. To piece together what happened, historians of science have had to rely on Heisenberg's post-war recollections - which have been ambiguous and contradictory - along with scraps of evidence from secondary sources. (U.K.)

  13. Agnes Pockels: Life, Letters and Papers

    Science.gov (United States)

    Helm, Christiane A.

    2004-03-01

    Agnes Pockels (1862 - 1935) was a German woman, whose studies pioneered surface science. She was born in malaria infected North Italy while her father served in the Austrian army. Because he suffered adverse health effects, the family moved in1871 to Braunschweig (North Germany). There, Pockels went to high school. She was interested in science, but formal training was not available for girls. She took on the role of household manager and nurse as her parents' health deteriorated further. Her diary illustrates the difficulties she faced in trying to maintain her own health, the health of her parents and her scientific research at the same time. When Pockels was 18 or 19, she designed a ring tensiometer. Additionally, she found a new method to introduce water-insoluble compounds to the water surface by dissolving them in an organic solvent, and applying drops of the solution. Her surface film balance technique from 1882 is the basis for the method later developed by Langmuir. Since her experimental work was highly original and in a new field, she failed to get it recognized in her own country. When she was 28, she wrote to Lord Rayleigh, since she had read about his recent experiments in surface physics. Rayleigh was so impressed with her experimental methods and results that he had her letter translated from German and published it in Nature (1891). She continued her research on surface films, interactions of solutions and contact angles (more papers, 3 in Nature). Still, she did all experiments at home. With the death of her brother in 1913 and the onset of the war, she retired into private life. Thus she was surprised when she was awarded in her late 60ies with a honorary doctorate by the TU Braunschweig (1932) and the annual prize of the German Colloid Society (1931).

  14. Selective propagation and beam splitting of surface plasmons on metallic nanodisk chains.

    Science.gov (United States)

    Hu, Yuhui; Zhao, Di; Wang, Zhenghan; Chen, Fei; Xiong, Xiang; Peng, Ruwen; Wang, Mu

    2017-05-01

    Manipulating the propagation of surface plasmons (SPs) on a nanoscale is a fundamental issue of nanophotonics. By using focused electron beam, SPs can be excited with high spatial accuracy. Here we report on the propagation of SPs on a chain of gold nanodisks with cathodoluminescence (CL) spectroscopy. Experimental evidence for the propagation of SPs excited by the focused electron beam is demonstrated. The wavelength of the transmitted SPs depends on the geometrical parameters of the nanodisk chain. Furthermore, we design and fabricate a beam splitter, which selectively transmits SPs of certain wavelengths to a specific direction. By scanning the sample surface point by point and collecting the CL spectra, we obtain the spectral mapping and identify that the chain of the smaller nanodisks can efficiently transport SPs at shorter wavelengths. This Letter provides a unique approach to manipulate in-plane propagation of SPs.

  15. Letter-By-Letter Reading: Natural Recovery and Response to Treatment

    Directory of Open Access Journals (Sweden)

    Pélagie M. Beeson

    2005-01-01

    Full Text Available The present investigation provides a longitudinal study of an individual (RB with acquired alexia following left posterior cerebral artery stroke. At initial testing, RB exhibited acquired alexia characterized by letter-by-letter (LBL reading, mild anomic aphasia, and acquired agraphia. Repeated measures of reading accuracy and rate were collected for single words and text over the course of one year, along with probes of naming and spelling abilities. Improvements associated with natural recovery (i.e., without treatment were documented up to the fourth month post onset, when text reading appeared to be relatively stable. Multiple oral reading (MOR treatment was initiated at 22 weeks post-stroke, and additional improvements in reading rate and accuracy for text were documented that were greater than those expected on the basis of spontaneous recovery alone. Over the course of one year, reading reaction times for single words improved, and the word-length effect that is the hallmark of LBL reading diminished. RB's response to treatment supports the therapeutic value of MOR treatment to in LBL readers. His residual impairment of reading and spelling one-year post stroke raised the question as to whether further progress was impeded by degraded orthographic knowledge.

  16. Wireless Crew Communication Feasibility Assessment

    Science.gov (United States)

    Archer, Ronald D.; Romero, Andy; Juge, David

    2016-01-01

    Ongoing discussions with crew currently onboard the ISS as well as the crew debriefs from completed ISS missions indicate that issues associated with the lack of wireless crew communication results in increased crew task completion times and lower productivity, creates cable management issues, and increases crew frustration.

  17. Consumer acceptance of wireless finance

    NARCIS (Netherlands)

    Kleijnen, M.; Wetzels, M.G.M.; Ruyter, de J.C.

    2004-01-01

    M-commerce has been heralded repeatedly as the new service frontier of the millennium. Present market reality, however, seems to be less optimistic. Therefore, the current study explores the factors contributing to the adoption of mobile services in a context of wireless finance. The technology

  18. Collective intelligent wireless sensor networks

    NARCIS (Netherlands)

    Mihaylov, M.; Nowe, A.; Tuyls, K.P.; Nijholt, A.; Pantic, M.

    2008-01-01

    In this paper we apply the COllective INtelligence (COIN) framework ofWolpert et al. toWireless Sensor Networks (WSNs) with the aim to increase the autonomous lifetime of the network in a decentralized manner. COIN describes how selfish agents can learn to optimize their own performance, so that the

  19. Wireless Power for Mobile Devices

    NARCIS (Netherlands)

    Waffenschmidt, E.

    2011-01-01

    Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such asystem even has the potential to become a standard charging solution. Where are the limits for

  20. The distributed wireless gathering problem

    NARCIS (Netherlands)

    Bonifaci, V.; Korteweg, P.; Marchetti Spaccamela, A.; Stougie, L.

    2011-01-01

    We address the problem of data gathering in a wireless network using multi-hop communication; our main goal is the analysis of simple algorithms suitable for implementation in realistic scenarios. We study the performance of distributed algorithms, which do not use any form of local coordination,

  1. Wireless Power Transfer, New Approach

    OpenAIRE

    Dr. Fawzy Mansour Al Zoreiqat

    2016-01-01

    Many configurations representing wireless power transfer have been applied for this purpose. A simple and effective circuit is used in this research that contains components which are easily located for constructing the complete suggested configuration; we were successful in using Li Fi technology in transmitting power from one side to another through air.

  2. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  3. Data centric wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    The vision of wirteless sensing systems requires the development of devices and technologies that can be pervasive without being intrusive. The basic component of such a smart environment will be a small node with sensing and wireless communications capabilities, able to organize itself flexibly

  4. A method for the 3-D quantification of bridging ligaments during crack propagation

    International Nuclear Information System (INIS)

    Babout, L.; Janaszewski, M.; Marrow, T.J.; Withers, P.J.

    2011-01-01

    This letter shows how a hole-closing algorithm can be used to identify and quantify crack-bridging ligaments from a sequence of X-ray tomography images of intergranular stress corrosion cracking. This allows automatic quantification of the evolution of bridging ligaments through the crack propagation sequence providing fracture mechanics insight previously unobtainable from fractography. The method may also be applied to other three-dimensional materials science problems, such as closing walls in foams.

  5. How to write effective business letters: scribing information for pharmacists.

    Science.gov (United States)

    Hamilton, C W

    1993-11-01

    Pharmacists frequently write letters but lack specific training on how to do it well. This review summarizes strategies for improving business correspondence, emphasizes basic writing guidelines, and offers practical advice for pharmacists. The first steps for effective communication are careful planning and identifying the main message to be conveyed. The purpose for writing should be stated in the opening paragraph of the letter. To ensure a successful outcome, actions needed should be clearly summarized and visually highlighted. The tone of the letter should reflect a reasonable speech pattern, not the cryptic writing found in many scientific papers. The layout of the letter should be inviting, which is readily achievable through judicious use of word processing. Many delivery options are available, such as traditional postal services, express mail, and facsimile transmission. Readers are encouraged to test these basic writing principles and decide for themselves whether these recommendations affect the success of business correspondence.

  6. The Quasi-Business Letter: Passport to Foreign Culture.

    Science.gov (United States)

    Lalande, John F.

    1979-01-01

    Suggests having foreign language students write business letters to stimulate interest in developing writing skills. This project gives the students the opportunity of travelling abroad vicariously and to collect souvenirs while improving their communication skills in the foreign language. (CFM)

  7. Region 6: Texas Austin Adequate Letter (11/23/2016)

    Science.gov (United States)

    EPA letter approves the Motor Vehicle Emissions Budgets contained in the latest revision to Dallas/Fort Worth 2008 8-hour Ozone State Implementation Plan, finding them adequate for transportation conformity purposes to be announced in the Federal Register.

  8. 78 FR 7784 - Health Information Technology Policy Committee Nomination Letters

    Science.gov (United States)

    2013-02-04

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Nomination Letters.... SUMMARY: The American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee (Health IT Policy Committee) and gave the Comptroller General responsibility for...

  9. Letter to Congressional Leaders on Top Defense Management Challenges

    National Research Council Canada - National Science Library

    2000-01-01

    This is in reply to the joint letter of October 12, 2000, from the Chairmen of the Senate Committee on the Budget and Committee on Governmental Affairs, the House Government Reform Committee, House...

  10. Letter to Congressional Leaders on Top Defense Management Challenges

    National Research Council Canada - National Science Library

    2000-01-01

    ... Budget Committee and you on Department of Defense (DoD) management challenges. The joint letter requested that we update our previous assessments of the most significant management problems facing the DoD...

  11. Contemporary trends in the research of the Letter to Philemon

    Directory of Open Access Journals (Sweden)

    Bartosz Adamczewski

    2005-03-01

    Full Text Available In the period of last two or three decades interpretation of the Letter to Philemon has undergone significant changes. Exegetes applying the historical-critical method proposed recently several new ways of reconstructing the situation that occasioned Paul’s writing the letter. It has been suggested e.g. that Onesimus was no runaway, but probably an envoy from Colossae, or Philemon’s estranged brother, or a slave justifiably seeking intercession, or a roamer. Synchronic methods applied by many exegetes (structural, rhetorical, narrative and pragmatic criticism elucidate various kinds of influence of the letter upon the reader. More and more popular becomes also nowadays manifold liberationist approach. However, beyond applying these various hermeneutic procedures there is also, at least for believing exegetes, an important task of adequate explaining the significance of the Letter to Philemon as an inspired writing.

  12. The publication lapse of papers in Radiochemical and Radioanalytical Letters

    International Nuclear Information System (INIS)

    Braun, T.; Nagydiosi-Kocsis, Gy.

    1982-01-01

    The time needed for passing through journal editorial and publication processing has been examined for the papers published in Radiochemical and Radioanalytical Letters for the years 1969-1981. (author)

  13. Politeness Strategies in Good-news Business Letters

    Institute of Scientific and Technical Information of China (English)

    毕争; 李纳

    2008-01-01

    This paper analyzes the presentation of politeness in good-news business letters at the lexical,syntactic,and discourse levels based on Leech's Politeness Principle and Brown and Levinson's Face-saving Theory.

  14. medication history documentation in referral letters of children

    African Journals Online (AJOL)

    CHILDREN PRESENTING AT THE EMERGENCY UNIT OF A TEACHING. HOSPITAL IN LAGOS ... infrequently reported in referral letters to a tertiary care hospital in Lagos,. Nigeria. .... researcher, a pharmacist and clinical pharmacologist.

  15. Scientific Letter: Gestalt psychotherapy in the outpatient treatment of ...

    African Journals Online (AJOL)

    Scientific Letter: Gestalt psychotherapy in the outpatient treatment of borderline personality disorder: a case report. ... African Journal of Psychiatry. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives.

  16. Scientific Letter: Self-inflicted bilateral orchidectomy precipitated by ...

    African Journals Online (AJOL)

    Scientific Letter: Self-inflicted bilateral orchidectomy precipitated by erotic bizarre delusions: a case report. ... African Journal of Psychiatry. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home ...

  17. Love letters to the dead: resurrecting an epistolary art.

    Science.gov (United States)

    Lander, Dorothy A; Graham-Pole, John R

    This article explores the art of letter-writing, specifically to our beloved dead, as a form of autoethnographic research, pedagogy, and care work. As university teachers and qualitative researchers in palliative and end-of-life care, we review the literature and history of epistolary communications with the deceased, as a prelude to writing our own letters. John writes to his long-dead mother and Dorothy to her recently deceased spouse Patrick, each letter followed by a reflective dialogue between us. Through this dialogue, we highlight the potential application of this art, or handcraft, to formal and informal palliative care, and the implications for practice, pedagogy, policy, and research. We propose that such direct, non-mediated, communications can offer a valuable form of healing for bereaved people. The therapeutic potential of letter writing and the abundance of literary and popular culture exemplars of responses from the dead are also largely unexplored in death education and research.

  18. Bifurcation Analysis for an SEIRS-V Model with Delays on the Transmission of Worms in a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zizhen Zhang

    2017-01-01

    Full Text Available Hopf bifurcation for an SEIRS-V model with delays on the transmission of worms in a wireless sensor network is investigated. We focus on existence of the Hopf bifurcation by regarding the diverse delay as a bifurcation parameter. The results show that propagation of worms in the wireless sensor network can be controlled when the delay is suitably small under some certain conditions. Then, we study properties of the Hopf bifurcation by using the normal form theory and center manifold theorem. Finally, we give a numerical example to support the theoretical results.

  19. Color associations for days and letters across different languages

    Science.gov (United States)

    Rouw, Romke; Case, Laura; Gosavi, Radhika; Ramachandran, Vilayanur

    2014-01-01

    While colors are commonplace in everyday metaphors, relatively little is known about implicit color associations to linguistic or semantic concepts in a general population. In this study, we test color associations for ordered linguistic concepts (letters and days). The culture and language specificity of these effects was examined in a large group (457) of Dutch-speaking participants, 92 English-speaking participants, and 49 Hindi-speaking participants. Non-random distributions of color choices were revealed; consistencies were found across the three language groups in color preferences for both days and letters. Interestingly, while the Hindi-speaking participants were presented with letter stimuli matched on phonology, their pattern of letter-to-color preferences still showed similarities with Dutch- and English-speaking participants. Furthermore, we found that that the color preferences corresponded between participants indicating to have conscious color experiences with letters or days (putative synesthetes) and participants who do not (non-synesthetes). We also explored possible mechanisms underlying the color preferences. There were a few specific associations, including red for “A,” red for “Monday,” and white for “Sunday.” We also explored more general mechanisms, such as overall color preferences as shown by Simner et al. (2005). While certainly not all variation can be explained or predicted, the results show that regularities are present in color-to-letter or color-to-day preferences in both putative synesthetes and non-synesthetes across languages. Both letter-to-color and day-to-color preferences were influenced by multiple factors. The findings support a notion of abstract concepts (such as days and letters) that are not represented in isolation, but are connected to perceptual representational systems. Interestingly, at least some of these connections to color representations are shared across different language/cultural groups. PMID

  20. Color associations for days and letters across different languages

    Directory of Open Access Journals (Sweden)

    Romke eRouw

    2014-05-01

    Full Text Available While colors are commonplace in everyday metaphors, relatively little is known about implicit color associations to linguistic or semantic concepts in a general population. In this study, we test color associations for ordered linguistic concepts (letters and days. The culture and language specificity of these effects was examined in a large group (457 of Dutch-speaking participants, 92 English-speaking participants, and 49 Hindi-speaking participants. Non-random distributions of color choices were revealed; consistencies were found across the three language groups in color preferences for both days and letters. Interestingly, while the Hindi-speaking participants were presented with letter stimuli matched on phonology, their pattern of letter-to-color preferences still showed similarities with Dutch- and English-speaking participants. Furthermore, we found that that the color preferences corresponded between participants indicating to have conscious color experiences with letters or days (putative synesthetes and participants who do not (non-synesthetes. We also explored possible mechanisms underlying the color preferences. There were a few specific associations, including red for A, red for Monday, and white for Sunday. We also explored more general mechanisms, such as overall color preferences shown by Simner et al (2005. While certainly not all variation can be explained or predicted, the results show that regularities are present in color-to-letter or color-to-day preferences in both putative synesthetes and non-synesthetes across languages. Both letter-to-color and day-to-color preferences were influenced by multiple factors. The findings support a notion of abstract concepts (such as days and letters that are not represented in isolation, but are connected to perceptual representational systems. Interestingly, at least some of these connections to color representations are shared across different language/cultural groups.

  1. Propagators and path integrals

    Energy Technology Data Exchange (ETDEWEB)

    Holten, J.W. van

    1995-08-22

    Path-integral expressions for one-particle propagators in scalar and fermionic field theories are derived, for arbitrary mass. This establishes a direct connection between field theory and specific classical point-particle models. The role of world-line reparametrization invariance of the classical action and the implementation of the corresponding BRST-symmetry in the quantum theory are discussed. The presence of classical world-line supersymmetry is shown to lead to an unwanted doubling of states for massive spin-1/2 particles. The origin of this phenomenon is traced to a `hidden` topological fermionic excitation. A different formulation of the pseudo-classical mechanics using a bosonic representation of {gamma}{sub 5} is shown to remove these extra states at the expense of losing manifest supersymmetry. (orig.).

  2. Curvilinear crack layer propagation

    Science.gov (United States)

    Chudnovsky, Alexander; Chaoui, Kamel; Moet, Abdelsamie

    1987-01-01

    An account is given of an experiment designed to allow observation of the effect of damage orientation on the direction of crack growth in the case of crack layer propagation, using polystyrene as the model material. The direction of crack advance under a given loading condition is noted to be determined by a competition between the tendency of the crack to maintain its current direction and the tendency to follow the orientation of the crazes at its tip. The orientation of the crazes is, on the other hand, determined by the stress field due to the interaction of the crack, the crazes, and the hole. The changes in craze rotation relative to the crack define the active zone rotation.

  3. Atomistics of crack propagation

    International Nuclear Information System (INIS)

    Sieradzki, K.; Dienes, G.J.; Paskin, A.; Massoumzadeh, B.

    1988-01-01

    The molecular dynamic technique is used to investigate static and dynamic aspects of crack extension. The material chosen for this study was the 2D triangular solid with atoms interacting via the Johnson potential. The 2D Johnson solid was chosen for this study since a sharp crack in this material remains stable against dislocation emission up to the critical Griffith load. This behavior allows for a meaningful comparison between the simulation results and continuum energy theorems for crack extension by appropriately defining an effective modulus which accounts for sample size effects and the non-linear elastic behavior of the Johnson solid. Simulation results are presented for the stress fields of moving cracks and these dynamic results are discussed in terms of the dynamic crack propagation theories, of Mott, Eshelby, and Freund

  4. Broadband unidirectional ultrasound propagation

    Science.gov (United States)

    Sinha, Dipen N.; Pantea, Cristian

    2017-12-12

    A passive, linear arrangement of a sonic crystal-based apparatus and method including a 1D sonic crystal, a nonlinear medium, and an acoustic low-pass filter, for permitting unidirectional broadband ultrasound propagation as a collimated beam for underwater, air or other fluid communication, are described. The signal to be transmitted is first used to modulate a high-frequency ultrasonic carrier wave which is directed into the sonic crystal side of the apparatus. The apparatus processes the modulated signal, whereby the original low-frequency signal exits the apparatus as a collimated beam on the side of the apparatus opposite the sonic crystal. The sonic crystal provides a bandpass acoustic filter through which the modulated high-frequency ultrasonic signal passes, and the nonlinear medium demodulates the modulated signal and recovers the low-frequency sound beam. The low-pass filter removes remaining high-frequency components, and contributes to the unidirectional property of the apparatus.

  5. Propagation into an unstable state

    International Nuclear Information System (INIS)

    Dee, G.

    1985-01-01

    We describe propagating front solutions of the equations of motion of pattern-forming systems. We make a number of conjectures concerning the properties of such fronts in connection with pattern selection in these systems. We describe a calculation which can be used to calculate the velocity and state selected by certain types of propagating fronts. We investigate the propagating front solutions of the amplitude equation which provides a valid dynamical description of many pattern-forming systems near onset

  6. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  7. Name-letter branding under scrutiny: real products, new algorithms, and the probability of buying.

    Science.gov (United States)

    Stieger, Stefan

    2010-06-01

    People like letters matching their own first and last name initials more than nonname letters. This name-letter effect has also been found for brands, i.e., people like brands resembling their own name letters (initial or first three). This has been termed name-letter branding effect. In the present study of 199 participants, ages 12 to 79 years, this name-letter branding effect was found for a modified design (1) using real products, (2) concentrating on product names rather than brand names, (3) using five different products for each letter of the Roman alphabet, (4) asking for the buying probability, and (5) using recently introduced algorithms, controlling for individual response tendencies (i.e., liking all letters more or less) and general normative popularity of particular letters (i.e., some letters are generally preferred more than other letters).

  8. Letters to those who Dare Feel: Using Reflective Letter-Writing to Explore the Emotionality of Research

    Directory of Open Access Journals (Sweden)

    Kathleen Pithouse-Morgan

    2012-02-01

    Full Text Available Using reflective letter-writing as a method of generating data, a group of four researchers embarked on a collaborative autoethnographic inquiry into the emotional dimensions of researching social aspects of HIV & AIDS. In this article, we use the medium of a narrative dialogue to represent and re-examine our reflective letter-writing method. The dialogue draws attention to key features of reflective letter-writing as a collaborative autoethnographic research method and, in so doing, highlights and explores the nature, potential significance, and challenges of this method. Our discussion points to the value of a collaborative process of reflective letter-writing as a way for researchers to access and portray emotional aspects of their research experience, to deepen their engagement with these emotional dimensions, and to gain insight into their own and others' lived research experiences.

  9. Optimal training sequences for indoor wireless optical communications

    International Nuclear Information System (INIS)

    Wang, Jun-Bo; Jiao, Yuan; Song, Xiaoyu; Chen, Ming

    2012-01-01

    Since indoor wireless optical communication (WOC) systems can offer several potential advantages over their radio frequency counterparts, there has been a growing interest in indoor WOC systems. Influenced by the complicated optical propagation environment, there exist multipath propagation phenomena. In order to eliminate the effect of multipath propagation, much attention should be concentrated on the channel estimation in indoor WOC systems. This paper investigates optimal training sequences (TSs) for estimating a channel impulse response in indoor WOC systems. Based on the Cramer–Rao bound (CRB) theorem, an explicit form of search criterion is found. Optimum TSs are obtained and tabulated by computer search for different channel responses and TS lengths. Measured by mean square error (MSE) performance, channel estimation errors are also investigated. Simulation results show that the MSE of the channel estimator at the receiver can be reduced significantly by using the optimized TS set. Moreover, the longer the TS, the better the MSE performance that can be obtained when the channel order is fixed. (paper)

  10. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  11. Adaptive Naive Bayes classification for wireless sensor networks

    NARCIS (Netherlands)

    Zwartjes, G.J.

    2017-01-01

    Wireless Sensor Networks are tiny devices equipped with sensors and wireless communication. These devices observe environments and communicatie about these observations. Machine Learning techniques are of interest for Wireless Sensor Network applications since they can reduce the amount of needed

  12. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  13. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  14. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  15. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  16. Propagating annular modes

    Science.gov (United States)

    Sheshadri, A.; Plumb, R. A.

    2017-12-01

    The leading "annular mode", defined as the dominant EOF of surface pressure or of zonal mean zonal wind variability, appears as a dipolar structure straddling the mean midlatitude jet and thus seems to describe north-south wobbling of the jet latitude. However, extratropical zonal wind anomalies frequently tend to migrate poleward. This behavior can be described by the first two EOFs, the first (AM1) being the dipolar structure, and the second (AM2) having a tripolar structure centered on the mean jet. Taken in isolation, AM1 thus describes a north-south wobbling of the jet position, while AM2 describes a strengthening and narrowing of the jet. However, despite the fact that they are spatially orthogonal, and their corresponding time series temporally orthogonal, AM1 and AM2 are not independent, but show significant lag-correlations which reveal the propagation. The EOFs are not modes of the underlying dynamical system governing the zonal flow evolution. The true modes can be estimated using principal oscillation pattern (POP) analysis. In the troposphere, the leading POPs manifest themselves as a pair of complex conjugate structures with conjugate eigenvalues thus, in reality, constituting a single, complex, mode that describes propagating anomalies. Even though the principal components associated with the two leading EOFs decay at different rates, each decays faster than the true mode. These facts have implications for eddy feedback and the susceptibility of the mode to external perturbations. If one interprets the annular modes as the modes of the system, then simple theory predicts that the response to steady forcing will usually be dominated by AM1 (with the longest time scale). However, such arguments should really be applied to the true modes. Experiments with a simplified GCM show that climate response to perturbations do not necessarily have AM1 structures. Implications of these results for stratosphere-troposphere interactions are explored. The POP

  17. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  18. Propagation of Ion Acoustic Perturbations

    DEFF Research Database (Denmark)

    Pécseli, Hans

    1975-01-01

    Equations describing the propagation of ion acoustic perturbations are considered, using the assumption that the electrons are Boltzman distributed and isothermal at all times. Quasi-neutrality is also considered.......Equations describing the propagation of ion acoustic perturbations are considered, using the assumption that the electrons are Boltzman distributed and isothermal at all times. Quasi-neutrality is also considered....

  19. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  20. Computer-Based Wireless Advertising Communication System

    Directory of Open Access Journals (Sweden)

    Anwar Al-Mofleh

    2009-10-01

    Full Text Available In this paper we developed a computer based wireless advertising communication system (CBWACS that enables the user to advertise whatever he wants from his own office to the screen in front of the customer via wireless communication system. This system consists of two PIC microcontrollers, transmitter, receiver, LCD, serial cable and antenna. The main advantages of the system are: the wireless structure and the system is less susceptible to noise and other interferences because it uses digital communication techniques.