WorldWideScience

Sample records for wireless wide area

  1. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  2. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  3. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  4. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  5. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  6. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  7. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2004-03-01

    A comprehensive mine-wide, two-way wireless voice and data communication system for the underground mining industry was developed. The system achieves energy savings through increased productivity and greater energy efficiency in meeting safety requirements within mines. The mine-wide system is comprised of two interfaced subsystems: a through-the-earth communications system and an in-mine communications system. The mine-wide system permits two-way communication among underground personnel and between underground and surface personnel. The system was designed, built, and commercialized. Several systems are in operation in underground mines in the United States. The use of these systems has proven they result in considerable energy savings. A system for tracking the location of vehicles and people within the mine was also developed, built and tested successfully. Transtek's systems are being used by the National Institute of Occupational Safety and Health (NIOSH) in their underground mine rescue team training program. This project also resulted in a spin-off rescue team lifeline and communications system. Furthermore, the project points the way to further developments that can lead to a GPS-like system for underground mines allowing the use of autonomous machines in underground mining operations, greatly reducing the amount of energy used in these operations. Some products developed under this program are transferable to applications in fields other than mining. The rescue team system is applicable to use by first responders to natural, accidental, or terrorist-caused building collapses. The in-mine communications system can be installed in high-rise buildings providing in-building communications to security and maintenance personnel as well as to first responders.

  8. Reconfigurable subsampling receiver architecture for wireless body area networks

    NARCIS (Netherlands)

    Zhao, D.; Serdijn, W.A.; Huang, L.; Dolmans, G.

    2011-01-01

    The wide range of wireless body area network (WBAN) applications gives rise to different system requirements for the carrier frequencies and data rates. In order to accommodate various standards in WBAN applications, a universal receiver system with good performance and low power is highly

  9. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility...

  10. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  11. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  12. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  13. Ultra wideband wireless body area networks

    CERN Document Server

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit

    2014-01-01

    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  14. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  15. Data security in wireless local area network

    International Nuclear Information System (INIS)

    Kishk, A.M.A

    2010-01-01

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  16. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg

    2010-01-01

    Miniature Body Area Networks used in health care support greater mobility to patients and reduces actual hospitalization. This paper presents the preliminary implementation of a wireless body area network gateway. It is designed to implement the gateway functionality between sensors/actuators att...

  17. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI” Project

    Directory of Open Access Journals (Sweden)

    Michele Zorzi

    2009-05-01

    Full Text Available This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISEWAI” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity, a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated, as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper.

  18. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  19. Emerging Trends in Healthcare Adoption of Wireless Body Area Networks.

    Science.gov (United States)

    Rangarajan, Anuradha

    2016-01-01

    Real-time personal health monitoring is gaining new ground with advances in wireless communications. Wireless body area networks (WBANs) provide a means for low-powered sensors, affixed either on the human body or in vivo, to communicate with each other and with external telecommunication networks. The healthcare benefits of WBANs include continuous monitoring of patient vitals, measuring postacute rehabilitation time, and improving quality of medical care provided in medical emergencies. This study sought to examine emerging trends in WBAN adoption in healthcare. To that end, a systematic literature survey was undertaken against the PubMed database. The search criteria focused on peer-reviewed articles that contained the keywords "wireless body area network" and "healthcare" or "wireless body area network" and "health care." A comprehensive review of these articles was performed to identify adoption dimensions, including underlying technology framework, healthcare subdomain, and applicable lessons-learned. This article benefits healthcare technology professionals by identifying gaps in implementation of current technology and highlighting opportunities for improving products and services.

  20. Sierra Nevada snowpack and runoff prediction integrating basin-wide wireless-sensor network data

    Science.gov (United States)

    Yoon, Y.; Conklin, M. H.; Bales, R. C.; Zhang, Z.; Zheng, Z.; Glaser, S. D.

    2016-12-01

    We focus on characterizing snowpack and estimating runoff from snowmelt in high elevation area (>2100 m) in Sierra Nevada for daily (for use in, e.g. flood and hydropower forecasting), seasonal (supply prediction), and decadal (long-term planning) time scale. Here, basin-wide wireless-sensor network data (ARHO, http://glaser.berkeley.edu/wsn/) is integrated into the USGS Precipitation-Runoff Modeling System (PRMS), and a case study of the American River basin is presented. In the American River basin, over 140 wireless sensors have been planted in 14 sites considering elevation gradient, slope, aspect, and vegetation density, which provides spatially distributed snow depth, temperature, solar radiation, and soil moisture from 2013. 800 m daily gridded dataset (PRISM) is used as the climate input for the PRMS. Model parameters are obtained from various sources (e.g., NLCD 2011, SSURGO, and NED) with a regionalization method and GIS analysis. We use a stepwise framework for a model calibration to improve model performance and localities of estimates. For this, entire basin is divided into 12 subbasins that include full natural flow measurements. The study period is between 1982 and 2014, which contains three major storm events and recent severe drought. Simulated snow depth and snow water equivalent (SWE) are initially compared with the water year 2014 ARHO observations. The overall results show reasonable agreements having the Nash-Sutcliffe efficiency coefficient (NS) of 0.7, ranged from 0.3 to 0.86. However, the results indicate a tendency to underestimate the SWE in a high elevation area compared with ARHO observations, which is caused by the underestimated PRISM precipitation data. Precipitation at gauge-sparse regions (e.g., high elevation area), in general, cannot be well represented in gridded datasets. Streamflow estimates of the basin outlet have NS of 0.93, percent bias of 7.8%, and normalized root mean square error of 3.6% for the monthly time scale.

  1. Development and Evaluation of a City-Wide Wireless Weather Sensor Network

    Science.gov (United States)

    Chang, Ben; Wang, Hsue-Yie; Peng, Tian-Yin; Hsu, Ying-Shao

    2010-01-01

    This project analyzed the effectiveness of a city-wide wireless weather sensor network, the Taipei Weather Science Learning Network (TWIN), in facilitating elementary and junior high students' study of weather science. The network, composed of sixty school-based weather sensor nodes and a centralized weather data archive server, provides students…

  2. Traffic flow wide-area surveillance system definition

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.; Carnal, C.L. [Oak Ridge National Lab., TN (United States); Moynihan, P.I. [Jet Propulsion Lab., Pasadena, CA (United States)

    1994-11-01

    Traffic Flow Wide-Area Surveillance (TFWAS) is a system for assessing the state of traffic flow over a wide area for enhanced traffic control and improved traffic management and planning. The primary purpose of a TFWAS system is to provide a detailed traffic flow description and context description to sophisticated traffic management and control systems being developed or envisioned for the future. A successful TFWAS system must possess the attributes of safety, reconfigurability, reliability, and expandability. The primary safety premise of TFWAS is to ensure that no action or failure of the TFWAS system or its components can result in risk of injury to humans. A wide variety of communication techniques is available for use with TFWAS systems. These communication techniques can be broken down into two categories, landlines and wireless. Currently used and possible future traffic sensing technologies have been examined. Important criteria for selecting TFWAS sensors include sensor capabilities, costs, operational constraints, sensor compatibility with the infrastructure, and extent. TFWAS is a concept that can take advantage of the strengths of different traffic sensing technologies, can readily adapt to newly developed technologies, and can grow with the development of new traffic control strategies. By developing innovative algorithms that will take information from a variety of sensor types and develop descriptions of traffic flows over a wide area, a more comprehensive understanding of the traffic state can be provided to the control system to perform the most reasonable control actions over the entire wide area. The capability of characterizing the state of traffic over an entire region should revolutionize developments in traffic control strategies.

  3. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  4. Economics of area-wide pest control

    International Nuclear Information System (INIS)

    Mumford, J.D.

    2000-01-01

    Area-wide pest management is commonly practised throughout the world, probably much more so than is generally recognised (Lindquist 2000, Klassen 2000). Apart from highly publicised area-wide schemes such as the sterile insect technique (SIT) for fruit flies, pheromone disruption for cotton bollworms and classical biological control, there are many examples of actions such as concerted host plant eradication, enforced closed crop seasons, organised pesticide rotation for resistance management, coordination of resistant crop genotypes, etc., some going back several centuries, which should also be considered as area-wide practices. Each of these is faced with many of the economic issues generally associated with area-wide management which will be discussed below. In general, there are to be four major questions to answer in devising an area-wide pest management programme: 1) Should a particular pest be controlled locally or area-wide? 2) What is an appropriate area over which management should be attempted? 3) Within that area what form of control is most efficient? 4) What level of organisation should be used to get the job done? It should be noted that apart from clearly objective measures such as technical effectiveness (say, mortality) or cost efficiency (mortality per dollar), there are many subjective measures that come into the evaluation of area-wide control due to the element of risk (for example, in quarantine and eradication), the boundaries of externalities (for example, variable probabilities of pesticide drift under different conditions or target organism sensitivities) and time preferences for returns on capital investments (such as insect rearing facilities or research to develop pheromone technologies). As a result of these subjective components, it may sometimes be difficult to reach clearly agreed decisions based on objective economic analyses, even with a consensus on the data used. There are three general classes of economic problems in comparing

  5. Reconfigurable antenna options for 2.45/5 GHz wireless body area networks in healthcare applications.

    Science.gov (United States)

    Abbas, Syed Muzahir; Ranga, Yogesh; Esselle, Karu P

    2015-01-01

    This paper presents electronically reconfigurable antenna options in healthcare applications. They are suitable for wireless body area network devices operating in the industrial, scientific, and medical (ISM) band at 2.45 GHz and IEEE 802.11 Wireless Local Area Network (WLAN) band at 5 GHz (5.15-5.35 GHz, 5.25-5.35 GHz). Two types of antennas are investigated: Antenna-I has a full ground plane and Antenna-II has a partial ground plane. The proposed antennas provide ISM operation in one mode while in another mode they support 5 GHz WLAN band. Their performance is assessed for body centric wireless communication using a simplified human body model. Antenna sensitivity to the gap between the antenna and the human body is investigated for both modes of each antenna. The proposed antennas exhibit a wide radiation pattern along the body surface to provide wide coverage and their small width (14 mm) makes them suitable for on-body communication in healthcare applications.

  6. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  7. Wide-area continuous offender monitoring

    Science.gov (United States)

    Hoshen, Joseph; Drake, George; Spencer, Debra D.

    1997-02-01

    The corrections system in the U.S. is supervising over five million offenders. This number is rising fast and so are the direct and indirect costs to society. To improve supervision and reduce the cost of parole and probation, first generation home arrest systems were introduced in 1987. While these systems proved to be helpful to the corrections system, their scope is rather limited because they only cover an offender at a single location and provide only a partial time coverage. To correct the limitations of first- generation systems, second-generation wide area continuous electronic offender monitoring systems, designed to monitor the offender at all times and locations, are now on the drawing board. These systems use radio frequency location technology to track the position of offenders. The challenge for this technology is the development of reliable personal locator devices that are small, lightweight, with long operational battery life, and indoors/outdoors accuracy of 100 meters or less. At the center of a second-generation system is a database that specifies the offender's home, workplace, commute, and time the offender should be found in each. The database could also define areas from which the offender is excluded. To test compliance, the system would compare the observed coordinates of the offender with the stored location for a given time interval. Database logfiles will also enable law enforcement to determine if a monitored offender was present at a crime scene and thus include or exclude the offender as a potential suspect.

  8. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-11-01

    Wireless power transfer (WPT) is the key enabler for a myriad of applications, from low-power RFIDs, and wireless sensors, to wirelessly charged electric vehicles, and even massive power transmission from space solar cells. One of the major challenges in designing implantable biomedical devices is the size and lifetime of the battery. Thus, replacing the battery with a miniaturized wireless power receiver (WPRx) facilitates designing sustainable biomedical implants in smaller volumes for sentient medical applications. In the first part of this dissertation, we propose a miniaturized, fully integrated, wirelessly powered implantable sensor with on-chip antenna, designed and implemented in a standard 0.18μm CMOS process. As a batteryless device, it can be implanted once inside the body with no need for further invasive surgeries to replace batteries. The proposed single-chip solution is designed for intraocular pressure monitoring (IOPM), and can serve as a sustainable platform for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W transmitter 3cm away from the chip. In the second part, we propose a self-biased, differential rectifier with enhanced efficiency over an extended range of input power. A prototype is designed for the medical implant communication service (MICS) band at 433MHz. It demonstrates an efficiency improvement of more than 40% in the rectifier power conversion efficiency (PCE) and a dynamic range extension of more than 50% relative to the conventional cross-coupled rectifier. A sensitivity of -15.2dBm input power for 1V output voltage and a peak PCE of 65% are achieved for a 50k load. In the third part, we propose a wide-range, differential RF-to-DC power converter using an adaptive, self-biasing technique. The proposed architecture doubles

  9. VillageLink: Wide-Area Wireless Coverage

    CSIR Research Space (South Africa)

    Pejovic, V

    2014-01-01

    Full Text Available beyond simple channel utilization balancing, and uses frequency probing to profile channels according to their propagation properties. We devise VillageLink, a Gibbs sampling-based method that optimizes channel allocation in a distributed manner with a...

  10. Equalized Energy Consumption in Wireless Body Area Networks for a Prolonged Network Lifetime

    Directory of Open Access Journals (Sweden)

    Maryam El Azhari

    2017-01-01

    Full Text Available The phenomenal advances in electronics contributed to a widespread use of distributed sensors in wireless communications. A set of biosensors can be deployed or implanted in the human body to form a Wireless Body Area Network (WBAN, where various WBAN PHY layers are utilized. The WBAN allows the measurement of physiological data, which is forwarded by the gateway to the base station for analysis purposes. The main issue in conceiving a WBAN communication mechanism is to manage the residual energy of sensors. The mobile agent system has been widely applied for surveillance applications in Wireless Sensor Networks (WSNs. It consists in dispatching one or more mobile agents simultaneously to collect data, while following a predetermined optimum itinerary. The continuous use of the optimal itinerary leads to a rapid depletion of sensor nodes batteries, which minimizes the network lifetime. This paper presents a new algorithm to equalize the energy consumption among sensor motes. The algorithm exploits all the available paths towards the destination and classifies them with respect to the end-to-end delay and the overall energy consumption. The proposed algorithm performs better compared to the optimal routing path. It increases the network lifetime to the maximum by postponing routing of data via the most-recently used path, and it also maintains data delivery within the delay interval threshold.

  11. Power allocation strategies to minimize energy consumption in wireless body area networks.

    Science.gov (United States)

    Kailas, Aravind

    2011-01-01

    The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.

  12. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  13. Deployment and installation of a wireless broadband area network in an urban area

    OpenAIRE

    Pérez Bautista, Jaime

    2011-01-01

    This project's purpose is studying and developing a Wi-Fi net in an urban area in order to offer service to all people living in that area. The aim is making a full installation of a wireless Local Area Network. For it, we will study the options we have and decide which one is better for the urban area we will try to give coverage. We will decide that basing on the coverage, the simplicity, the implementation, the ease for the users and of course the environmental protection and the price of ...

  14. Traffic flow wide-area surveillance system

    Science.gov (United States)

    Allgood, Glenn O.; Ferrell, Regina K.; Kercel, Stephen W.; Abston, Ruth A.

    1995-01-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a traffic flow wide-area surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  15. Experience of wireless local area network in a radiation oncology department

    Directory of Open Access Journals (Sweden)

    Mandal Abhijit

    2010-01-01

    Full Text Available The aim of this work is to develop a wireless local area network (LAN between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc for efficient patient data management and to made easy the availability of information (chair side to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops and stationary workstations, all equipped with wireless-fidelity (Wi-Fi access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ has been used. The wireless networking was configured with the Service Set Identifier (SSID, Media Access Control (MAC address filtering, and Wired Equivalent Privacy (WEP network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  16. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  17. Fuzzy logic congestion control in IEEE 802.11 wireless local area networks: A performance evaluation

    CSIR Research Space (South Africa)

    Nyirenda, CN

    2007-09-01

    Full Text Available In 802.11 Wireless Local Area Networks, the wired and the wireless interfaces of the Access Point are characterized by the disparity in channel capacity. This presents a significant bottleneck for traffic flowing from the wired network...

  18. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  19. Wide Area Security Region Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  20. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project

    Science.gov (United States)

    Casari, Paolo; Castellani, Angelo P.; Cenedese, Angelo; Lora, Claudio; Rossi, Michele; Schenato, Luca; Zorzi, Michele

    2009-01-01

    This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper. PMID:22408513

  1. A Low-Profile Reflector-Enhanced Drop-Shaped Printed Antenna for Wide-Band Wireless Communications

    Directory of Open Access Journals (Sweden)

    Giovanni Cappelletti

    2017-01-01

    Full Text Available An improved low-profile printed antipodal drop-shaped dipole antenna for wide-band wireless applications is presented. The proposed radiating structure is integrated with a planar metal reflector useful to enhance antenna gain up to 5.5 dBi and the front-to-back ratio up to 21 dB. The geometry of reflector, feeding line, and dipole arms is optimized in order to achieve a broad operating bandwidth useful to meet the requirements of modern wireless communication protocols. Furthermore, the particular shape of the metal reflector and the adoption of a thin low-permittivity dielectric substrate result in a low distortion of the radiated field and a limited back radiation which makes the antenna suitable for UWB applications as well. These features, together with the low profile and the limited occupation area, make the antenna well adapted to mobile terminals as well as radio base stations. A locally conformal FDTD numerical procedure has been adopted to design and analyse the radiating structure, while a SEM technique has been employed to highlight the field perturbation caused by the antenna reflector as well as to extract the characteristics underlying the transient behaviour of the antenna. The experimental measurements performed on an antenna prototype are found to be in good agreement with the numerical computations.

  2. Patient Health Monitoring Using Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Hsu Myat Thwe

    2015-06-01

    Full Text Available Abstract Nowadays remote patient health monitoring using wireless technology plays very vigorous role in a society. Wireless technology helps monitoring of physiological parameters like body temperature heart rate respiration blood pressure and ECG. The main aim of this paper is to propose a wireless sensor network system in which both heart rate and body temperature ofmultiplepatients can monitor on PC at the same time via RF network. The proposed prototype system includes two sensor nodes and receiver node base station. The sensor nodes are able to transmit data to receiver using wireless nRF transceiver module.The nRF transceiver module is used to transfer the data from microcontroller to PC and a graphical user interface GUI is developed to display the measured data and save to database. This system can provide very cheaper easier and quick respondent history of patient.

  3. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  4. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  5. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  6. A TR-UWB Downconversion Autocorrelation Receiver for Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Islam SMRiazul

    2009-01-01

    Full Text Available Low power UWB receiver architecture is proposed for a Wireless Body Area Network (WBAN. This receiving technology is a synergy of existing downconversion-based narrowband rejection mechanism in RF front end and signal processing in frequency domain. Frequency components of converted and filtered UWB pulses are separated into real and imaginary parts, independently correlated and effectively combined to achieve an improved output Signal to noise ratio (SNR. An extensive mathematical analysis has been performed to formulate the close-form expressions for SNRs in order to compare system performances toward favorable BER under BPSK modulation scheme. Analysis shows that optimal rotation of coordination plays an important role for the enhancement of receiving SNR which is further confirmed by computer simulation. A wide range of link level simulation (LLS urges that the proposed system is more power efficient in higher-order modulation (HOM schemes. Transmitted Reference (TR scheme has been considered as the basis for wideband communication.

  7. Software-Defined Radio for Wireless Local-Area Networks

    NARCIS (Netherlands)

    Schiphorst, Roelof

    2004-01-01

    New wireless communications standards do not replace old ones, instead the number of standards keeps on increasing and by now an abundance of standards exists. Moreover there is no reason to assume that this trend will ever stop. Therefore, the software-radio concept is emerging as a potential

  8. Human++: Wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, R. de; Pflug, H.; Santana, J.; Visser, H.; Vullers, R.; Groot, H. de; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  9. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg

    2010-01-01

    /actuators attached to the body and a host server application. The gateway uses the BlackFin BF533 processor from Analog Devices, and uses Bluetooth for wireless communication. Two types of sensors are attached to the network: an electro-cardio-gram sensor and an oximeter sensor. The testbed has been successfully...

  10. Visible Light Communication: An Emerging Area in Wireless

    Indian Academy of Sciences (India)

    A. Chockalingam

    OFDM in VLC. QCM for VLC. • Optical wireless communication (OWC) promising complementary technology for RF communication (RFC) technology. • information conveyed via optical radiation in free space. • wavelengths of interest. • infrared to ultraviolet. • includes visible light wavelengths (380 to 780 nm). Concluding.

  11. Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks

    OpenAIRE

    Muhammad Mostafa Monowar; Mohammad Mehedi Hassan; Fuad Bajaber; Md. Abdul Hamid; Atif Alamri

    2014-01-01

    Wireless body area networks (WBANs) can be formed including implanted biosensors for health monitoring and diagnostic purposes. However, implanted biosensors could cause thermal damages on human tissue as it exhibits temperature rise due to wireless communication and processing tasks inside the human body. Again, Quality of Service (QoS) provisioning with multiconstraints (delay and reliability) is a striking requirement for diverse application types in WBANs to meet their objectives. This pa...

  12. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  13. Research of the application of the Low Power Wide Area Network in power grid

    Science.gov (United States)

    Wang, Hao; Sui, Hong; Li, Jia; Yao, Jian

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but these technologies have not make large-scale applications in different application scenarios of power grid. LoRa is a mainstream LPWAN technology. This paper makes a comparison test of the signal coverage of LoRa and other traditional wireless communication technologies in typical signal environment of power grid. Based on the test results, this paper gives an application suggestion of LoRa in power grid services, which can guide the planning and construction of the LPWAN in power grid.

  14. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  15. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  16. Requirements and System Architecture for a Healthcare Wireless Body Area Network

    DEFF Research Database (Denmark)

    Hansen, Finn Overgaard; Toftegaard, Thomas Skjødeberg

    Wireless body area networks enable new opportunities for personal healthcare monitoring and personal healthcare applications. This paper presents a comprehensive set of requirements and challenges for building a wireless body area network to support diverse user groups and a corresponding set...... of healthcare applications. Based on the identified requirements, the paper presents an architecture for a wireless body area network and describes how this architecture is connected to an existing it-infrastructure supporting healthcare at home. Finally the paper presents our on-going research with development...... of an ASE-BAN test bed. The major goal for this test bed is to be a platform for research and experiments with development of an ultra-low power body area network including sensor, communication nodes, communication protocols and a body gateway component....

  17. 3D-Printed Disposable Wireless Sensors with Integrated Microelectronics for Large Area Environmental Monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-05-19

    Large area environmental monitoring can play a crucial role in dealing with crisis situations. However, it is challenging as implementing a fixed sensor network infrastructure over large remote area is economically unfeasible. This work proposes disposable, compact, dispersible 3D-printed wireless sensor nodes with integrated microelectronics which can be dispersed in the environment and work in conjunction with few fixed nodes for large area monitoring applications. As a proof of concept, the wireless sensing of temperature, humidity, and H2S levels are shown which are important for two critical environmental conditions namely forest fires and industrial leaks. These inkjet-printed sensors and an antenna are realized on the walls of a 3D-printed cubic package which encloses the microelectronics developed on a 3D-printed circuit board. Hence, 3D printing and inkjet printing are uniquely combined in order to realize a low-cost, fully integrated wireless sensor node.

  18. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  19. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  20. Monitoring of traffic noise in an urban area using a wireless sensor network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der; Graafland, F.

    2014-01-01

    Developments in systems for monitoring environmental noise have made it possible to monitor the acoustic situation within large urban areas. The developments in hardware size and costs, combined with the developments in wireless communication allow to deploy networks with many acoustic sensors

  1. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design

    NARCIS (Netherlands)

    Selimis, G.; Huang, L.; Massé, F.; Tsekoura, I.; Ashouei, M.; Catthoor, F.; Huisken, J.; Stuyt, J.; Dolmans, G.; Penders, J.; Groot, H. de

    2011-01-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating

  2. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  3. An antennas and propagation approach to improving physical layer performance in wireless body area networks

    NARCIS (Netherlands)

    Conway, Gareth A.; Cotton, Simon L.; Scanlon, W.G.

    A combined antennas and propagation study has been undertaken with a view to directly improving link conditions for wireless body area networks. Using tissue-equivalent numerical and experimental phantoms representative of muscle tissue at 2.45 GHz, we show that the node to node |S21| path gain

  4. Double dipole antenna for dual-band wireless local area networks applications

    CSIR Research Space (South Africa)

    Steyn, JM

    2009-09-01

    Full Text Available A double dipole antenna design is proposed for wireless local area network (WLAN) applications. Two parallel dipoles are used to facilitate operation in both the standard WLAN frequency bands (IEEE 802.11b and IEEE 802.11a) simultaneously. The lower...

  5. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  6. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  7. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  8. Security Analysis of a Software Defined Wide Area Network Solution

    OpenAIRE

    Rajendran, Ashok

    2016-01-01

    Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...

  9. Performance considerations for efficient multimedia streaming in wireless local area networks

    Science.gov (United States)

    Krishnaswamy, Dilip; Stacey, Robert J.; van Alstine, Ryan; Chimitt, William J.

    2004-11-01

    This paper presents investigates multimedia streaming over wireless local area networks. Physical layer sigmoid analytical models are presented for 802.11a/g and for 2x3 MIMO 802.11n MIMO-based systems are presented. Performance results in a wireless LAN environment are presented for traffic using UDP and TCP transport mechanisms. Packet losses are observed in WLAN environments which affects the overall throughput available. Possibilities for performance improvements with the use of 802.11e and MIMO technologies are discussed. System platform architecture performance issues for wireless video conferencing between Intel« PXA27x processor-based handheld platforms are presented and results with retry-limit adaptation are also presented.

  10. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  11. Large scale track analysis for wide area motion imagery surveillance

    NARCIS (Netherlands)

    Leeuwen, C.J. van; Huis, J.R. van; Baan, J.

    2016-01-01

    Wide Area Motion Imagery (WAMI) enables image based surveillance of areas that can cover multiple square kilometers. Interpreting and analyzing information from such sources, becomes increasingly time consuming as more data is added from newly developed methods for information extraction. Captured

  12. Experimental demonstration of a novel indoor optical wireless localization system for high-speed personal area networks.

    Science.gov (United States)

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios

    2015-04-01

    In this Letter, we propose a novel indoor localization system based on optical wireless technology. By using the same architecture as the high-speed full-duplex indoor optical wireless communication system, the "search and scan" process, and the added transmission power and beam footprint information in the "search and scan" message, indoor localization functionality is achieved. Proof-of-concept experiments are carried out, and results show that an average error of optical wireless communication system, high-speed indoor wireless personal area networks can be achieved.

  13. Wireless Campus LBS - Building campus-wide Location Based Services based on WiFi technology

    NARCIS (Netherlands)

    Köbben, B.; van Bunningen, A.H.; Kavitha Muthukrishnan, K.; Stefanakis, Emmanuel

    2006-01-01

    This paper describes a project that has just started at the University of Twente (UT) in cooperation with the International Institute for Geo-Information Science and Earth Observation (ITC) to provide Location Based Services (LBS) for the UT campus. This LBS will run on the existing Wireless Campus

  14. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  15. Architecture and Fault Identification of Wide-area Protection System

    OpenAIRE

    Yuxue Wang; Xianggen Yin; Zhe Zhang; Zhenxing Li

    2012-01-01

    Wide-area protection system (WAPS) is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structure—centralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional dis...

  16. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    International Nuclear Information System (INIS)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-01-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection

  17. An area wide control of fruit flies in Mauritius

    International Nuclear Information System (INIS)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R.

    2006-01-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  18. An area wide control of fruit flies in Mauritius

    Energy Technology Data Exchange (ETDEWEB)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R., E-mail: ento@intnet.m, E-mail: moa-entomology@mail.gov.m [Ministry of Agro Industry and Fisheries Reduit, Republic of Mauritius (Mauritius)

    2006-07-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  19. An Open and Modular Hardware Node for Wireless Sensor and Body Area Networks

    Directory of Open Access Journals (Sweden)

    L. Ciabattoni

    2016-01-01

    Full Text Available Health monitoring is nowadays one of the hottest markets due to the increasing interest in prevention and treatment of physical problems. In this context the development of wearable, wireless, open-source, and nonintrusive sensing solutions is still an open problem. Indeed, most of the existing commercial architectures are closed and provide little flexibility. In this paper, an open hardware architecture for designing a modular wireless sensor node for health monitoring is proposed. By separating the connection and sensing functions in two separate boards, compliant with the IEEE1451 standard, we add plug and play capabilities to analog transducers, while granting at the same time a high level of customization. As an additional contribution of the work, we developed a cosimulation tool which simplifies the physical connection with the hardware devices and provides support for complex systems. Finally, a wireless body area network for fall detection and health monitoring, based on wireless node prototypes realized according to the proposed architecture, is presented as an application scenario.

  20. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    Science.gov (United States)

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  1. An Architecture for a Wide Area Distributed System

    NARCIS (Netherlands)

    Homburg, P.; Steen, M.R. van; Tanenbaum, A.S.

    1996-01-01

    Distributed systems provide sharing of resources and information over a computer network. A key design issue that makes these systems attractive is that all aspects related to distribution are transparent to users. Unfortunately, general-purpose wide area distributed systems that allow users to

  2. The development of area wide traffic management scenarios

    NARCIS (Netherlands)

    Van Zuylen, H.J.; Lu, S.; Li, J.; Yusen, C.

    2014-01-01

    Traffic management in cities with congestion is a big challenge with still unused opportunities. Intersection control is a corner stone but this should be done in an area-wide context. The dominant traffic process on urban roads is the traffic flow on the intersections. Spill back is a most

  3. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  4. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  5. Energy Efficient Cross-Layer Design for Wireless Body Area Monitoring Networks in Healthcare Applications

    OpenAIRE

    Awad, Alaa; Mohamed, Amr; El-Sherif, Amr A.

    2013-01-01

    Growing number of patients with chronic diseases requiring constant monitoring has created a major impetus to developing scalable Body Area Sensor Networks (BASNs) for remote health applications. In this paper, to anatomize, control, and optimize the behavior of the wireless EEG monitoring system under the energy constraint, we develop an Energy-Rate-Distortion (E-R-D) analysis framework. This framework extends the traditional distortion analysis by including the energy consumption dimension....

  6. Wireless multihop backhauls for rural areas: A preliminary study.

    Directory of Open Access Journals (Sweden)

    Zainab Zaidi

    Full Text Available Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area.

  7. Ultra low power transceiver for wireless body area networks

    CERN Document Server

    Masuch, Jens

    2013-01-01

    This book describes the design of ultra low power transceivers for body area networks.  Since these applications have very limited energy resources, typically powered only by tiny batteries or through energy harvesting techniques, this book describes an architecture for a Bluetooth low energy transceiver to overcome these limitations. Coverage includes not only the main concepts for achieving low power consumption, but also the details of the circuit design and its implementation in a standard CMOS technology.     ·         Guides readers through the design of ultra low power transceivers for body area networks, from architecture to circuit-level implementation; ·         Describes 4 key strategies for ultra-low power transceiver design and specific, innovative techniques for circuit-level design; ·         Enables readers to design transceivers for body area networks that are 27% more energy efficient than those currently available; ·         Includes a review of the st...

  8. Wideband metamaterial array with polarization-independent and wide incident angle for harvesting ambient electromagnetic energy and wireless power transfer

    Science.gov (United States)

    Zhong, Hui-Teng; Yang, Xue-Xia; Song, Xing-Tang; Guo, Zhen-Yue; Yu, Fan

    2017-11-01

    In this work, we introduced the design, demonstration, and discussion of a wideband metamaterial array with polarization-independent and wide-angle for harvesting ambient electromagnetic (EM) energy and wireless power transfer. The array consists of unit cells with one square ring and four metal bars. In comparison to the published metamaterial arrays for harvesting EM energy or wireless transfer, this design had the wide operation bandwidth with the HPBW (Half Power Band Width) of 110% (6.2 GHz-21.4 GHz), which overcomes the narrow-band operation induced by the resonance characteristic of the metamaterial. On the normal incidence, the simulated maximum harvesting efficiency was 96% and the HPBW was 110% for the random polarization wave. As the incident angle increases to 45°, the maximum efficiency remained higher than 88% and the HPBW remained higher than 83% for the random polarization wave. Furthermore, the experimental verification of the designed metamaterial array was conducted, and the measured results were in reasonable agreement with the simulated ones.

  9. Interference Mitigation Schemes for Wireless Body Area Sensor Networks: A Comparative Survey.

    Science.gov (United States)

    Le, Thien T T; Moh, Sangman

    2015-06-11

    A wireless body area sensor network (WBASN) consists of a coordinator and multiple sensors to monitor the biological signals and functions of the human body. This exciting area has motivated new research and standardization processes, especially in the area of WBASN performance and reliability. In scenarios of mobility or overlapped WBASNs, system performance will be significantly degraded because of unstable signal integrity. Hence, it is necessary to consider interference mitigation in the design. This survey presents a comparative review of interference mitigation schemes in WBASNs. Further, we show that current solutions are limited in reaching satisfactory performance, and thus, more advanced solutions should be developed in the future.

  10. Pest management strategies: Area-wide and conventional

    International Nuclear Information System (INIS)

    Lindquist, D.A.

    2000-01-01

    Conventional Insect Control The usual approach to insect control is to treat the commodity only after a damaging population of insects has developed. In other words, the producer, home owner or casual gardener fights a defensive battle. He reacts to an insect attack. When he sees the enemy or the damage caused by the enemy, he loads up his sprayer with an insecticide and mounts a counter attack. Most insect control procedures are applied by an individual producer on his own relatively small production area. This conventional insect control approach encourages the producer to make his own decisions about whether or not any insect control is to be used, which insect control method or product to use, when to use it, how to use it, who applies it, etc. Advice to producers on insect control is usually available from government extension personnel, private insect control consultants or representatives of companies that sell insecticides or other insect control materials or methods. The conventional procedure results in great variability in the efficacy of insect control because each producer makes his own decisions. The objective of conventional insect control is to protect the commodity. This is usually accomplished by treating the commodity, be it cows or corn or rice in a warehouse. Conventional insect control requires virtually no planning to achieve results. The 'programme' is short-term, frequently measured in days until the next insecticide application is needed. It is reactive (defensive). Area-wide Insect Control Area-wide insect control is applied against an important insect pest over a relatively large area involving many individual producers of the same or similar crops. The 'area' is a combination of geography and the range of hosts of the target insect pest. The term 'area' in 'area-wide' refers to the area where the target insect population survives. The area is not limited to production of the major crop(s) to be protected. It is very likely that a large

  11. Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.

    Science.gov (United States)

    Zheng, Guanglou; Fang, Gengfa; Shankaran, Rajan; Orgun, Mehmet A; Zhou, Jie; Qiao, Li; Saleem, Kashif

    2017-05-01

    Generating random binary sequences (BSes) is a fundamental requirement in cryptography. A BS is a sequence of N bits, and each bit has a value of 0 or 1. For securing sensors within wireless body area networks (WBANs), electrocardiogram (ECG)-based BS generation methods have been widely investigated in which interpulse intervals (IPIs) from each heartbeat cycle are processed to produce BSes. Using these IPI-based methods to generate a 128-bit BS in real time normally takes around half a minute. In order to improve the time efficiency of such methods, this paper presents an ECG multiple fiducial-points based binary sequence generation (MFBSG) algorithm. The technique of discrete wavelet transforms is employed to detect arrival time of these fiducial points, such as P, Q, R, S, and T peaks. Time intervals between them, including RR, RQ, RS, RP, and RT intervals, are then calculated based on this arrival time, and are used as ECG features to generate random BSes with low latency. According to our analysis on real ECG data, these ECG feature values exhibit the property of randomness and, thus, can be utilized to generate random BSes. Compared with the schemes that solely rely on IPIs to generate BSes, this MFBSG algorithm uses five feature values from one heart beat cycle, and can be up to five times faster than the solely IPI-based methods. So, it achieves a design goal of low latency. According to our analysis, the complexity of the algorithm is comparable to that of fast Fourier transforms. These randomly generated ECG BSes can be used as security keys for encryption or authentication in a WBAN system.

  12. Area efficient decimation filter based on merged delay transformation for wireless applications

    International Nuclear Information System (INIS)

    Rashid, U.; Siddiq, F.; Muhammad, T.; Jamal, H.

    2013-01-01

    Expected by 2014 is the 4G standard for cellular wireless communications, which will improve bandwidth, connectivity and roaming for mobile and stationary devices, 4G and other wireless systems are currently hot topics of research and development in the communication field. In wireless technologies like Global System for Mobile (GSM), Digital Enhanced Cordless Telecommunications (DECT) and Wi-Fi, decimation filters are essential part of transceivers being used. This paper describes a decimation filter which is efficient in terms of both the power consumption and the area used. The architecture is based upon Merged Delay Transformation (MDT). The existing Merged Delay Transformed Infinite Impulse Response (IIR) architecture is power efficient but requires larger area. The proposed and existing filters were implemented on Field-Programmable Gate Array (FPGA). The computational cost of the proposed filter is reduced to (3N/2 + 1) and M-1 times reduction in the number of multipliers in comparison to the existing FIR filter is achieved. The power consumption and speed remain nearly the same. (author)

  13. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs.

  14. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  15. Wide-Area Persistent Energy-Efficient Maritime Sensing

    Science.gov (United States)

    2015-09-30

    sensor data can be processed coherently or incoherently to achieve synoptic maritime sensing over a wide area. OBJECTIVES 1) Development of a...use this testbed to collect on the open water to confirm operation at sea. Figure 4: Block diagram and picture of the Arduino-based...including ship self-protection, anti-submarine warfare, synoptic oceanographic field measurement, and harbor security. In particular, the reduction

  16. Economic Impacts of a Wide Area Release of Anthrax

    Energy Technology Data Exchange (ETDEWEB)

    Judd, Kathleen S.; Olson, Jarrod; Stein, Steven L.; Lesperance, Ann M.

    2009-05-29

    This analysis explores economic impacts that might result from a wide-area release of anthrax. The intent is not to provide a quantitative analysis of such a disaster, but to: 1. Define the general categories of economic impacts that the region should be concerned about; and, 2. Explore what types of private sector businesses or industries, if any, may have the greatest impact on speeding the economic recovery of the region.

  17. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  18. Wide-area traffic: The failure of Poisson modeling

    Energy Technology Data Exchange (ETDEWEB)

    Paxson, V.; Floyd, S.

    1994-08-01

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. The authors evaluate 21 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTPDATA connection arrivals within FTP sessions, and TELNET packet arrivals) to determine the error introduced by modeling them using Poisson processes. The authors find that user-initiated TCP session arrivals, such as remote-login and file-transfer, are well-modeled as Poisson processes with fixed hourly rates, but that other connection arrivals deviate considerably from Poisson; that modeling TELNET packet interarrivals as exponential grievously underestimates the burstiness of TELNET traffic, but using the empirical Tcplib[DJCME92] interarrivals preserves burstiness over many time scales; and that FTPDATA connection arrivals within FTP sessions come bunched into ``connection bursts``, the largest of which are so large that they completely dominate FTPDATA traffic. Finally, they offer some preliminary results regarding how the findings relate to the possible self-similarity of wide-area traffic.

  19. Development of Autonomous Magnetometer Rotorcraft For Wide Area Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mark D. McKay; Matthew O. Anderson

    2011-08-01

    Large areas across the United States and internationally are potentially contaminated with unexploded ordinance (UXO), with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with (1) near 100% coverage and (2) near 100% detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 to 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys, resulting in costs of approximately $100-$150/acre. In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide highresolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. Thus there is a need for other systems, which can be used for effective data collection. An Unmanned Aerial Vehicle (UAV) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly

  20. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J G

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS)

  1. High-speed duplex optical wireless communication system for indoor personal area networks.

    Science.gov (United States)

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios

    2010-11-22

    In this paper a new hybrid wireless access system incorporating high bandwidth line-of-sight free space optical wireless and radio frequency localization is proposed and demonstrated. This system is capable of supporting several gigabits/second up-stream and down-stream data transmission and ideally suited for high bandwidth indoor applications such as personal area networks. A radio frequency signal is used to achieve localization of subscribers, offering limited mobility to subscribers within a practical office scenario. Even with the modest transmitted power of 5 dBm, we demonstrate satisfactory performance of bit error rates better than 10(-9) over the entire room in the presence of strong background light. Using simulations, the effectiveness of the proposed system architecture is investigated and the key performance trade-offs identified. Proof-of-concept experiments have also been carried out to validate simulation model, and initial experimental results successfully demonstrate the feasibility of the system capable of supporting 2.5 Gbps over a 1-2 m optical wireless link (limited by the length of the sliding rail used in the experiment) with a 45 degrees diffused beam in an indoor environment for the first time.

  2. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    Science.gov (United States)

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  3. Autonomous management of a recursive area hierarchy for large scale wireless sensor networks using multiple parents

    Energy Technology Data Exchange (ETDEWEB)

    Cree, Johnathan Vee [Washington State Univ., Pullman, WA (United States); Delgado-Frias, Jose [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-01

    Large scale wireless sensor networks have been proposed for applications ranging from anomaly detection in an environment to vehicle tracking. Many of these applications require the networks to be distributed across a large geographic area while supporting three to five year network lifetimes. In order to support these requirements large scale wireless sensor networks of duty-cycled devices need a method of efficient and effective autonomous configuration/maintenance. This method should gracefully handle the synchronization tasks duty-cycled networks. Further, an effective configuration solution needs to recognize that in-network data aggregation and analysis presents significant benefits to wireless sensor network and should configure the network in a way such that said higher level functions benefit from the logically imposed structure. NOA, the proposed configuration and maintenance protocol, provides a multi-parent hierarchical logical structure for the network that reduces the synchronization workload. It also provides higher level functions with significant inherent benefits such as but not limited to: removing network divisions that are created by single-parent hierarchies, guarantees for when data will be compared in the hierarchy, and redundancies for communication as well as in-network data aggregation/analysis/storage.

  4. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  5. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  6. Multi Agent System Based Wide Area Protection against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Liu, Leo

    2012-01-01

    In this paper, a multi-agent system based wide area protection scheme is proposed in order to prevent long term voltage instability induced cascading events. The distributed relays and controllers work as a device agent which not only executes the normal function automatically but also can be mod...... the effectiveness of proposed protection strategy. The simulation results indicate that the proposed multi agent control system can effectively coordinate the distributed relays and controllers to prevent the long term voltage instability induced cascading events.......In this paper, a multi-agent system based wide area protection scheme is proposed in order to prevent long term voltage instability induced cascading events. The distributed relays and controllers work as a device agent which not only executes the normal function automatically but also can...... be modified to fulfill the extra function according to external requirements. The control center is designed as a highest level agent in MAS to coordinate all the lower agents to prevent the system wide voltage disturbance. A hybrid simulation platform with MATLAB and RTDS is set up to demonstrate...

  7. Economics of area-wide sit control programs

    International Nuclear Information System (INIS)

    Enkerlin, Walther

    2003-01-01

    The economic feasibility of using the sterile insect technique (SIT) to control certain key insect pests has been demonstrated clearly. The successful implementation of a number of area-wide and large-scale SIT programs has produced substantial economic benefits for the beneficiaries of the technology. The economic advantages of this technology will become more evident as indirect benefits of SIT application are incorporated into total program benefit estimates. Awareness of the technical and economic advantages of the SIT, and market forces favoring the use of environmentally clean pest control methods, will encourage private investment in this technology. (author)

  8. Area-wide population suppression of codling moth

    International Nuclear Information System (INIS)

    Calkins, C.O.; Knight, A.L.; Richardson, G.; Bloem, K.A.

    2000-01-01

    The area-wide pest population control concept began with E.F. Knipling (1979) in the 1970s. Control of a pest population on individual fields does little to control the overall pest population because only a portion of the population is being affected. Expanding control tactics beyond individual farms tends to suppress the population on a wider scale and frequently results in suppression of the population for more than one year. The Agriculture Research Service (ARS) believes that this concept has not been addressed with the focus and support that it deserves. The ARS Administration made a conscious decision in 1994 to create a series of area-wide programmes funded out of ARS-based funds that had previously been used for pilot tests. These programmes involve a coordinated effort among ARS and university scientists, growers, and fieldmen for agriculture supply centres and fruit packing houses. The first area-wide programme supported by ARS was the codling moth (CM), Cydia pomonella L. (Lepidoptera: Tortricidae) suppression programme. The codling moth is the key pest of pome fruit throughout the western United States (Beers et al. 1993). About half of the insecticides applied on these crops are directed toward this pest. A non-insecticidal control technique, mating disruption (MD), is available to replace the organophosphates. Removal of the hard pesticides directed against this pest would do the most to allow natural enemies to survive and reproduce in the orchards, which in turn would have the effect of reducing secondary pests. Elimination of the pesticides would also remove much of the health risks to workers and would minimise buildup of pesticide resistance. The objectives of the Codling Moth Area-wide Program are to enhance the efficacy of the non-pesticide approach, to demonstrate that mating disruption will work if conducted properly, to develop biological technology to lower costs of control that complement mating disruption, to implement effective

  9. Bayes-Based Fault Discrimination in Wide Area Backup Protection

    Directory of Open Access Journals (Sweden)

    WANG, Z.

    2012-02-01

    Full Text Available Multivariate statistical analysis is an effective tool to finish the fault location for electric power system. In Bayesian discriminant analysis as a subbranch, by the research of several populations, one can calculate the conditional probability that some samples belong to these populations, and compare the corresponding probability. The sample will be classified as population with maximum probability. In this paper, based on Bayesian discriminant analysis principle, a great number of simulation examples have confirmed that the results of Bayesian fault discriminant in wide area backup protection are accurate and reliable.

  10. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  11. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  12. Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems

    Directory of Open Access Journals (Sweden)

    Romano Fantacci

    2016-05-01

    Full Text Available A smart city is an environment where a pervasive, multi-service network is employed to provide citizens improved living conditions as well as better public safety and security. Advanced communication technologies are essential to achieve this goal. In particular, an efficient and reliable communication network plays a crucial role in providing continue, ubiquitous, and reliable interconnections among users, smart devices, and applications. As a consequence, wireless networking appears as the principal enabling communication technology despite the necessity to face severe challenges to satisfy the needs arising from a smart environment, such as explosive data volume, heterogeneous data traffic, and support of quality of service constraints. An interesting approach for meeting the growing data demand due to smart city applications is to adopt suitable methodologies to improve the usage of all potential spectrum resources. Towards this goal, a very promising solution is represented by the Cognitive Radio technology that enables context-aware capability in order to pursue an efficient use of the available communication resources according to the surrounding environment conditions. In this paper we provide a review of the characteristics, challenges, and solutions of a smart city communication architecture, based on the Cognitive Radio technology, by focusing on two new network paradigms—namely, Heterogeneous Network and Machines-to-Machines communications—that are of special interest to efficiently support smart city applications and services.

  13. Optimization of locations of diffusion spots in indoor optical wireless local area networks

    Science.gov (United States)

    Eltokhey, Mahmoud W.; Mahmoud, K. R.; Ghassemlooy, Zabih; Obayya, Salah S. A.

    2018-03-01

    In this paper, we present a novel optimization of the locations of the diffusion spots in indoor optical wireless local area networks, based on the central force optimization (CFO) scheme. The users' performance uniformity is addressed by using the CFO algorithm, and adopting different objective function's configurations, while considering maximization and minimization of the signal to noise ratio and the delay spread, respectively. We also investigate the effect of varying the objective function's weights on the system and the users' performance as part of the adaptation process. The results show that the proposed objective function configuration-based optimization procedure offers an improvement of 65% in the standard deviation of individual receivers' performance.

  14. Scaling the PuNDIT project for wide area deployments

    Science.gov (United States)

    McKee, Shawn; Batista, Jorge; Carcassi, Gabriele; Dovrolis, Constantine; Lee, Danny

    2017-10-01

    In today’s world of distributed scientific collaborations, there are many challenges to providing reliable inter-domain network infrastructure. Network operators use a combination of active monitoring and trouble tickets to detect problems, but these are often ineffective at identifying issues that impact wide-area network users. Additionally, these approaches do not scale to wide area inter-domain networks due to unavailability of data from all the domains along typical network paths. The Pythia Network Diagnostic InfrasTructure (PuNDIT) project aims to create a scalable infrastructure for automating the detection and localization of problems across these networks. The project goal is to gather and analyze metrics from existing perfSONAR monitoring infrastructures to identify the signatures of possible problems, locate affected network links, and report them to the user in an intuitive fashion. Simply put, PuNDIT seeks to convert complex network metrics into easily understood diagnoses in an automated manner. We present our progress in creating the PuNDIT system and our status in developing, testing and deploying PuNDIT. We report on the project progress to-date, describe the current implementation architecture and demonstrate some of the various user interfaces it will support. We close by discussing the remaining challenges and next steps and where we see the project going in the future.

  15. Corn rootworm area-wide management across the United States

    International Nuclear Information System (INIS)

    Chandler, Laurence D.; Coppedge, James R.; Richard Edwards, C.; Tollefson, Jon J.; Wilde, Gerald E.

    2000-01-01

    The western corn rootworm, Diabrotica virgifera virgifera LeConte, northern corn rootworm, D. barberi Smith and Lawrence, and Mexican corn rootworm, D. virgifera zeae Krysan and Smith are among the most economically and environmentally important pests of United States maize (Zea mays L.) production systems (Metcalf 1986). Annually, 8 to 10 million hectares of maize are treated with soil applied insecticides to protect the crop from larval feeding damage. Crop rotation, however, is also widely used to minimise the need for soil insecticide applications. Insecticides for adult rootworm management are also frequently used. Numerous problems are currently associated with corn rootworm management approaches. Soil insecticides are normally used to protect maize roots from larval feeding damage. However, they are ineffective in controlling the management of corn rootworm populations (Gray et al. 1992, Sutter et al. 1991). It is not uncommon for large numbers of rootworms to develop within treated fields. Thus, when maize is grown in the same field year after year (continuous cropping), soil insecticide applications must be used to protect the plant. These applications are generally made without knowledge (prophylactic) of the rootworm population levels within the field due to the difficulty of sampling for immature life stages. Western corn rootworm resistance to chlorinated hydrocarbon insecticides has been extensively documented (Ball and Weekman 1962). Recently, two distinct populations of western corn rootworms in Nebraska were found to be resistant to carbaryl and methyl parathion which are commonly used for adult control (Meinke et al. 1998). Although the occurrence of resistance has not spread outside of these areas, the potential for increased tolerance of western corn rootworm populations to carbamate and organophosphate insecticides across the region does exist. In response to many of the management problems discussed above, scientists with the USDA Agricultural

  16. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying f...

  17. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  18. Wide-Area Emergency Control in Power Transmission

    DEFF Research Database (Denmark)

    Pedersen, Andreas Søndergaard

    , thus making the behaviour less predictable, suggesting the need for new intelligent wide-area emergency control algorithms. The fluctuating nature of the future power system calls for new methods of calculating remedial actions that are able to adapt to changing conditions. As part of this thesis......This thesis concerns the development of new emergency control algorithms for electric power transmission systems. Diminishing global resources and climate concerns forces operators to change production away from fossil fuels and towards distributed renewable energy sources. Along with the change...... on production side measures must be taken on the demand side to maintain power balance. Due to these changes, the operating point of the power system will be less predictable. Traditionally, emergency controls are designed off-line by extensive simulations. The future power system is expected to fluctuate more...

  19. Wide area methane emissions mapping with airborne IPDA lidar

    Science.gov (United States)

    Bartholomew, Jarett; Lyman, Philip; Weimer, Carl; Tandy, William

    2017-08-01

    Methane emissions from natural gas production, storage, and transportation are potential sources of greenhouse gas emissions. Methane leaks also constitute revenue loss potential from operations. Since 2013, Ball Aerospace has been developing advanced airborne sensors using integrated path differential absorption (IPDA) LIDAR instrumentation to identify methane, propane, and longer-chain alkanes in the lowest region of the atmosphere. Additional funding has come from the U.S. Department of Transportation, Pipeline and Hazardous Materials Administration (PHMSA) to upgrade instrumentation to a broader swath coverage of up to 400 meters while maintaining high spatial sampling resolution and geolocation accuracy. Wide area coverage allows efficient mapping of emissions from gathering and distribution networks, processing facilities, landfills, natural seeps, and other distributed methane sources. This paper summarizes the benefits of advanced instrumentation for aerial methane emission mapping, describes the operating characteristics and design of this upgraded IPDA instrumentation, and reviews technical challenges encountered during development and deployment.

  20. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    Science.gov (United States)

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  1. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    Science.gov (United States)

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  2. Development of a wearable wireless body area network for health monitoring of the elderly and disabled

    Science.gov (United States)

    Rushambwa, Munyaradzi C.; Gezimati, Mavis; Jeeva, J. B.

    2017-11-01

    Novel advancements in systems miniaturization, electronics in health care and communication technologies are enabling the integration of both patients and doctors involvement in health care system. A Wearable Wireless Body Area Network (WWBAN) provides continuous, unobtrusive ambulatory, ubiquitous health monitoring, and provide real time patient’s status to the physician without any constraint on their normal daily life activities. In this project we developed a wearable wireless body area network system that continuously monitor the health of the elderly and the disabled and provide them with independent, safe and secure living. The WWBAN system monitors the following parameters; blood oxygen saturation using a pulse oximeter sensor (SpO2), heart rate (HR) pulse sensor, Temperature, hydration, glucose level and fall detection. When the wearable system is put on, the sensor values are processed and analysed. If any of the monitored parameter values falls below or exceeds the normal range, there is trigger of remote alert by which an SMS is send to a doctor or physician via GSM module and network. The developed system offers flexibility and mobility to the user; it is a real time system and has significance in revolutionizing health care system by enabling non-invasive, inexpensive, continuous health monitoring.

  3. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  4. Development of autonomous magnetometer rotorcraft for wide area assessment

    Energy Technology Data Exchange (ETDEWEB)

    Roelof Versteeg; Matt Anderson; Les Beard; Eric Corban; Darryl Curley; Jeff Gamey; Ross Johnson; Dwight Junkin; Mark McKay; Jared Salzmann; Mikhail Tchernychev; Suraj Unnikrishnan; Scott Vinson

    2010-04-01

    Large areas across the United States are potentially contaminated with UXO, with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with 1) near 100 % coverage and 2) near 100 % detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 – 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys (resulting in costs of approximately $100-$150/acre). In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide high resolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. There is thus a need for other systems which can be used for effective data collection. An UAV (Unmanned Aerial Vehicle) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly characterization (through the use of

  5. Performability indicators for the traffic analysis of wide area networks

    International Nuclear Information System (INIS)

    Tsopelas, Panagiotis; Platis, Agapios

    2003-01-01

    In connecting computing networks, reliability term is strongly related to the availability of connections of Wide Area networks (WANs) or Local Area networks (LANs). In this paper we will examine the network connections activity of a Greek University in order to provide two sources of information: The Quantity of Information Not Delivered (QIND) and the Information Flow Interruption (IFI). These indicators will provide us with the inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available (traffic), which is lost due to failures or upgrades inside this network. The reliability analysis is obtained by collecting the network failures data (duration and frequency) and traffic (total and average) for a specified period of 1 year. It is assumed that the numerical analysis is based on the fact that the lifetime follows and exponential distribution (here as we are working on discrete time the distribution must be the geometric distribution). Hence a Markov chain model seems suitable for modelling the functioning of this system. An algorithm concentrates the results in a transition probability matrix and calculates the reward functions for the QIND/IFI indicators with the use of the power method. Finally, the application part provides an example of how final results can be used to evaluate the observed network

  6. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  7. Large scale track analysis for wide area motion imagery surveillance

    Science.gov (United States)

    van Leeuwen, C. J.; van Huis, J. R.; Baan, J.

    2016-10-01

    Wide Area Motion Imagery (WAMI) enables image based surveillance of areas that can cover multiple square kilometers. Interpreting and analyzing information from such sources, becomes increasingly time consuming as more data is added from newly developed methods for information extraction. Captured from a moving Unmanned Aerial Vehicle (UAV), the high-resolution images allow detection and tracking of moving vehicles, but this is a highly challenging task. By using a chain of computer vision detectors and machine learning techniques, we are capable of producing high quality track information of more than 40 thousand vehicles per five minutes. When faced with such a vast number of vehicular tracks, it is useful for analysts to be able to quickly query information based on region of interest, color, maneuvers or other high-level types of information, to gain insight and find relevant activities in the flood of information. In this paper we propose a set of tools, combined in a graphical user interface, which allows data analysts to survey vehicles in a large observed area. In order to retrieve (parts of) images from the high-resolution data, we developed a multi-scale tile-based video file format that allows to quickly obtain only a part, or a sub-sampling of the original high resolution image. By storing tiles of a still image according to a predefined order, we can quickly retrieve a particular region of the image at any relevant scale, by skipping to the correct frames and reconstructing the image. Location based queries allow a user to select tracks around a particular region of interest such as landmark, building or street. By using an integrated search engine, users can quickly select tracks that are in the vicinity of locations of interest. Another time-reducing method when searching for a particular vehicle, is to filter on color or color intensity. Automatic maneuver detection adds information to the tracks that can be used to find vehicles based on their

  8. Trade issues and area-wide pest management

    International Nuclear Information System (INIS)

    Griffin, Robert L.

    2000-01-01

    Food security and economic security are unarguably desirable objectives for all nations - indeed for the world. Equally important is the sustainability of designs that achieve these objectives without disadvantaging others or damaging the environment. Considering area-wide pest management in the context of these interrelated global policy forces is essential to fully understand its role in both the protection of plant resources and in facilitation of trade. The case for food security begins with the realisation that there are currently about 800 million people in the world who are suffering from malnutrition due to lack of food. The World Food Summit, convened in November 1996, urgently called for coordinated world-wide action to ensure 'food for all'. A key strategy for realising this goal is reducing losses due to plant pests. In this light, area-wide pest management can be viewed as a valuable addition to the toolbox of pest management strategies. It can also be one of the most sustainable and cost-effective options to consider for pest management. However, just as the problem of world hunger is not solved by a single farmer, area-wide pest management cannot be successful at the individual level. It requires commitment and cooperation to make it feasible - the same type of commitment and cooperation that was expressed at the World Food Summit. Where economic security is concerned, one need not look far to see a world of growing economic integration and widening circles of development. As the World Trade Organisation celebrates the 50th anniversary of the rules-based trading system which began with the GATT after World War II, it is clear that globalisation and the liberalisation of trade have become permanent fixtures in international policy formulation and are integral to the economic security of all nations. Now, more than ever before, the world's prosperity rests on maintaining an open international economy based on commonly agreed rules. The significance of

  9. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    Science.gov (United States)

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  10. Flexible quality of service model for wireless body area sensor networks.

    Science.gov (United States)

    Liao, Yangzhe; Leeson, Mark S; Higgins, Matthew D

    2016-03-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the prospect of collecting human vital signs, early detection of abnormal medical conditions, real-time healthcare data transmission and remote telemedicine support. However, due to the technical constraints of sensor batteries, the supply of power is a major bottleneck for healthcare system design. Moreover, medium access control (MAC) needs to support reliable transmission links that allow sensors to transmit data safely and stably. In this Letter, the authors provide a flexible quality of service model for ad hoc networks that can support fast data transmission, adaptive schedule MAC control, and energy efficient ubiquitous WBASN networks. Results show that the proposed multi-hop communication ad hoc network model can balance information packet collisions and power consumption. Additionally, wireless communications link in WBASNs can effectively overcome multi-user interference and offer high transmission data rates for healthcare systems.

  11. Green wireless body area nanonetworks: energy management and the game of survival.

    Science.gov (United States)

    Misra, Sudip; Islam, Nabiul; Mahapatro, Judhistir; Rodrigues, Joel Jose P C

    2014-03-01

    In this paper, we envisage the architecture of Green Wireless Body Area Nanonetwork (GBAN) as a collection of nanodevices, in which each device is capable of communicating in both the molecular and wireless electromagnetic communication modes. The term green refers to the fact that the nanodevices in such a network can harvest energy from their surrounding environment, so that no nanodevice gets old solely due to the reasons attributed to energy depletion. However, the residual energy of a nanodevice can deplete substantially with the lapse of time, if the rate of energy consumption is not comparable with the rate of energy harvesting. It is observed that the rate of energy harvesting is nonlinear and sporadic in nature. So, the management of energy of the nanodevices is fundamentally important. We specifically address this problem in a ubiquitous healthcare monitoring scenario and formulate it as a cooperative Nash Bargaining game. The optimal strategy obtained from the Nash equilibrium solution provides improved network performance in terms of throughput and delay.

  12. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2016-05-01

    Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.

  13. On Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL

    2018-01-01

    Dedicated wide-area network connections are employed in big data and high-performance computing scenarios, since the absence of cross-traffic promises to make it easier to analyze and optimize data transfers over them. However, nonlinear transport dynamics and end-system complexity due to multi-core hosts and distributed file systems make these tasks surprisingly challenging. We present an overview of methods to analyze memory and disk file transfers using extensive measurements over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory transfers, we derive performance profiles of TCP and UDT throughput as a function of RTT, which show concave regions in contrast to entirely convex regions predicted by previous models. These highly desirable concave regions can be expanded by utilizing large buffers and more parallel flows. We also present Poincar´e maps and Lyapunov exponents of TCP and UDT throughputtraces that indicate complex throughput dynamics. For disk file transfers, we show that throughput can be optimized using a combination of parallel I/O and network threads under direct I/O mode. Our initial throughput measurements of Lustre filesystems mounted over long-haul connections using LNet routers show convex profiles indicative of I/O limits.

  14. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  15. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  16. A Constant Energy-Per-Cycle Ring Oscillator Over a Wide Frequency Range for Wireless Sensor Nodes.

    Science.gov (United States)

    Lee, Inhee; Sylvester, Dennis; Blaauw, David

    2016-03-01

    This paper presents an energy-efficient oscillator for wireless sensor nodes (WSNs). It avoids short-circuit current by minimizing the time spent in the input voltage range from V thn to [ V dd - | V thp |]. A current-feeding scheme with gate voltage control enables the oscillator to operate over a wide frequency range. A test chip is fabricated in a 0.18 μm CMOS process. The measurements show that the proposed oscillator achieves a constant energy-per-cycle (EpC) of 0.8 pJ/cycle over the 21-60 MHz frequency range and is more efficient than a conventional current-starved ring oscillator (CSRO) below 300 kHz at 1.8 V supply voltage. As an application example, the proposed oscillator is implemented in a switched-capacitor DC-DC converter. The converter is 11%-56% more efficient for load power values ranging from 583 pW to 2.9 nW than a converter using a conventional CSRO.

  17. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  18. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  19. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  20. Trapping guidelines for area-wide fruit fly programmes

    International Nuclear Information System (INIS)

    2003-11-01

    Different traps and lures have been developed and used over decades to survey fruit fly populations. The first attractant for male fruit flies was methyl eugenol (ME) (for Bactrocera zonata, Howlett, 1912) followed by kerosene for Mediterranean fruit fly, Ceratitis capitata, (medfly), Severin and Severin, 1913. In 1956, Angelica seed oil was used to trap medfly (Steiner et al, 1957). Beroza et al. (1961) discovered trimedlure (TML) to be effective for the same purpose. Beroza and Green, 1963, demonstrated cuelure to be an effective attractant for Bactrocera cucurbitae. Food baits based on protein solutions, fermenting sugar solutions, fruit juices, and vinegar have been used since 1918 for the capture of females of several species. The McPhail trap was the first device to be used with protein baits (McPhail, 1929). Steiner traps were developed in 1957 (Steiner et al., 1957) and Jackson traps in 1971 for TML (Harris et al., 1971). These traps are currently used in various countries for fruit fly surveys in support of control activities and eradication campaigns. The combination of a McPhail trap with a protein attractant, Jackson trap with TML, and the Steiner trap with ME or cuelure (CUE), has remained unchanged for several decades. Global trends in increasing food quality, revenue sources, and fruit and vegetable trade, has resulted in an increased worldwide movement of fruit fly species and requires refinement of survey systems. After years of validating trapping technology through coordinated research programmes (CRP's) and extensive technical assistance to member countries, the Joint Division FAO/IAEA proposes the use of proven technologies in improving trap sensitivity in area-wide fruit fly control programmes (IAEA 1996 and IAEA 1998). These proven technologies include the use of synthetic food lures such as female attractants that can be used for several species of Anastrepha, Bactrocera and Ceratitis. Other citations of information on these developments are

  1. Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network

    Science.gov (United States)

    2009-03-01

    generated by a G.711 codec and transmission over an IEEE 802.11n draft 2.0 wireless local area network (WLAN). Decline in audio quality due to additional...6 2.5 Real-Time Transport Protocol ...................................................................................8 2.6 Audio Codecs ...Page 1. VoIP Audio Codec Data Rates and Typical MOS

  2. Design of a Compact Wireless Multi-Channel High Area-Efficient Stimulator with Arbitrary Channel Configuration

    Directory of Open Access Journals (Sweden)

    Yuwei Zhang

    2017-12-01

    Full Text Available This paper presents the design of a wireless, implantable, multi-channel, programmable stimulator with arbitrary channel combination. A novel channel management module using a switch array is presented, enabling arbitrary channel configuration with a silicon area reduction of 81%. The chip was fabricated in a 0.18- μ m Taiwan semiconductor manufacturing company (TSMC high voltage (HV complementary metal–oxide semiconductor (CMOS technology. A stimulator system was realized using the proposed integrated circuit (IC. A wireless communication link was established between a specified Android-based graphical user interface (GUI and the proposed device for control of the stimulation pattern and wireless battery charging. The size of the entire system occupies a volume of only 14 mm × 14 mm × 4 mm (without the battery. Experimental results demonstrated a successful independent configuration between different channels, as well as an arbitrary channel combination, as expected.

  3. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  4. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    Science.gov (United States)

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  5. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  6. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  7. Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes

    Directory of Open Access Journals (Sweden)

    Theofanis P. Lambrou

    2009-01-01

    Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.

  8. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy ...

  9. Implementation of Energy Efficiency Based on Time Scheduling to Improve Network Lifetime in Wireless Body Area Network (WBAN

    Directory of Open Access Journals (Sweden)

    Subono .

    2016-04-01

    Full Text Available ZigBee applications of IEEE 802.15.4 Wireless Sensor Network (WSN with Low Rate Wireless Personal Area Network (LR-WPAN can be integrated with e-health technology Wireless Body Area Network (WBAN. WBAN are small size and can communicate quickly making it easier for people to obtain information accurately.WBAN has a variety of functions that can help human life. It can be used in the e-health, military and sports. WBAN has the potential to be the future of wireless communication solutions. WBAN use battery as its primary power source. WBAN has limited energy and must be able to save energy consumption in order to operate for a long time. In this study, we propose a method of time scheduling called cycle sleep period (CSP as WBAN solutions to save energy and improve energy efficiency. The CSP method is implemented in the real hardware testbed using sensor e-health includes temperature body and current sensor. We compared the performance of CSP method with duty cycle management (DCM time scheduling-based and without using time scheduling.From the measurement results, our proposed idea has decreasingenergy consumption. Keywords: WSN, LR-WPAN, WBAN, e-health, Time Scheduling

  10. Numerical Investigation of a Chip Printed Antenna Performances for Wireless Implantable Body Area Network Applications

    Science.gov (United States)

    Ramli, N. H.; Jaafar, H.; Lee, Y. S.

    2018-03-01

    Recently, wireless implantable body area network (WiBAN) system become an active area of research due to their various applications such as healthcare, support systems for specialized occupations and personal communications. Biomedical sensors networks mounted in the human body have drawn greater attention for health care monitoring systems. The implantable chip printed antenna for WiBAN applications is designed and the antenna performances is investigated in term of gain, efficiency, return loss, operating bandwidth and radiation pattern at different environments. This paper is presents the performances of implantable chip printed antenna in selected part of human body (hand, chest, leg, heart and skull). The numerical investigation is done by using human voxel model in built in the CST Microwave Studio Software. Results proved that the chip printed antenna is suitable to implant in the human hand model. The human hand model has less complex structure as it consists of skin, fat, muscle, blood and bone. Moreover, the antenna is implanted under the skin. Therefore the signal propagation path length to the base station at free space environment is considerably short. The antenna’s gain, efficiency and Specific Absorption Rate (SAR) are - 13.62dBi, 1.50 % and 0.12 W/kg respectively; which confirms the safety of the antenna usage. The results of the investigations can be used as guidance while designing chip implantable antenna in future.

  11. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  12. Wireless Broadband Network on TVWS for Rural Areas: an Indian Perspective

    DEFF Research Database (Denmark)

    Deshmukh, Madhukar; Patil, Kishor P.; Frederiksen, Flemming Bjerge

    2013-01-01

    and market domains. The current global move to switch from analogue to digital TV has opened up an opportunity for the re-allocation of this valuable resource. In one way, spectrum bands once used for analogue TV broadcasting will be completely cleared, leaving a space for deploying new licensed wireless...... services, and in another way, digital television technology geographically interleaves spectrum bands to avoid interference between neighboring stations-leaving a space for deploying new unlicensed wireless services. The focus of the paper is to assess the availability of geographically interleaved...... spectrum, also known as television spectrum white spaces (TVWS) and proposing the wireless network scenarios for rural broadband connectivity....

  13. The Enhanced Workflow and Efficiency of the Wireless Local Area Network (WLAN)-Based Direct Digital Radiography (DDR) Portable Radiography.

    Science.gov (United States)

    Ngan, Tsz-Lung; Wong, Edward Ting-Hei; Ng, Kris Lap-Shun; Jeor, Patrick Kwok-Shing; Lo, Gladys Goh

    2015-06-01

    With the implementation of the PACS in the hospital, there is an increasing demand from the clinicians for immediate access and display of radiological images. Recently, our hospital has installed the first wireless local area network (WLAN)-based direct digital radiography (DDR) portable radiography system. The DDR portable radiography system allows wireless retrieval of modality worklist and wireless transmission of portable X-ray image on the console to the Picture Archiving and Communication System (PACS), via WLAN connection of wireless fidelity (Wi-Fi). The aim of this study was to analyze the workflow and performance between the WLAN-based DDR portable radiography system and the old practice using conventional portable X-ray machine with computed radiography (CR) system. A total of 190 portable chest X-ray examinations were evaluated and timed, using the conventional portable X-ray machine with CR from March to April of 2012 and using the new DDR portable radiography system on December of 2012 (n = 97 for old system and n = 93 for DDR portable system). The time interval of image becoming available to the PACS using the WLAN-based DDR portable radiography system was significantly shorter than that of the old practice using the conventional portable X-ray machine with CR (6.8 ± 2.6 min for DDR portable system; 23 ± 10.2 min for old system; p DDR portable radiography system can enhance the workflow of portable radiography by reduction of procedural steps.

  14. Summary of the Seattle Urban Area Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Kirvel, R

    2010-09-13

    A terrorist attack involving a release of biological warfare agent in the Seattle urban area would require decision-makers to make a host of important, and sometimes untested, choices concerning how best to respond and recover. This technical supplement supports the Puget Sound Regional Biological Attack Recovery Plan Annex to the Regional Catastrophic Plan, which structures the region’s response and recovery approach, by providing technical details on how to conduct a biological remediation. More specifically, the technical supplement identifies the principal issues that must be addressed following a wide-area release of aerosolized Bacillus anthracis (B. anthracis) spores; explains the resources that are available to address the release; sets forth strategies to reduce the time required for consequence management; and focuses on remediation options, procedures, and tools that can be implemented today should such an incident occur. The content is intended to be used with the Interim Consequence Management Guidance for a Wide-Area Biological Attack (LLNL 2009). A second and related purpose of this technical supplement is to serve as a detailed guide for other geographical regions interested in formulating their own consequence management plans. This technical supplement is funded by, and was developed as part of, the Interagency Biological Restoration Demonstration (IBRD) program—a collaborative effort among Department of Homeland Security, Department of Defense, and numerous other Federal, state, and local agencies—to improve the nation’s ability to respond to and recover from a wide-area biological incident. Content of the technical supplement follows the six-phase diagram for responding to and recovering from a biological contamination incident (see Figure 1 on the next page), which represents a consensus scheme developed after multi-agency review and approval. Whereas the focus of the document is on remediation/cleanup activities, the topics of response

  15. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  16. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Al Ameen, Moshaddique; Hong, Choong Seon

    2015-12-04

    The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  17. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  18. Nash Equilibrium of an Energy Saving Strategy with Dual Rate Transmission in Wireless Regional Area Network

    Directory of Open Access Journals (Sweden)

    Zhanqiang Huo

    2017-01-01

    Full Text Available Wireless regional area network (WRAN adopts centralized network architecture and is currently one of the most typical cognitive radio networks. In order to reduce the energy consumption of the communication networks with the constraint of spectrum resource utilization, a working sleep mechanism is introduced into the base station (BS, and a novel energy saving strategy with dual rate transmission is proposed. Combining the multiple-vacation queue and priority queue, using the quasi-birth-death process and the matrix-geometric solution method, we assess the average latency and the forced termination probability of secondary user packets, as well as the energy saving ratio and the channel utilization of system. Based on the revenue-expenditure structure, a profit function is built, and then the Nash equilibrium behavior and the socially optimal behavior are investigated. With the help of the particle swarm optimization, an intelligent optimization algorithm to search the socially optimal arrival rate of secondary user packets is presented. In order to unify the arrival rates of secondary user packets with Nash equilibrium and social optimization, a reasonable pricing policy is formulated. In addition, system experiments are carried out to verify the effectiveness of the energy saving strategy and the rationality of the pricing policy.

  19. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen

    2016-11-01

    Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.

  20. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  1. The Emerging Wireless Body Area Network on Android Smartphones: A Review

    Science.gov (United States)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.

    2018-01-01

    Our society now has driven us into an era where almost everything can be digitally monitored and controlled including the human body. The growth of wireless body area network (WBAN), as a specific scope of sensor networks which mounted or attached to human body also developing rapidly. It allows people to monitor their health and several daily activities. This study is intended to review the trend of WBAN especially on Android, one of the most popular smartphone platforms. A systematic literature review is concerned to the following parameters: the purpose of the device and/or application, the type of sensors, the type of Android device, and its connectivity. Most of the studies were more concern to healthcare or medical monitoring systems: blood pressure, electro cardiograph, tremor detection, etc. On the other hand, the rest of them aimed for activity tracker, environment sensing, and epidemic control. After all, those studies shown that not only Android can be a powerful platform to process data from various sensors but also smartphones can be a good alternative to develop WBANs for medical and other daily applications.

  2. On the Capability of Smartphones to Perform as Communication Gateways in Medical Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    María José Morón

    2014-01-01

    Full Text Available This paper evaluates and characterizes the technical performance of medicalwireless personal area networks (WPANs that are based on smartphones. For this purpose,a prototype of a health telemonitoring system is presented. The prototype incorporates acommercial Android smartphone, which acts as a relay point, or “gateway”, between a setof wireless medical sensors and a data server. Additionally, the paper investigates if theconventional capabilities of current commercial smartphones can be affected by their useas gateways or “Holters” in health monitoring applications. Specifically, the profiling hasfocused on the CPU and power consumption of the mobile devices. These metrics havebeen measured under several test conditions modifying the smartphone model, the type ofsensors connected to the WPAN, the employed Bluetooth profile (SPP (serial port profile orHDP (health device profile, the use of other peripherals, such as a GPS receiver, the impactof the use of theWi-Fi interface or the employed method to encode and forward the data thatare collected from the sensors.

  3. A Statewide Private Microwave Wide Area Network for Real-time Natural Hazard Monitoring

    Science.gov (United States)

    Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.

    2013-12-01

    The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and

  4. Drexel Goes Wireless: Leading U.S. University Creates Fully Wireless Cyber Campus

    OpenAIRE

    Blackney, Ken; Bielec, John

    2001-01-01

    In 1997 Drexel began implementing its first CyberZone -- an area of continuous wireless network connectivity. Begun as a pilot project in the central library, CyberZones quickly proved to be both popular and practical. In 2000 Drexel became the first major university to implement a campus-wide, high-speed wireless network for all indoor and outdoor areas, including public spaces such as local train platforms and nearby cafes and restaurants. This presentation describes the technical, politica...

  5. Efficacy analysis of LDPC coded APSK modulated differential space-time-frequency coded for wireless body area network using MB-pulsed OFDM UWB technology.

    Science.gov (United States)

    Manimegalai, C T; Gauni, Sabitha; Kalimuthu, K

    2017-12-04

    Wireless body area network (WBAN) is a breakthrough technology in healthcare areas such as hospital and telemedicine. The human body has a complex mixture of different tissues. It is expected that the nature of propagation of electromagnetic signals is distinct in each of these tissues. This forms the base for the WBAN, which is different from other environments. In this paper, the knowledge of Ultra Wide Band (UWB) channel is explored in the WBAN (IEEE 802.15.6) system. The measurements of parameters in frequency range from 3.1-10.6 GHz are taken. The proposed system, transmits data up to 480 Mbps by using LDPC coded APSK Modulated Differential Space-Time-Frequency Coded MB-OFDM to increase the throughput and power efficiency.

  6. Validation of Leaf Area Index measurements based on the Wireless Sensor Network platform

    Science.gov (United States)

    Song, Q.; Li, X.; Liu, Q.

    2017-12-01

    The leaf area index (LAI) is one of the important parameters for estimating plant canopy function, which has significance for agricultural analysis such as crop yield estimation and disease evaluation. The quick and accurate access to acquire crop LAI is particularly vital. In the study, LAI measurement of corn crops is mainly through three kinds of methods: the leaf length and width method (LAILLW), the instruments indirect measurement method (LAII) and the leaf area index sensor method(LAIS). Among them, LAI value obtained from LAILLW can be regarded as approximate true value. LAI-2200,the current widespread LAI canopy analyzer,is used in LAII. LAIS based on wireless sensor network can realize the automatic acquisition of crop images,simplifying the data collection work,while the other two methods need person to carry out field measurements.Through the comparison of LAIS and other two methods, the validity and reliability of LAIS observation system is verified. It is found that LAI trend changes are similar in three methods, and the rate of change of LAI has an increase with time in the first two months of corn growth when LAIS costs less manpower, energy and time. LAI derived from LAIS is more accurate than LAII in the early growth stage,due to the small blade especially under the strong light. Besides, LAI processed from a false color image with near infrared information is much closer to the true value than true color picture after the corn growth period up to one and half months.

  7. Summary of the 2012 Wide Area Recovery and Resiliency Program (WARRP) Waste Management Workshop

    Science.gov (United States)

    Workshop advanced the planning of federal, state and local officials in the area of waste management following a chemical, biological or radiological wide-area incident in the Denver, Colorado urban area.

  8. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  9. Body area networks using IEEE 802156 implementing the ultra wide band physical layer

    CERN Document Server

    Hernandez, Marco; Mucchi, Lorenzo

    2014-01-01

    The market of wearable wireless medical sensors is experiencing a rapid growth and the associated telecommunications services for the healthcare sector are forecast to further increase in the next years. Medical body area networks (MBANs) allow the mobility of patients and medical personnel by facilitating the remote monitoring of patients suffering from chronic or risky diseases. Currently, MBANs are being introduced in unlicensed frequency bands, where the risk of mutual interference with other electronic devices radiating in the same band can be high. Thus, coexistence is an issue on which

  10. Value-Based Caching in Information-Centric Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Fadi M. Al-Turjman

    2017-01-01

    Full Text Available We propose a resilient cache replacement approach based on a Value of sensed Information (VoI policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs. These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures. These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.

  11. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available of cybercrime. WLAN digital forensics is seen as not only a response to cybercrime in wireless networks, but also a means to stem the increase of cybercrime in WLANs. The challenge in WLAN digital forensics is to intercept and preserve all the communications...

  12. Fairness and resource allocation in device-to-device wireless regional area network

    NARCIS (Netherlands)

    Shi, H.

    2014-01-01

    With the rapid development in wireless devices, applications and networks, radio frequencies have become scarce resources. Therefore, it is critical to make efficient use of the radio frequencies. A promising way to solve this problem is the use of cognitive radio (CR). In CR, radio frequencies are

  13. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B

  14. Continual observation on crop leaf area index using wireless sensors network

    International Nuclear Information System (INIS)

    Jiao, Sihong

    2014-01-01

    Crop structural parameter, i.e. leaf area index(LAI), is the main factor that can effect the solar energy re-assignment in the canopy. An automatic measuring system which is designed on the basis of wireless sensors network(WSN) is present in this paper. The system is comprised of two types of node. One is the measurement nodes which measured solar irradiance and were deployed beneath and above the canopy respectively, and another is a sink node which was used to collect data from the other measurement nodes. The measurement nodes also have ability to repeater data from one node to another and finally transfer signal to the sink node. Then the collected data of sink node are transferred to the data center through GPRS network. Using the field data collected by WSN, canopy structural parameters can be calculated using the direct transmittance which is the ratio of sun radiation captured by the measurement node beneath and above the canopy on different sun altitude angles. The proposed WSN measurement systems which is consisted of about 45 measurement node was deployed in the Heihe watershed to continually observe the crop canopy structural parameters from 25 June to 24 August 2012. To validate the performance of the WSN measured crop structural parameters, the LAI values were also measured by LAI2000. The field preliminary validation results show that the designed system can capture the varies of solar direct canopy transmittance on different time in a day, which is the basis to calculate the target canopy structural parameters. The validation results reveal that the measured LAI values derived from our propose measurement system have acceptable correlation coefficient(R2 from 0.27 to 0.96 and averaged value 0.42) with those derived from LAI2000. So it is a promising way in the agriculture application to utilize the proposed system and thus will be an efficient way to measure the crop structural parameters in the large spatial region and on the long time series

  15. Continual observation on crop leaf area index using wireless sensors network

    Science.gov (United States)

    Jiao, Sihong

    2014-03-01

    Crop structural parameter, i.e. leaf area index(LAI), is the main factor that can effect the solar energy re-assignment in the canopy. An automatic measuring system which is designed on the basis of wireless sensors network(WSN) is present in this paper. The system is comprised of two types of node. One is the measurement nodes which measured solar irradiance and were deployed beneath and above the canopy respectively, and another is a sink node which was used to collect data from the other measurement nodes. The measurement nodes also have ability to repeater data from one node to another and finally transfer signal to the sink node. Then the collected data of sink node are transferred to the data center through GPRS network. Using the field data collected by WSN, canopy structural parameters can be calculated using the direct transmittance which is the ratio of sun radiation captured by the measurement node beneath and above the canopy on different sun altitude angles. The proposed WSN measurement systems which is consisted of about 45 measurement node was deployed in the Heihe watershed to continually observe the crop canopy structural parameters from 25 June to 24 August 2012. To validate the performance of the WSN measured crop structural parameters, the LAI values were also measured by LAI2000. The field preliminary validation results show that the designed system can capture the varies of solar direct canopy transmittance on different time in a day, which is the basis to calculate the target canopy structural parameters. The validation results reveal that the measured LAI values derived from our propose measurement system have acceptable correlation coefficient(R2 from 0.27 to 0.96 and averaged value 0.42) with those derived from LAI2000. So it is a promising way in the agriculture application to utilize the proposed system and thus will be an efficient way to measure the crop structural parameters in the large spatial region and on the long time series.

  16. 40 CFR 52.326 - Area-wide nitrogen oxides (NOX) exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Area-wide nitrogen oxides (NOX... PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.326 Area-wide nitrogen oxides (NOX) exemptions. The Denver Regional Council of Governments (DRCOG) submitted a NOX exemption...

  17. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  18. Power Load Optimization in a Wireless Communication System in Remote Area

    OpenAIRE

    Feiz, Hossein

    2012-01-01

    ABSTRACT: Obtaining the maximum power is a very important issue in self-powered wireless systems, especially for those fed by solar panels. Solar energy is one of the most significant renewable energy sources which has no pollution and does not make any noise, and because of these advantages using solar energy is increasing rapidly. This thesis is written under the research project called Integrated Homeland Security Surveillance System (IHSSS). IHSSS is a multipurpose security surveillance ...

  19. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  20. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  1. 40 CFR 52.2308 - Area-wide nitrogen oxides (NOX) exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Area-wide nitrogen oxides (NOX) exemptions. 52.2308 Section 52.2308 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR...-wide nitrogen oxides (NOX) exemptions. (a) The Texas Natural Resource Conservation Commission (TNRCC...

  2. A Wireless Sensor Enabled by Wireless Power

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-01-01

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network. PMID:23443370

  3. A Wireless Sensor Enabled by Wireless Power

    Directory of Open Access Journals (Sweden)

    Da-Sheng Lee

    2012-11-01

    Full Text Available Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  4. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  5. A 2.4-GHz BAW-Based Transceiver for Wireless Body Area Networks.

    Science.gov (United States)

    Contaldo, M; Banerjee, B; Ruffieux, D; Chabloz, J; Le Roux, E; Enz, C C

    2010-12-01

    This paper presents a BAW-based transceiver targeting wireless networks for biomedical applications. The use of high-Q microelectromechanical-systems resonators brings interesting benefits to the fundamental building blocks of the frequency synthesis, receiver, and transmitter and allows achieving at the same time low-power consumption, improved phase noise, and high selectivity in the receiver and transmitter paths. In the baseband, the power consumption is minimized thanks to the use of a phase analog-to-digital converter (ADC) which directly quantizes the phase of the received signal instead of using two separate amplitude ADCs. A complete wireless node composed of the transceiver integrated circuit (IC) and a microprocessing IC, both integrated in a standard digital 0.18-μm complementary metal-oxide semiconductor technology are described and validated by measurement results. The RF carrier phase noise is -136.2 dBc/Hz at 1-MHz offset. The transmitter demonstrates 1-Mb/s Gaussian frequency-shift keying modulation at an output power of 5.4 dBm with an overall current of 35 mA, in compliance with Bluetooth and Bluetooth low energy output spectrum requirements. At the receiver, further investigations are needed to find the origins of an unexpected sensitivity of -75 dBm at 200 kb/s.

  6. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  7. Analysis of area-wide management of insect pests based on sampling

    Science.gov (United States)

    David W. Onstad; Mark S. Sisterson

    2011-01-01

    The control of invasive species greatly depends on area-wide pest management (AWPM) in heterogeneous landscapes. Decisions about when and where to treat a population with pesticide are based on sampling pest abundance. One of the challenges of AWPM is sampling large areas with limited funds to cover the cost of sampling. Additionally, AWPM programs are often confronted...

  8. Connected vehicle insights : fourth generation wireless - vehicle and highway gateways to the cloud.

    Science.gov (United States)

    2011-12-01

    This paper examines next generation wide-area cellular such as fourth generation (4G) will be able to support vehicular applications, and how transportation infrastructure may mesh with wireless networks. : This report is part of the Connected Vehicl...

  9. A Conceptual Model for Assessing the Minimum Size Area for an Area-Wide Integrated Pest Management Program

    Directory of Open Access Journals (Sweden)

    Hugh J. Barclay

    2011-01-01

    Full Text Available A conceptual model was developed based on the two basic spatial elements of area-wide integrated pest management (AW-IPM, a core area and a buffer zone, to determine the minimum size of the protected area for the program to be technically feasible and economically justifiable. The model consisted of a biological part (insect dispersal and an economic part. The biological part used random walks and diffusion equations to describe insect dispersal and to determine the minimum width of the buffer zone required to protect the core area from immigration of pests from outside. In the economic part, the size of the core area was calculated to determine the point at which the revenues from the core area equal the control costs. This model will need to be calibrated and validated for each species and geographic location. Tsetse flies and the Mediterranean fruit fly are used as case studies to illustrate the model.

  10. An Adaptive Allocation Algorithm Using Directional CSMA/CA over mmWave Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Hyunhee Park

    2012-04-01

    Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni-antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention-based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP control procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.

  11. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  12. Balancing emergency message dissemination and network lifetime in wireless body area network using ant colony optimization and Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    R. Latha

    Full Text Available Nowadays, Wireless Body Area Network (WBAN is emerging very fast and so many new methods and algorithms are coming up for finding the optimal path for disseminating emergency messages. Ant Colony Optimization (ACO is one of the cultural algorithms for solving many hard problems such as Travelling Salesman Problem (TSP. ACO is a natural behaviour of ants, which work stochastically with the help of pheromone trails deposited in the shortest route to find their food. This optimization procedure involves adapting, positive feedback and inherent parallelism. Each ant will deposit certain amount of pheromone in the tour construction it makes searching for food. This type of communication is known as stigmetric communication. In addition, if a dense WBAN environment prevails, such as hospital, i.e. in the environment of overlapping WBAN, game formulation was introduced for analyzing the mixed strategy behaviour of WBAN. In this paper, the ant colony optimization approach to the travelling salesman problem was applied to the WBAN to determine the shortest route for sending emergency message to the doctor via sensor nodes; and also a static Bayesian game formulation with mixed strategy was analysed to enhance the network lifetime. Whenever the patient needs any critical care or any other medical issue arises, emergency messages will be created by the WBAN and sent to the doctor's destination. All the modes of communication were realized in a simulation environment using OMNet++. The authors investigated a balanced model of emergency message dissemination and network lifetime in WBAN using ACO and Bayesian game formulation. Keywords: Wireless body area network, Ant colony optimization, Bayesian game model, Sensor network, Message latency, Network lifetime

  13. Voltage control and protection in electrical power systems from system components to wide-area control

    CERN Document Server

    Corsi, Sandro

    2015-01-01

    Based on the author’s twenty years of experience, this book shows the practicality of modern, conceptually new, wide area voltage control in transmission and distribution smart grids, in detail. Evidence is given of the great advantages of this approach, as well as what can be gained by new control functionalities which modern technologies now available can provide. The distinction between solutions of wide area voltage regulation (V-WAR) and wide area voltage protection (V-WAP) are presented, demonstrating the proper synergy between them when they operate on the same power system as well as the simplicity and effectiveness of the protection solution in this case. The author provides an overview and detailed descriptions of voltage controls, distinguishing between generalities of underdeveloped, on-field operating applications and modern and available automatic control solutions, which are as yet not sufficiently known or perceived for what they are: practical, high-performance and reliable solutions. At th...

  14. An implementation and test platform for wide area stability assessment methods

    DEFF Research Database (Denmark)

    Wittrock, Martin Lindholm; Jóhannsson, Hjörtur

    2013-01-01

    This paper presents a software platform developed in MatLab with the purpose of supporting research, Development and testing of wide area algorithms for stability assessment and control. The development and testing process of algorithms exploiting real time wide area data from Phasor Measurement...... Units (PMU) can be very time consuming, especially if the testing procedure is not carried out in a systematic and automatic manner. The test platform overcomes this problem by automatically importing system model parameters, topology and simulation output from a time domain simulation of an instability...... scenario and automatically generating synthetic PMU snapshots of the system conditions. To demonstrate the platform’s potential for supporting research and development of wide area algorithms, a method to detect voltage instability is implemented and tested, giving results consistent with results from...

  15. A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Chuang Ma

    2016-01-01

    Full Text Available In wireless sensor networks (WSNs, the presence of congestion increases the ratio of packet loss and energy consumption and reduces the network throughput. Particularly, this situation will be more complex in Internet of Things (IoT environment, which is composed of thousands of heterogeneous nodes. RPL is an IPv6 routing protocol in low power and lossy networks standardized by IETF. However, the RPL can induce problems under network congestion, such as frequently parent changing and throughput degradation. In this paper, we address the congestion problem between parent nodes and child nodes in RPL-enabled networks, which typically consist of low power and resource constraint devices. To mitigate the effect of network congestion, we design a parent-change procedure by game theory strategy, by which the child nodes can change next hop neighbors toward the sink. Comparing to the ContikiRPL implementation, the simulation results show that our protocol can achieve more than two times improvement in throughput and reduce packet loss rate with less increasing of average hop count.

  16. Wireless ECG and PCG Portable Telemedicine Kit for Rural Areas of Colombia

    Directory of Open Access Journals (Sweden)

    Miguel Jimeno

    2014-07-01

    Full Text Available Telemedicine is always a popular topic thanks to the constants advancements of technology. The focus on development of new devices has been mainly on decreasing size to increase portability. Our research focused on improving functionality but not giving up on portability and cost. In this paper we are presenting the first prototype device that measures 4-leads electrocardiogram (ECG and phonocardiogram (PCG signals with low cost, high portability and wireless connectivity features in mind. We designed and developed a prototype that measures ECG using a standard ECG cable; we designed and developed a digital stethoscope prototype and also the necessary hardware for both medical signals to be transmitted through Bluetooth to a computer. We present here the hardware design, a new communication protocol for transmission of both signals from the device to the computer, and the software system to enable remote consultations. We designed the prototype with the main purpose of using low cost parts without sacrificing functionality, with the purpose of using it in remote zones of the Caribbean coast of Colombia. We show open issues and prepare a field implementation of the kit in the target zone.

  17. Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Feng Kai-Ten

    2010-01-01

    Full Text Available The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of the IEEE 802.11n standard, the network goodput can be enhanced with the exploitation of its frame aggregation schemes. However, none of the existing link adaption algorithms are designed to consider the feasible number of aggregated frames that should be utilized for channel-changing environments. In this paper, a frame-aggregated link adaptation (FALA protocol is proposed to dynamically adjust system parameters in order to improve the network goodput under varying channel conditions. For the purpose of maximizing network goodput, both the optimal frame payload size and the modulation and coding schemes are jointly obtained according to the signal-to-noise ratio under specific channel conditions. The performance evaluation is conducted and compared to the existing link adaption protocols via simulations. The simulation results show that the proposed FALA protocol can effectively increase the goodput performance compared to other baseline schemes, especially under dynamically-changing environments.

  18. Bio-Inspired Distributed Transmission Power Control Considering QoS Fairness in Wireless Body Area Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chan-Jae Lee

    2017-10-01

    Full Text Available Recently, the development of wireless body area sensor network (WBASN has accelerated due to the rapid development of wireless technology. In the WBASN environment, many WBASNs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Although nodes in a WBASN typically operate at a low power level, to avoid adversely affecting the human body, high transmission rates may be required to support some applications. In addition to this, since many varieties of applications exist in the WBASN environment, each prospective user may have different quality of service (QoS requirements. Hence, the following issues should be considered in the WBASN environment: (1 interference between adjacent WBASNs, which influences the performance of a specific system, and (2 the degree of satisfaction on the QoS of each user, i.e., the required QoS such as user throughput should be considered to ensure that all users in the network are provided with a fair QoS satisfaction. Thus, in this paper, we propose a transmission power adjustment algorithm that addresses interference problems and guarantees QoS fairness between users. First, we use a new utility function to measure the degree of the satisfaction on the QoS for each user. Then, the transmission power of each sensor node is calculated using the Cucker–Smale model, and the QoS satisfaction of each user is synchronized dispersively. The results of simulations show that the proposed algorithm performs better than existing algorithms, with respect to QoS fairness and energy efficiency.

  19. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  20. Routing protocols in wireless sensor networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  1. Multiagent Model for Wide-Area Disaster-Evacuation Simulations with Local Factors Considered

    Science.gov (United States)

    Muraki, Yuji; Kanoh, Hitoshi

    In this paper, we propose a multiagent model for wide-area disaster-evacuation simulations with local factorsconsidered. Conventional multiagent models for evacuation simulations neither allow general-purpose computers to executewide-area simulations nor allow the object area to be changed easily. If these problems are solved, however, these simulations can be useful for local governments to make disaster damage prevention plan. In the proposed model, each roadis expressed by a series of cells. A computational amount relevant to interaction among agents is reduced by describing themodel for agents to be affected by other agents through the state of each cell. This makes possible wide area simulations. Using the data of a digital map database that is widely used for car navigation systems enables the simulations to beperformed for any region in Japan. Local factors are reflected in simulations by setting some parameters for evacuees, anevacuation environment, and disaster damage prevention plan of the object area. As an evaluation experiment, wesimulated the situations of Kobe city on the date of the Great Hanshin-Awaji Earthquake. Simulations results about thepercentage of evacuees who arrived at refuges were in good agreement with the actual data when parameters forevacuation-start timing were adjusted. We also simulated the current situations of two cities, Kobe and Tsukuba, and confirmed that this model was successfully applied to the two cities. From these evaluation experiments, we believe thatthis model can be applied to various areas and will perform further experiments in the future.

  2. Design of Weighted Wide Area Damping Controller (WWADC Based PSS for Damping Inter-Area Low Frequency Oscillations

    Directory of Open Access Journals (Sweden)

    Saleh M. Bamasak

    2017-09-01

    Full Text Available Wide Area Measurement System (WAMS can extend and effectively improve the power system stabilizers (PSS capability in damping the inter-area low frequency oscillations in interconnected bulk power systems. This paper proposes the implementation of Weighted Wide Area Damping Controller (WWADC in which weighted factors are introduced for each remote feedback signals. Modal analysis approach is implemented for the purpose of identifying the optimal location as well as the input signals’ optimal combination of WWADC. Based on the linearized model, Differential Evolution (DE algorithm is applied to search for optimal controller parameters and optimal weighted factors. The successful application of the proposed approach is achieved in two power networks; the two-area 4-machine system and the IEEE-39 bus 10-machine system. The analysis of the eigenvalue and non-linear time domain simulations indicate that damping the inter-area oscillations and improving the system stability irrespective of the severity and the location of the disturbances can be effectively achieved by WADC

  3. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  4. Area-wide integration of lepidopteran F1 sterility and augmentative biological control

    International Nuclear Information System (INIS)

    Carpenter, James E.

    2000-01-01

    Area-wide pest management (APM) and integrated pest management (IPM) originated from two different efforts to combine two or more control techniques into programmes in which each method could synergise the effectiveness of others and thus create a level of pest control that was greater than that of a single technique (Perkins 1982). Since then, the concept of APM has evolved to include many aspects of IPM and often is now referred to as area-wide IPM. Still, the element of total population management is central to this approach of insect pest management. In support of APM, Knipling (1998) stated that of the insect pests that were of major concern to agriculture before the newer classes of insecticides were available, most are still pests today, the major exceptions being the screw-worm fly and the boll weevil in the southeastern US cotton growing region. Knipling also noted that both of these pest species were subjected to area-wide suppression programmes. In response to the USDA IPM Initiative (USDA 1993, 1994) which seeks to achieve the national goal of having 75% of the crop acres under IPM by the year 2000, the Agricultural Research Service developed an Area-wide IPM Programme. This programme combines environmentally-sound pest control techniques with the advantages of APM and develops partnerships with other federal, state, local and private sector entities. Technologies such as the integration of lepidopteran F 1 sterility and augmentative biological control may be considered for future programmes

  5. Multi Agent System Based Process Control in Wide Area Protection against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    In order to prevent long term voltage instability induced cascading events; a multi agent system (MAS) based wide area protection strategy is proposed in this paper. Due to some unexpected failures of control strategy execution or the consequent unexpected disturbance, the power system will face...... the effectiveness of the improved MAS based protection strategy....

  6. Wide Area Protection Scheme Preventing Cascading Events based on Improved Impedance relay

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  7. 40 CFR 52.992 - Area-wide nitrogen oxides exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Area-wide nitrogen oxides exemptions. 52.992 Section 52.992 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... nitrogen oxides exemptions. (a) The Louisiana Department of Environmental Quality submitted to the EPA on...

  8. 40 CFR 52.2351 - Area-wide nitrogen oxides (NOX) exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Area-wide nitrogen oxides (NOX... nitrogen oxides (NOX) exemption. On May 2, 1997, Ursula Trueman, Director, Division of Air Quality, Utah...)(2)(A) of the Clean Air Act as amended in 1990, a section 182(f)(2) NOX Reasonably Available Control...

  9. VillageLink: A channel allocation technique for wide-area white space networks

    CSIR Research Space (South Africa)

    Pejovic, V

    2015-01-01

    Full Text Available –800MHz band, a large block of frequencies has recently been freed due to the analog to digital TV transition. This spectrum, called white spaces, promises to deliver an affordable means of providing wide area coverage. It is extremely attractive for rural...

  10. On the design of a Radio Numerology for 5G Wide Area

    DEFF Research Database (Denmark)

    Berardinelli, Gilberto; Pedersen, Klaus Ingemann; Frederiksen, Frank

    2015-01-01

    A 5th Generation (5G) radio access technology is expected to cope with the relentless increase of the data traffic demand and is meant to accommodate a plethora of services with different requirements. In this paper, we elaborate on the design of the radio numerology for a 5G wide area system...

  11. Wide area monitoring, protection and control systems the enabler for smarter grids

    CERN Document Server

    Vaccaro, Alfredo

    2016-01-01

    This book is designed to give electrical and electronic engineers involved in the design, operation and maintenance of electrical power networks, the knowledge and skills necessary to deploy synchronised measurement technology (SMT) in Wide Area Monitoring, Protection And Control (WAMPAC) applications.

  12. Summary of field operations Technical Area I well PGS-1. Site-Wide Hydrogeologic Characterization Project

    International Nuclear Information System (INIS)

    Fritts, J.E.; McCord, J.P.

    1995-02-01

    The Environmental Restoration (ER) Project at Sandia National Laboratories, New Mexico is managing the project to assess and, when necessary, to remediate sites contaminated by the lab operations. Within the ER project, the site-wide hydrogeologic characterization task is responsible for the area-wide hydrogeologic investigation. The purpose of this task is to reduce the uncertainty about the rate and direction of groundwater flow beneath the area and across its boundaries. This specific report deals with the installation of PGS-1 monitoring well which provides information on the lithology and hydrology of the aquifer in the northern area of the Kirtland Air Force Base. The report provides information on the well design; surface geology; stratigraphy; structure; drilling, completion, and development techniques; and borehole geophysics information

  13. Compact, Highly Efficient, and Fully Flexible Circularly Polarized Antenna Enabled by Silver Nanowires for Wireless Body-Area Networks.

    Science.gov (United States)

    Jiang, Zhi Hao; Cui, Zheng; Yue, Taiwei; Zhu, Yong; Werner, Douglas H

    2017-08-01

    A compact and flexible circularly polarized (CP) wearable antenna is introduced for wireless body-area network systems at the 2.4 GHz industrial, scientific, and medical (ISM) band, which is implemented by employing a low-loss composite of polydimethylsiloxane (PDMS) and silver nanowires (AgNWs). The circularly polarized radiation is enabled by placing a planar linearly polarized loop monopole above a finite anisotropic artificial ground plane. By truncating the anisotropic artificial ground plane to contain only 2 by 2 unit cells, an integrated antenna with a compact form factor of 0.41λ 0 × 0.41λ 0 × 0.045λ 0 is obtained, all while possessing an improved angular coverage of CP radiation. A flexible prototype was fabricated and characterized, experimentally achieving S 11 antenna is compared to a conventional CP patch antenna of the same physical size, which is also comprised of the same PDMS and AgNW composite. The results of this comparison reveal that the proposed antenna has much more stable performance under bending and human body loading, as well as a lower specific absorption rate. In all, the demonstrated wearable antenna offers a compact, flexible, and robust solution which makes it a strong candidate for future integration into body-area networks that require efficient off-body communications.

  14. Wireless device monitoring systems and monitoring devices, and associated methods

    Science.gov (United States)

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  15. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  16. Wide-area service water information management system; Koiki suido joho kanri system

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A wide-area service water system is required to be more resistant to emergency situations, e.g., drought and hazards, and meet consumers' diversifying needs in each area, while stably supplying water at ordinary times by utilizing purification plants located in places within its system and piping networks in the water area. Fuji Electric is providing information management systems for wide-area service water systems, developed based on the company's abundant system know-hows accumulated for a long time and latest techniques. They are characterized by (1) Web monitoring, aided by an intranet system, (2) high-speed data transmission by a digital transmission system, (3) open network environments, and (4) emergency calling of the staff, and management of stock materials. The system allows to monitor operating conditions within the area on real time, needless to say, and business administration with civil minimum taken into consideration, e.g., stabilizing water quality by coordinating the purification plants within the system. (translated by NEDO)

  17. Comparative analysis of the application of different Low Power Wide Area Network technologies in power grid

    Science.gov (United States)

    Wang, Hao; Sui, Hong; Liao, Xing; Li, Junhao

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but the application principle of different LPWAN technologies in power grid is still not clear. This paper gives a comparative analysis of two mainstream LPWAN technologies including NB-IoT and LoRa, and gives an application suggestion of these two LPWAN technologies, which can guide the planning and construction of LPWAN in power grid.

  18. Camera Networks The Acquisition and Analysis of Videos over Wide Areas

    CERN Document Server

    Roy-Chowdhury, Amit K

    2012-01-01

    As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide

  19. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  20. Wide Area Recovery and Resiliency Program (WARRP) Knowledge Enhancement Events: Waste Management Workshop After Action Report

    Science.gov (United States)

    2012-03-01

    REPORT DATE 16 MAR 2012 2. REPORT TYPE Final 3. DATES COVERED 16 Mar 2012 - 30 Apr 2012 4. TITLE AND SUBTITLE Wide Area Recovery and...Resiliency Program (WARRP) Waste Management Workshop After Action Report 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...the current situation. A new study from 2009 deems composting an option and this will be added to the tables. A suggestion was to add a vaccine

  1. Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...... strategy. The simulation results indicate this strategy can successfully predict and prevent the unexpected relay operation caused by load flow transferring....

  2. High-Speed Optical Wide-Area Data-Communication Network

    Science.gov (United States)

    Monacos, Steve P.

    1994-01-01

    Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.

  3. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  4. Multiagents-based wide area protection with best-effort adaptive strategy

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Yongli; Wang, Dewen [North China Electric Power University, Baoding (China); Song, Shaoqun [Fuzhou Electric Power Industry Bureau, Fujian Province (China)

    2009-02-15

    Abstract - Multi-trips of circuit breakers often occur within a short period in a severe blackout, and the tripping usually relates to relays' mal-operations. In fact, when two ore more electric primary devices are isolated by circuit breakers, the settings of most relays to protect their power system are getting infeasible and uncoordinated. Adaptive settings are needed to prevent them from wrong operation. This paper presents an adaptive protection scheme based on wide area information with best-effort protection strategy, and the outline of multiagents and WAN Based Adaptive Protection System (MAWAPS). In the scheme, the best-effort adaptive strategy is used to guarantee the adaptive settings to operate safely and effectively in most situations. The IP/SDH-based wide area network (WAN) is used to realize real-time wide area information exchange in the proposed protection scheme. Adaptive setting algorithms for the second stage zero-sequence current and phase overcurrent relays are proposed, which can provide larger line coverage than traditional relays. Moreover, multiagent techniques and IEC 61850 are employed to realize the fast communication between different agents, and MMS plays a prominent role in real-time remote communication. A simulating system has been developed according to the above ideas and approaches, and the experimental results show that the proposed adaptive protection scheme is feasible from the view of protective performance including the executing time. (author)

  5. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  6. Area-wide pest management of fruit flies in Hawaiian fruits and vegetables

    International Nuclear Information System (INIS)

    Vargas, Roger I.; Jang, Eric B.; Klungness, L. Michael

    2003-01-01

    Four economically important fruit flies have been accidentally introduced into Hawaii: melon fly, Mediterranean fruit fly, oriental fruit fly, and the so-called Malaysian (solanaceous) fruit fly. Over 400 different host fruits are attacked. These fruit flies inhibit development of a diversified tropical fruit and vegetable industry, require that commercial fruits undergo quarantine treatment prior to export, and in Hawaii provide a breeding reservoir for their introduction into the continental United States. These exotic pests a serious threat of establishment into new areas with movement of people and commodities throughout the U.S. and the world. For example, if the Mediterranean fruit fly became established in California, projected losses would exceed $1 billion per year due to trade embargoes, loss of jobs, increased pesticide use, and direct crop loss. Present fruit fly control measures in Hawaii relay heavily on the application of organophosphate and carbamate insecticides to crops. Overuse of these insecticides has been implicated with secondary pest outbreaks, negative effects on beneficial insects, environmental contamination and adverse effects on human health. In 1999 a 5 year Area-wide Pest Management (AWPM) program was funded (for FY2000) for management of fruit flies in Hawaii. The goal of the Fruit Fly AWPM program is to develop and integrate biologically based pest management approaches that will result in area-wide suppression and control of fruit flies throughout selected agricultural areas of Hawaii. The IPM program will integrate two or more technologies into a comprehensive package that is economically viable, environmentally acceptable and sustainable. The program will result in a reduction in the use of organophosphate insecticides, and further growth and development of diversified agriculture in Hawaii. The technologies include: 1) field sanitation, 2) protein bait sprays and/or traps, 3) male annihilation with male lures and attractants, 4

  7. Secure Multi-Gigabit Ultra-Wide Band Communications for Personal Area Networks

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Puerta Ramírez, Rafael; Tafur Monroy, Idelfonso

    2016-01-01

    scenarios where the user may be located in public spaces. We propose to use Ultra-Wideband communications, which can be seamlessly transported over fiber or wireless, and show different transmission experiments ranging from 2 Gbit/s to 35 Gbit/s. To achieve these record bit rates, the multi-band approach...

  8. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  9. An Interference-Aware Traffic-Priority-Based Link Scheduling Algorithm for Interference Mitigation in Multiple Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Thien T. T. Le

    2016-12-01

    Full Text Available Currently, wireless body area networks (WBANs are effectively used for health monitoring services. However, in cases where WBANs are densely deployed, interference among WBANs can cause serious degradation of network performance and reliability. Inter-WBAN interference can be reduced by scheduling the communication links of interfering WBANs. In this paper, we propose an interference-aware traffic-priority-based link scheduling (ITLS algorithm to overcome inter-WBAN interference in densely deployed WBANs. First, we model a network with multiple WBANs as an interference graph where node-level interference and traffic priority are taken into account. Second, we formulate link scheduling for multiple WBANs as an optimization model where the objective is to maximize the throughput of the entire network while ensuring the traffic priority of sensor nodes. Finally, we propose the ITLS algorithm for multiple WBANs on the basis of the optimization model. High spatial reuse is also achieved in the proposed ITLS algorithm. The proposed ITLS achieves high spatial reuse while considering traffic priority, packet length, and the number of interfered sensor nodes. Our simulation results show that the proposed ITLS significantly increases spatial reuse and network throughput with lower delay by mitigating inter-WBAN interference.

  10. Design Considerations for a Sub-mW Wireless Medical Body-Area Network Receiver Front End

    Directory of Open Access Journals (Sweden)

    Ehsan Kargaran

    2018-01-01

    Full Text Available Wireless medical body-area networks are used to connect sensor nodes that monitor vital parameters. The radio consumes a large portion of the sensor energy budget, and hence its power dissipation should be minimized. The low-noise amplifier (LNA is an important component of the receiver, and must guarantee low-noise amplification and impedance matching. In this work, an ultra-low-voltage ultra-low-power LNA is proposed that, thanks to the proposed transformer-based gate boosting technique, has a reduced current consumption of only 160 μA and can operate with a supply as low as 0.18 V. The LNA was designed using 40 nm Complementary Metal-Oxide Semiconductor (CMOS technology and features a voltage gain of 14 dB, 5.2 dB NF and −8.6 dBm IIP3. This performance is comparable to a prior work by the same authors, but with the minimum supply voltage reduced by a factor of 4x.

  11. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  12. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  13. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Raber, Ellen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kirvel, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Don [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Love, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dombroski, Matthew [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McGrann, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Richards, John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Melius, Carl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bunt, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hibbard, Wilthea [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Greenwalt, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Miles, Robin [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dillon, Michael [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mancieri, Sav [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Harris, Steve [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Michalik, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wheeler, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hoppes, Bill [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Tucker, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krauter, Paula [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knowlton, Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yang, Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Franco, Dave [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Einfeld, Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brockman, John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Betty, Rita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urban area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision

  14. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  15. A framework for activity detection in wide-area motion imagery

    Energy Technology Data Exchange (ETDEWEB)

    Porter, Reid B [Los Alamos National Laboratory; Ruggiero, Christy E [Los Alamos National Laboratory; Morrison, Jack D [Los Alamos National Laboratory

    2009-01-01

    Wide-area persistent imaging systems are becoming increasingly cost effective and now large areas of the earth can be imaged at relatively high frame rates (1-2 fps). The efficient exploitation of the large geo-spatial-temporal datasets produced by these systems poses significant technical challenges for image and video analysis and data mining. In recent years there has been significant progress made on stabilization, moving object detection and tracking and automated systems now generate hundreds to thousands of vehicle tracks from raw data, with little human intervention. However, the tracking performance at this scale, is unreliable and average track length is much smaller than the average vehicle route. This is a limiting factor for applications which depend heavily on track identity, i.e. tracking vehicles from their points of origin to their final destination. In this paper we propose and investigate a framework for wide-area motion imagery (W AMI) exploitation that minimizes the dependence on track identity. In its current form this framework takes noisy, incomplete moving object detection tracks as input, and produces a small set of activities (e.g. multi-vehicle meetings) as output. The framework can be used to focus and direct human users and additional computation, and suggests a path towards high-level content extraction by learning from the human-in-the-loop.

  16. GNSS-based train positioning experiments with local and wide area augmentation

    Energy Technology Data Exchange (ETDEWEB)

    Gu, X.; Schmidt, M.; Winter, J. [DaimlerChrysler Rail Systems (Signals) GmbH, Ulm (Germany)

    1999-07-01

    Within the frame of the MAGNET Project ('Multimodal Approach for GNSS 1 in European Transport') of the Telematics Applications programme of the 4{sup th} Research Framework of the European Community (1994-1998), a GNSS-based Train Positioning Platform (TPP) has been developed and tested with the wide area augmentation system pre-EGNOS and a local differential GNSS system using a reference station. This paper presents the principle and the system architecture of the developed GNSS-based train positioning system and highlights the system performance achieved in field tests. The TPP consists of a GNSS core module with an EGNOS (European Geostationary Navigation Overlay Service) decoding function, a GSM (Global System for Mobile Communication) data link for local GPS and GLONASS differential corrections, a digital route map and an interface to odometer. The first step to calculate the train position is to select either wide area or local area differential corrections depending on which are available. The position and velocity are then calculated and matched to the track by using the digital route map. Finally, the GNSS position and velocity data is integrated with odometer data in a sensor data fusion model. The integrated solution avoids the masking problem of GNSS signals and reduces odometer errors like drift and braking slip, so that a continuous positioning availability can be reached and the positioning accuracy can be improved to meter level. The achieved performance is being exploited for industrial applications. (orig.)

  17. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  18. New trends in InSAR time series analysis for wide area deformation mapping

    Science.gov (United States)

    Hanssen, R. F.; Caro Cuenca, M.; Hooper, A.; Mahapatra, P.; Arikan, M.; Bekaert, D.

    2012-04-01

    Synthetic aperture radar interferometry (InSAR) is a remote sensing technique that is extensively used to measure deformation at the Earth's surface. Although it has proven very successful to estimate small-scale (up to tens of km) deformation phenomena, InSAR still has limitations when applied to study wide areas (hundreds of km). First, radar observations are affected by atmospheric delay and errors in sensor position (also referred to as orbital errors). Both of these translate into large scale signals in InSAR estimations that can be interpreted as a non-existing deformation phenomenon. Second, since InSAR produces deformation maps relative to an area (or pixel) that is part of the observed track, combination of adjacent tracks requires the connection of these relative measurements to a common area or reference point. This operation is, however, non-trivial and is preferably performed in combination with in situ data. In this contribution, we explore different case studies where we address the aforementioned limitations to measure deformation in wide areas. They include the whole country of the Netherlands, the area of El Guerrero in Mexico and the North Anatolian Fault in Turkey. Our initial strategy is to filter out atmospheric and orbital errors assuming they are uncorrelated in time. However, this assumption does not always hold. Therefore, ancillary data, such as GPS and leveling, is also used for a precise estimation of the large scale deformation signal. Furthermore, datum connection is performed with ancillary data as well where different radar tracks and other geodetic data are combined to obtain the final deformation map in a common reference system. We also explore how compact radar transponders can help to tackle the datum connection problem.

  19. Emerging Technologies and Techniques for Wide Area Radiological Survey and Remediation

    Energy Technology Data Exchange (ETDEWEB)

    Sutton, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zhao, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-03-24

    Technologies to survey and decontaminate wide-area contamination and process the subsequent radioactive waste have been developed and implemented following the Chernobyl nuclear power plant release and the breach of a radiological source resulting in contamination in Goiania, Brazil. These civilian examples of radioactive material releases provided some of the first examples of urban radiological remediation. Many emerging technologies have recently been developed and demonstrated in Japan following the release of radioactive cesium isotopes (Cs-134 and Cs-137) from the Fukushima Dai-ichi nuclear power plant in 2011. Information on technologies reported by several Japanese government agencies, such as the Japan Atomic Energy Agency (JAEA), the Ministry of the Environment (MOE) and the National Institute for Environmental Science (NIES), together with academic institutions and industry are summarized and compared to recently developed, deployed and available technologies in the United States. The technologies and techniques presented in this report may be deployed in response to a wide area contamination event in the United States. In some cases, additional research and testing is needed to adequately validate the technology effectiveness over wide areas. Survey techniques can be deployed on the ground or from the air, allowing a range of coverage rates and sensitivities. Survey technologies also include those useful in measuring decontamination progress and mapping contamination. Decontamination technologies and techniques range from non-destructive (e.g., high pressure washing) and minimally destructive (plowing), to fully destructive (surface removal or demolition). Waste minimization techniques can greatly impact the long-term environmental consequences and cost following remediation efforts. Recommendations on technical improvements to address technology gaps are presented together with observations on remediation in Japan.

  20. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  1. MPWide: a light-weight library for efficient message passing over wide area networks

    Directory of Open Access Journals (Sweden)

    Derek Groen

    2013-12-01

    Full Text Available We present MPWide, a light weight communication library which allows efficient message passing over a distributed network. MPWide has been designed to connect application running on distributed (supercomputing resources, and to maximize the communication performance on wide area networks for those without administrative privileges. It can be used to provide message-passing between application, move files, and make very fast connections in client-server environments. MPWide has already been applied to enable distributed cosmological simulations across up to four supercomputers on two continents, and to couple two different bloodflow simulations to form a multiscale simulation.

  2. Multiagent System-Based Wide-Area Protection and Control Scheme against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2015-01-01

    In this paper, a multi agent system (MAS) based wide area protection and control scheme is proposed to deal with the long term voltage instability induced cascading trips. Based on sensitivity analysis between the relay operation margin and power system state variables, an optimal emergency control...... strategy. A hybrid simulation platform based on LabVIEW and real time digital simulator (RTDS) is set up to simulate a blackout case in the power system of Eastern Denmark and to demonstrate the effectiveness of the proposed MAS based protection strategy....

  3. Wide area 2D/3D imaging development, analysis and applications

    CERN Document Server

    Langmann, Benjamin

    2014-01-01

    Imaging technology is an important research area and it is widely utilized in a growing number of disciplines ranging from gaming, robotics and automation to medicine. In the last decade 3D imaging became popular mainly driven by the introduction of novel 3D cameras and measuring devices. These cameras are usually limited to indoor scenes with relatively low distances. Benjamin Langmann introduces medium and long-range 2D/3D cameras to overcome these limitations. He reports measurement results for these devices and studies their characteristic behavior. In order to facilitate the application o

  4. Leaf Area Index (LAI Estimation of Boreal Forest Using Wide Optics Airborne Winter Photos

    Directory of Open Access Journals (Sweden)

    Pauline Stenberg

    2009-12-01

    Full Text Available A new simple airborne method based on wide optics camera is developed for leaf area index (LAI estimation in coniferous forests. The measurements are carried out in winter, when the forest floor is completely snow covered and thus acts as a light background for the hemispherical analysis of the images. The photos are taken automatically and stored on a laptop during the flights. The R2 value of the linear regression of the airborne and ground based LAI measurements was 0.89.

  5. A Flexible 5G Wide Area Solution for TDD with Asymmetric Link Operation

    DEFF Research Database (Denmark)

    Pedersen, Klaus I.; Berardinelli, Gilberto; Frederiksen, Frank

    2017-01-01

    A flexible multi-service 5G wide area (WA) solution for time division duplex (TDD) operation is outlined in this article. In particular, the Associated frame design is in focus. Given the fundamental tradeoffs between capacity, coverage, latency, and reliability, a flexible solution that allows...... operation is proposed, where users operate with different minimum transmission times for the two link directions. This is achieved by using a highly flexible asynchronous hybrid Automatic repeat request (HARQ) scheme, as well as a novel solution with in-resource control channel signaling for the scheduling...

  6. Solar 27-day rotational period detected in wide-area lightning activity in Japan

    Science.gov (United States)

    Miyahara, Hiroko; Higuchi, Chika; Terasawa, Toshio; Kataoka, Ryuho; Sato, Mitsuteru; Takahashi, Yukihiro

    2017-04-01

    A signal of the 27-day solar rotational period is often observed in cloud and lightning activities over the globe. Here we provide evidence of the 27-day periodicity of lightning activity in Japan using daily observational records of lightning for AD 1989-2015. The 27-day period is detected with 4.2 standard deviations, but only in wide-area lightning activity covering more than a 105 km2. The 27-day signal is more prominent around the maxima of solar decadal cycles.

  7. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference

  8. Decentralized Gauss-Newton method for nonlinear least squares on wide area network

    Science.gov (United States)

    Liu, Lanchao; Ling, Qing; Han, Zhu

    2014-10-01

    This paper presents a decentralized approach of Gauss-Newton (GN) method for nonlinear least squares (NLLS) on wide area network (WAN). In a multi-agent system, a centralized GN for NLLS requires the global GN Hessian matrix available at a central computing unit, which may incur large communication overhead. In the proposed decentralized alternative, each agent only needs local GN Hessian matrix to update iterates with the cooperation of neighbors. The detail formulation of decentralized NLLS on WAN is given, and the iteration at each agent is defined. The convergence property of the decentralized approach is analyzed, and numerical results validate the effectiveness of the proposed algorithm.

  9. Solar 27-day rotational period detected in wide-area lightning activity in Japan

    Directory of Open Access Journals (Sweden)

    H. Miyahara

    2017-04-01

    Full Text Available A signal of the 27-day solar rotational period is often observed in cloud and lightning activities over the globe. Here we provide evidence of the 27-day periodicity of lightning activity in Japan using daily observational records of lightning for AD 1989–2015. The 27-day period is detected with 4.2 standard deviations, but only in wide-area lightning activity covering more than a 105 km2. The 27-day signal is more prominent around the maxima of solar decadal cycles.

  10. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  11. Wide-area Power System Oscillation Damping using Model Predictive Control Technique

    Science.gov (United States)

    Mohamed, Tarek Hassan; Abdel-Rahim, Abdel-Moamen Mohammed; Hassan, Ahmed Abd-Eltawwab; Hiyama, Takashi

    This paper presents a new approach to deal with the problem of robust tuning of power system stabilizer (PSS) and automatic voltage regulator (AVR) in multi-machine power systems. The proposed method is based on a model predictive control (MPC) technique, for improvement stability of the wide-area power system with multiple generators and distribution systems including dispersed generations. The proposed method provides better damping of power system oscillations under small and large disturbances even with the inclusion of local PSSs. The effectiveness of the proposed approach is demonstrated through a two areas, four machines power system. A performance comparison between the proposed controller and some of other controllers is carried out confirming the superiority of the proposed technique. It has also been observed that the proposed algorithm can be successfully applied to larger multiarea power systems and do not suffer with computational difficulties. The proposed algorithm carried out using MATLAB/SIMULINK software package.

  12. Tile prediction schemes for wide area motion imagery maps in GIS

    Science.gov (United States)

    Michael, Chris J.; Lin, Bruce Y.

    2017-11-01

    Wide-area surveillance, traffic monitoring, and emergency management are just several of many applications benefiting from the incorporation of Wide-Area Motion Imagery (WAMI) maps into geographic information systems. Though the use of motion imagery as a GIS base map via the Web Map Service (WMS) standard is not a new concept, effectively streaming imagery is particularly challenging due to its large scale and the multidimensionally interactive nature of clients that use WMS. Ineffective streaming from a server to one or more clients can unnecessarily overwhelm network bandwidth and cause frustratingly large amounts of latency in visualization to the user. Seamlessly streaming WAMI through GIS requires good prediction to accurately guess the tiles of the video that will be traversed in the near future. In this study, we present an experimental framework for such prediction schemes by presenting a stochastic interaction model that represents a human user's interaction with a GIS video map. We then propose several algorithms by which the tiles of the stream may be predicted. Results collected both within the experimental framework and using human analyst trajectories show that, though each algorithm thrives under certain constraints, the novel Markovian algorithm yields the best results overall. Furthermore, we make the argument that the proposed experimental framework is sufficient for the study of these prediction schemes.

  13. Farmer education and organization in the Hawaii area-wide fruit fly pest management program

    International Nuclear Information System (INIS)

    Mau, Ronald F.L.; Sugano, J.S.; Jang, Eric

    2003-01-01

    A critical component of successful area wide pest management (AWPM) programs are organized, coordinated and comprehensive outreach educational programs. The Hawaii area wide fruit fly pest management (HAW-FLYPM) program's educational program, a part of a USDA AWPM program in Hawaii, utilized the 'logic model' approach to organize, plan, execute and evaluate farmer and community educational programs statewide. The logic model approach was an outcome-driven rather than activity based method that employed a linear sequence that developed relationships between program inputs, outputs and outcomes. This model was utilized extensively to transfer sustainable, science-based technologies to suppress tephritid fruit fly pests. HAW-FLYPM's educational program targeted growers and community door yard growers, three teaching curricula aimed at elementary through high school students, and a statewide awareness program for the pubic at large. Additional key components of the HAW-FLYPM education program was the development of implementation schedules used to track program progress, a comprehensive media matrix developed to ensure educational materials met the needs of target audience groups, and a sustainability calculator to assess the likelihood of program sustainability after the initial five year funding cycle. The model served as a 'blue print' for ensuring program elements were planned, delivered and executed on a timely basis. Utilization of the logic model to organize efforts and manage diverse, multi agency programs such as the HAW-FLYPM program has shown to be a successful method of program advancement and outcome achievement. (author)

  14. Blanket illumination vs scanned-mosaicking imaging schemes for wide-area photoacoustic tomography

    Science.gov (United States)

    Barber, Quinn; Harrison, Tyler; Zemp, Roger J.

    2015-03-01

    We compare scanned-mosaicking and blanket illumination schemes for wide-field photoacoustic tomography with potential applications to breast imaging. For each illumination, a locally high-SNR image patch is reconstructed then mosaicked with image patches from other illuminations. Because the beam is not diffused over the entire area, the fluence of the beam can be maximized, therefore maximizing the signal generated. Moreover, the imaging can potentially still be done fast enough within a breath-hold. A Monte Carlo simulation as a function of beam-spot size and depth is performed to quantify this signal gain. We experimentally test both schemes using a 256-element Imasonic ring array on a tissue-mimicking phantom. We were able to verify the simulated signal gain of 2.9x under 0.5 cm of tissue with the experimental data, and measured the signal gain decrease expected when imaging deeper into the tissue. We also measured the effectiveness of averaging the diffused beam versus the scanned-mosaicking approach, and observed that for the same scan times and limited laser power output, scanned-mosaicking was able to produce a higher SNR than the blanket illumination approach. We have shown that this technique will allow wide-area PAT to utilize the maximum SNR available from any system while minimizing the number of acquisitions to reach this SNR.

  15. Wide area data replication in an ITER-relevant data environment

    International Nuclear Information System (INIS)

    Centioli, C.; Iannone, F.; Panella, M.; Vitale, V.; Bracco, G.; Guadagni, R.; Migliori, S.; Steffe, M.; Eccher, S.; Maslennikov, A.; Mililotti, M.; Molowny, M.; Palumbo, G.; Carboni, M.

    2005-01-01

    The next generation of tokamak experiments will require a new way of approaching data sharing issues among fusion organizations. In the fusion community, many researchers at different worldwide sites will analyse data produced by International Thermonuclear Experimental Reactor (ITER), wherever it will be built. In this context, an efficient availability of the data in the sites where the computational resources are located becomes a major architectural issue for the deployment of ITER computational infrastructure. The approach described in this paper goes beyond the usual site-centric model mainly devoted to granting access exclusively to experimental data stored at the device sites. To this aim, we propose a new data replication architecture relying on a wide area network, based on a Master/Slave model and on synchronization techniques producing mirrored data sites. In this architecture, data replication will affect large databases (TB) as well as large UNIX-like file systems, using open source-based software components, namely MySQL, as database management system, and RSYNC and BBFTP for data transfer. A test-bed has been set up to evaluate the performance of the software components underlying the proposed architecture. The test-bed hardware layout deploys a cluster of four Dual-Xeon Supermicro each with a raid array of 1 TB. High performance network line (1 Gbit over 400 km) provides the infrastructure to test the components on a wide area network. The results obtained will be thoroughly discussed

  16. Wide area data replication in an ITER-relevant data environment

    Energy Technology Data Exchange (ETDEWEB)

    Centioli, C. [Associazione EURATOM/ENEA sulla Fusione, Centro Ricerche Frascati, p.b. 65, 00044 Frascati Rome (Italy); Iannone, F. [Associazione EURATOM/ENEA sulla Fusione, Centro Ricerche Frascati, p.b. 65, 00044 Frascati Rome (Italy)]. E-mail: francesco.iannone@frascati.enea.it; Panella, M. [Associazione EURATOM/ENEA sulla Fusione, Centro Ricerche Frascati, p.b. 65, 00044 Frascati Rome (Italy); Vitale, V. [Associazione EURATOM/ENEA sulla Fusione, Centro Ricerche Frascati, p.b. 65, 00044 Frascati Rome (Italy); Bracco, G. [ENEA-INFO Central Computer and Network Service, Lungotevere Thaon di Revel 76, 00196 Rome (Italy); Guadagni, R. [ENEA-INFO Central Computer and Network Service, Lungotevere Thaon di Revel 76, 00196 Rome (Italy); Migliori, S. [ENEA-INFO Central Computer and Network Service, Lungotevere Thaon di Revel 76, 00196 Rome (Italy); Steffe, M. [ENEA-INFO Central Computer and Network Service, Lungotevere Thaon di Revel 76, 00196 Rome (Italy); Eccher, S. [CASPUR Inter-University Computing Consortium, Via dei Tizii 6B, 00185 Rome (Italy); Maslennikov, A. [CASPUR Inter-University Computing Consortium, Via dei Tizii 6B, 00185 Rome (Italy); Mililotti, M. [CASPUR Inter-University Computing Consortium, Via dei Tizii 6B, 00185 Rome (Italy); Molowny, M. [CASPUR Inter-University Computing Consortium, Via dei Tizii 6B, 00185 Rome (Italy); Palumbo, G. [CASPUR Inter-University Computing Consortium, Via dei Tizii 6B, 00185 Rome (Italy); Carboni, M. [GARR Consortium - Viale Palmiro Togliatti 1625, 00155 Rome (Italy)

    2005-11-15

    The next generation of tokamak experiments will require a new way of approaching data sharing issues among fusion organizations. In the fusion community, many researchers at different worldwide sites will analyse data produced by International Thermonuclear Experimental Reactor (ITER), wherever it will be built. In this context, an efficient availability of the data in the sites where the computational resources are located becomes a major architectural issue for the deployment of ITER computational infrastructure. The approach described in this paper goes beyond the usual site-centric model mainly devoted to granting access exclusively to experimental data stored at the device sites. To this aim, we propose a new data replication architecture relying on a wide area network, based on a Master/Slave model and on synchronization techniques producing mirrored data sites. In this architecture, data replication will affect large databases (TB) as well as large UNIX-like file systems, using open source-based software components, namely MySQL, as database management system, and RSYNC and BBFTP for data transfer. A test-bed has been set up to evaluate the performance of the software components underlying the proposed architecture. The test-bed hardware layout deploys a cluster of four Dual-Xeon Supermicro each with a raid array of 1 TB. High performance network line (1 Gbit over 400 km) provides the infrastructure to test the components on a wide area network. The results obtained will be thoroughly discussed.

  17. Wide-area video exploitation (WAVE) joint data management (JDM) for layered sensing

    Science.gov (United States)

    Blasch, Erik P.; Seetharaman, Guna; Russell, Stephen

    2011-06-01

    Emerging technologies of high performance computing facilitate increased data collection for wide area sensing; however, joint data management concepts of operations (CONOPs) are important to fully realize system-level performance. Joint data management (JDM) includes the hardware (e.g. sensors/targets), software (e.g. processing/algorithms), entities (e.g. service-based collections), and operations (scenario-based environments) of data exchange that enable persistent surveillance in the context of a layered sensing or data-to-decision (D2D) information fusion enterprise. Key attributes of an information fusion enterprise system require pragmatic assessment of data and information management, distributed communications, knowledge representation as well as a sensor mix, algorithm choice, life-cycle data management, and human-systems interaction. In this paper, we explore the various issues surrounding Wide-Area Video Exploitation (WAVE) in a layered-sensing environment to include improvements in Joint Data Management such as (1) data collection, construction, and transformation, (2) feature generation, extraction and selection, and (3) information evaluation, presentation, and dissemination. Throughout the paper, we seek to describe the current technology, research directions, and metrics that instantiate a realizable JDM product. We develop the methods for joint data management for structured and unstructured WAVE data in the context of decision making. Discerning accurate track and identification target information from WAVE JDM provides a moving intelligence (MOVINT) capability.

  18. Impact of the error sensing probability in wide coverage areas of clustered-based wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Edgar Romo-Montiel

    2016-01-01

    Full Text Available Las redes inalámbricas de sensores están compuestas por un gran número de nodos autónomos que vigilan algún parámetro del ambiente de interés, como puede ser la temperatura, la humedad o incluso objetivos móviles. Este trabajo se enfoca en la detección de móviles en áreas amplias como puede ser la vigilancia de animales en un bosque o la detección de vehículos en misiones de seguridad. Específicamente, se propone, analiza y estudia un protocolo de agrupación de bajo consumo de energía. Para ello, se presentan dos esquemas de comunicaciones basados en el bien conocido protocolo LEACH. El desempeño del sistema se estudia por medio de un modelo matemático que describe el comportamiento de la red bajo los parámetros más relevantes, como son: radio de cobertura, radio de transmisión y número de nodos en la red. Adicionalmente, se estudia la probabilidad de transmisión en la fase de formación de grupos bajo consideraciones realistas de un canal inalámbrico, en donde la detección de la señal tiene errores debido a la interferencia y ruido en el canal de acceso

  19. KOLAM: a cross-platform architecture for scalable visualization and tracking in wide-area imagery

    Science.gov (United States)

    Fraser, Joshua; Haridas, Anoop; Seetharaman, Guna; Rao, Raghuveer M.; Palaniappan, Kannappan

    2013-05-01

    KOLAM is an open, cross-platform, interoperable, scalable and extensible framework supporting a novel multi- scale spatiotemporal dual-cache data structure for big data visualization and visual analytics. This paper focuses on the use of KOLAM for target tracking in high-resolution, high throughput wide format video also known as wide-area motion imagery (WAMI). It was originally developed for the interactive visualization of extremely large geospatial imagery of high spatial and spectral resolution. KOLAM is platform, operating system and (graphics) hardware independent, and supports embedded datasets scalable from hundreds of gigabytes to feasibly petabytes in size on clusters, workstations, desktops and mobile computers. In addition to rapid roam, zoom and hyper- jump spatial operations, a large number of simultaneously viewable embedded pyramid layers (also referred to as multiscale or sparse imagery), interactive colormap and histogram enhancement, spherical projection and terrain maps are supported. The KOLAM software architecture was extended to support airborne wide-area motion imagery by organizing spatiotemporal tiles in very large format video frames using a temporal cache of tiled pyramid cached data structures. The current version supports WAMI animation, fast intelligent inspection, trajectory visualization and target tracking (digital tagging); the latter by interfacing with external automatic tracking software. One of the critical needs for working with WAMI is a supervised tracking and visualization tool that allows analysts to digitally tag multiple targets, quickly review and correct tracking results and apply geospatial visual analytic tools on the generated trajectories. One-click manual tracking combined with multiple automated tracking algorithms are available to assist the analyst and increase human effectiveness.

  20. Quantifying Wide-Area Continental Deformation: Palinspastic Reconstruction of the Northern Andes

    Science.gov (United States)

    Montes, C.; Rodriguez-Corcho, A. F.; Hoyos, N.; Cardona, A.; Bayona, G.

    2017-12-01

    The northern Andes could either be called a very wide plate margin, or an area of intraplate distributed deformation. At its apex, the northern Andes reach 5500 m elevation, nearly 600 km inboard from the margin (this is as far inland as the Sierras Pampeanas in Argentina). This part of the Andean belt is characterized by northeast-trending, wide deformation belts that turn eastwardly to define the sharp southern Caribbean plate boundary to the east. Regardless of kinematic model preferences, or reconstruction methodologies, any attempt to map deformation in the northern Andes and the southern Caribbean plate should honor known strain datasets and chronology of deformation in a way that allows quantification of wide- area deformation. We compiled all available strain datasets. These include shortening estimates, paleomagnetic declination data, and discrete kinematic markers. Shortening in the northern Andes has traditionally been estimated by constructing cross-sections perpendicular to the main structural trends, therefore missing any along-strike deformation. Recent GPS data confirms that modern convergence vectors are oblique to main structural trends, not orthogonal. Despite differences in interpretation and structural style, cross-sections across the Eastern cordillera of Colombia show roughly consistent shortening values. A paleomagnetic dataset shows that large vertical-axis clockwise rotations are dominant in the northwestern corner of South America and southern Caribbean margin, but absent in the Eastern cordillera. Vertical-axis rotations are again large in the Central American arc. Paleogeographic piercing points such as stranded high-grade clasts, displaced metamorphic belts, and provenance analyses, constrain strike-slip faulting, where often several hundreds of kilometers of displacement can be inferred. Combining all of these datasets into a single kinematic reconstruction (using freeware GPlates), that also respects known timing of deformation

  1. A wide area of air pollutant impact downwind of a freeway during pre-sunrise hours

    Science.gov (United States)

    Hu, Shishan; Fruin, Scott; Kozawa, Kathleen; Mara, Steve; Paulson, Suzanne E.; Winer, Arthur M.

    We have observed a wide area of air pollutant impact downwind of a freeway during pre-sunrise hours in both winter and summer seasons. In contrast, previous studies have shown much sharper air pollutant gradients downwind of freeways, with levels above background concentrations extending only 300 m downwind of roadways during the day and up to 500 m at night. In this study, real-time air pollutant concentrations were measured along a 3600 m transect normal to an elevated freeway 1-2 h before sunrise using an electric vehicle mobile platform equipped with fast-response instruments. In winter pre-sunrise hours, the peak ultrafine particle (UFP) concentration (˜95 000 cm -3) occurred immediately downwind of the freeway. However, downwind UFP concentrations as high as ˜40 000 cm -3 extended at least 1200 m from the freeway, and did not reach background levels (˜15 000 cm -3) until a distance of about 2600 m. UFP concentrations were also elevated over background levels up to 600 m upwind of the freeway. Other pollutants, such as NO and particle-bound polycyclic aromatic hydrocarbons, exhibited similar long-distance downwind concentration gradients. In contrast, air pollutant concentrations measured on the same route after sunrise, in the morning and afternoon, exhibited the typical daytime downwind decrease to background levels within ˜300 m as found in earlier studies. Although pre-sunrise traffic volumes on the freeway were much lower than daytime congestion peaks, downwind UFP concentrations were significantly higher during pre-sunrise hours than during the daytime. UFP and NO concentrations were also strongly correlated with traffic counts on the freeway. We associate these elevated pre-sunrise concentrations over a wide area with a nocturnal surface temperature inversion, low wind speeds, and high relative humidity. Observation of such wide air pollutant impact area downwind of a major roadway prior to sunrise has important exposure assessment implications

  2. Performance analysis of data retrieval in wireless sensor networks

    NARCIS (Netherlands)

    Mitici, M.A.

    2015-01-01

    Wireless sensor networks are currently revolutionizing the way we live, work, and interact with the surrounding environment. Due to their ease of deployment, cost effectiveness and versatile functionality, sensors are employed in a wide range of areas such as environmental monitoring, surveillance

  3. Simulating Brown hare (Lepus europaeus Pallas dispersion: a tool for wildlife management of wide areas

    Directory of Open Access Journals (Sweden)

    Andrea Amici

    2010-01-01

    Full Text Available The second half of the 20th century was characterised by intense processes of urbanisation, industrialisation and agricultural mechanisation, leading to a fragmentation of the agricultural and forest landscape. This, in turn, reduced the bio-permeability of the territory and affected the dispersion of many wild species. Brown hare (Lepus europeus dispersion is dramatically affected by habitat fragmentation, presence of predators, intense tillage and elevated hunting pressure. Consequently, the only stable populations of hare are often in no-hunting areas where wildlife management is efficient. It is necessary, therefore, to identify not only additional areas suitable for reproduction, but also the most suitable dispersion pathways for hares, in order to optimise management. In the present study, by means of a Geographic Information System (GIS, a deterministic hare suitability model was developed on the basis of a multicriterial approach and fuzzy logic. Subsequently, a friction surface was derived from the suitability map in order to describe the land bio-permeability. Finally, on the basis of species potential, the spread of hares from stable population areas (source areas to the remaining territory was simulated. The area of study was the province of Viterbo (central Italy. The suitability map showed good discrimination ability (ROC=0.705. The hare dispersion simulation map allowed the potential spreading of this species throughout the provincial territory to be analysed. Isolated or less connected zones were highlighted, allowing the distribution of habitat enhancements, and/or the institution of new no-hunting areas devoted to the reproduction and consequent spread of hares throughout the territory, to be localised. The presented flexible and reiterable methodology could prove useful for wildlife management and hunting planning over a wide area. It would thus provide an important contribution to reducing the importance of animal

  4. Wireless Sensors and Networks for Advanced Energy Management

    Energy Technology Data Exchange (ETDEWEB)

    Hardy, J.E.

    2005-05-06

    Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

  5. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    Science.gov (United States)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  6. Novel approach for all-optical packet switching in wide-area networks

    Science.gov (United States)

    Chlamtac, Imrich; Fumagalli, Andrea F.; Wedzinga, Gosse

    1998-09-01

    All-optical Wavelength Division Multiplexing (WDM) networks are believed to be a fundamental component in future high speed backbones. However, while wavelength routing made circuit switching in WDM feasible the reality of extant optical technology does not yet provide the necessary devices to achieve individual optical packet switching. This paper proposes to achieve all-optical packet switching in WDM Wide Area Networks (WANs) via a novel technique, called slot routing. Using slot routing, entire slots, each carrying multiple packets on distinct wavelengths, are switched transparently and individually. As a result packets can be optically transmitted and switched in the network using available fast and wavelength non-sensitive devices. The proposed routing technique leads to an optical packet switching solution, that is simple, practical, and unique as it makes it possible to build a WDM all-optical WAN with optical devices based on proven technologies.

  7. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones.

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-12-10

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  8. Prospects for the introduction of Wide Area Monitoring Using Environmental Sampling

    International Nuclear Information System (INIS)

    Wogman, N.A.

    2013-01-01

    Nuclear proliferation signatures released to the environment must be collected and distinguished from primordial and man-made backgrounds in soils, sediments, air, and surface and underground water. The delay time between the nuclear proliferation emissions and the date of the Wide-Area Environmental Sampling (WAES) analysis will determine which radionuclides would be analyzed based upon their half-lives. Various sampling and analysis technologies have been considered here for application to a WAES. Sampling procedures and equipment discussed are aimed at aquatic, airborne particulate, gas, vegetation, sediment and/or soil, and fauna media. Specific procedures must be selected based upon the application scenario; for example, sampling in the northern latitudes under freezing conditions, sampling at the equator under tropical rain-forest conditions, sampling in the mid-latitudes under desert conditions, and sampling in the marine environment require different equipment and procedures. The paper is followed by the slides of the presentation

  9. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference

  10. A scalable middleware solution for advanced wide-area Web services

    Science.gov (United States)

    van Steen, Maarten; Tanenbaum, Andrew S.; Kuz, Ihor; Sips, Henk J.

    1999-03-01

    To alleviate scalability problems in the Web, many researchers concentrate on how to incorporate advanced caching and replication techniques. Many solutions incorporate object-based techniques. In particular, Web resources are considered as distributed objects offering a well-defined interface. We argue that most proposals ignore two important aspects. First, there is little discussion on what kind of coherence should be provided. Proposing specific caching or replication solutions makes sense only if we know what coherence model they should implement. Second, most proposals treat all Web resources alike. Such a one-size-fits-all approach will never work in a wide-area system. We propose a solution in which Web resources are encapsulated in physically distributed shared objects. Each object should encapsulate not only state and operations, but also the policy by which its state is distributed, cached, replicated, migrated, etc.

  11. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Directory of Open Access Journals (Sweden)

    Jing Chen

    2015-12-01

    Full Text Available Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  12. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-01-01

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters. PMID:26690439

  13. Management of area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Dyck, V.A.; Vreysen, M.J.B.; Reyes Flores, J.; Regidor Fernandez, E.E.; Teruya, T.; Barnes, B.; Gomez Riera, P.; Lindquist, D.; Loosjes, M.

    2005-01-01

    Effective management of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT) is key to success. Programme planning includes collection of baseline data and a feasibility assessment. The optimal management structure is where the programme can be implemented effectively and flexibly, independent of government politics, bureaucracy, and even corruption that impede timely goal achievement. Ideally, programmes include both public and private management, and require strong and steady financial support. Governments and donors are the most common sources of funds, but a mixture of public, community, and private funds is now the trend. Interrupted cash flow severely restrains programme performance. Physical support of programme operations must be reliable, and led by a maintenance professional. It is essential to have full-time, well-paid, and motivated staff led by a programme manger with technical and management experience. Programme failure is usually due to poor management and inadequate public support, and not to poor technology. (author)

  14. Fast Restoration Based on Alternative Wavelength Paths in a Wide Area Optical IP Network

    Science.gov (United States)

    Matera, Francesco; Rea, Luca; Venezia, Matteo; Capanna, Lorenzo; Del Prete, Giuseppe

    In this article we describe an experimental investigation of IP network restoration based on wavelength recovery. We propose a procedure for metro and wide area gigabit Ethernet networks that allows us to route the wavelength in case of link failure to another existing link by exploiting wavelength division multiplexing in the fiber. Such a procedure is obtained by means of an optical switch that is managed by a loss-of-light signal that is generated by a router in case of link failure. Such a method has been tested in an IP network consisting of three core routers with optical gigabit Ethernet interfaces connected by means of 50-km-long single-mode fibers between Rome and Pomezia. Compared with other conventional restoration techniques, such as OSPF and MPLS, our method -in very fast (20 ms) and is compatible with real-time TV services and low-cost chips.

  15. Event Based Simulator for Parallel Computing over the Wide Area Network for Real Time Visualization

    Science.gov (United States)

    Sundararajan, Elankovan; Harwood, Aaron; Kotagiri, Ramamohanarao; Satria Prabuwono, Anton

    As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However, not all applications can be executed over the WAN due to communication overhead that can drastically slowdown the computation. In this paper, we introduce an event based simulator to investigate the performance of parallel algorithms executed over the WAN. The event based simulator known as SIMPAR (SIMulator for PARallel computation), simulates the actual computations and communications involved in parallel computation over the WAN using time stamps. Visualization of real time applications require steady stream of processed data flow for visualization purposes. Hence, SIMPAR may prove to be a valuable tool to investigate types of applications and computing resource requirements to provide uninterrupted flow of processed data for real time visualization purposes. The results obtained from the simulation show concurrence with the expected performance using the L-BSP model.

  16. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  17. Strategic options in using sterile insects for area-wide integrated pest management

    International Nuclear Information System (INIS)

    Hendrichs, J.; Vreysen, M.J.B.; Enkerlin, W.R.; Cayol, J.P.

    2005-01-01

    The four strategic options, 'suppression', 'eradication', 'containment' and 'prevention', in which the sterile insect technique (SIT) can be deployed as part of area-wide integrated pest management (AW-IPM) interventions, are defined and described in relation to the contexts in which they are applied against exotic or naturally occurring major insect pests. Advantages and disadvantages of these strategic options are analysed, and examples of successful programmes provided. Considerations of pest status, biology and distribution affecting decision-making in relation to strategy selection are reviewed and discussed in terms of feasibility assessment, and programme planning and implementation. Unrealistic expectations are often associated with applying the SIT, resulting in high political costs to change a strategy during implementation. The choice of strategy needs to be assessed carefully, and considerable baseline data obtained to prepare for the selected strategy, before embarking on an AW-IPM programme with an SIT component. (author)

  18. Detecting Topological Errors with Pre-Estimation Filtering of Bad Data in Wide-Area Measurements

    DEFF Research Database (Denmark)

    Møller, Jakob Glarbo; Sørensen, Mads; Jóhannsson, Hjörtur

    2017-01-01

    It is expected that bad data and missing topology information will become an issue of growing concern when power system state estimators are to exploit the high measurement reporting rates from phasor measurement units. This paper suggests to design state estimators with enhanced resilience against...... those issues. The work presented here include a review of a pre-estimation filter for bad data. A method for detecting branch status errors which may also be applied before the state estimation is then proposed. Both methods are evaluated through simulation on a novel test platform for wide......-area measurement applications. It is found that topology errors may be detected even under influence of the large dynamics following the loss of a heavily loaded branch....

  19. High-speed wide area, data intensive computing: A Ten Year Retrospective

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, William E.

    1998-05-01

    Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The distributed systems that solve large-scale problems will always involve aggregating and scheduling many resources. Data must be located and staged, cache and network capacity must be available at the same time as computing capacity, etc. Every aspect of such a system is dynamic: locating and scheduling resources, adapting running application systems to availability and congestion in the middleware and infrastructure, responding to human interaction, etc. The technologies, the middleware services, and the architectures that are used to build useful high-speed, wide area distributed systems, constitute the field of data intensive computing. This paper explores some of the history and future directions of that field.

  20. Reflectance of Biological Turbid Tissues under Wide Area Illumination: Single Backward Scattering Approach

    Directory of Open Access Journals (Sweden)

    Guennadi Saiko

    2014-01-01

    Full Text Available Various scenarios of light propagation paths in turbid media (single backward scattering, multiple backward scattering, banana shape are discussed and their contributions to reflectance spectra are estimated. It has been found that a single backward or multiple forward scattering quasi-1D paths can be the major contributors to reflected spectra in wide area illumination scenario. Such a single backward scattering (SBS approximation allows developing of an analytical approach which can take into account refractive index mismatched boundary conditions and multilayer geometry and can be used for real-time spectral processing. The SBS approach can be potentially applied for the distances between the transport and reduced scattering domains. Its validation versus the Kubelka-Munk model, path integrals, and diffusion approximation of the radiation transport theory is discussed.

  1. The High Performance and Wide Area Analysis and Mining of Scientific & Engineering Data

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, R.

    2002-12-01

    This final report summarizes our accomplishments and findings and includes recent publications occurring in the final period of this award. One of our research goals was to develop algorithms and services for remote data analysis and distributed data mining which scaled from the commodity internet to high performance networks. When we began the project there was no effective mechanisms to achieve high end to end performance for data intensive applications over wide area, high bandwidth networks. For this reason, we developed algorithms and services for Layers 2,3, and 4 in the simple data web application stack below. We describe our research accomplishments for each of these layers in turn: Layer 4--Data Web Applications; Layer 3--Data Web Services; Layer 2--Network Protocol Services; Layer 1--IP.

  2. Grid-optimized Web 3D applications on wide area network

    Science.gov (United States)

    Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

    2008-08-01

    Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

  3. Cost-benefit analysis model: A tool for area-wide fruit fly management. Procedures manual

    International Nuclear Information System (INIS)

    Enkerlin, W.; Mumford, J.; Leach, A.

    2007-03-01

    The Generic Fruit Fly Cost-Benefit Analysis Model assists in economic decision making associated with area-wide fruit fly control options. The FRUIT FLY COST-BENEFIT ANALYSIS PROGRAM (available on 1 CD-ROM from the Joint FAO/IAEA Programme of Nuclear Techniques in Food and Agriculture) is an Excel 2000 Windows based program, for which all standard Windows and Excel conventions apply. The Model is user friendly and thus largely self-explanatory. Nevertheless, it includes a procedures manual that has been prepared to guide the user, and thus should be used together with the software. Please note that the table presenting the pest management options in the Introductory Page of the model is controlled by spin buttons and click boxes. These controls are linked to macros that hide non relevant tables and boxes. N.B. it is important that the medium level of security is selected from the Tools menu of Excel, to do this go to Tools|Macros|Security| and select Medium. When the file is opened a form will appear containing three buttons, click on the middle button, 'Enable Macros', so that the macros may be used. Ideally the model should be used as a support tool by working groups aiming at assessing the economic returns of different fruit fly control options (suppression, eradication, containment and prevention). The working group should include professionals in agriculture with experience in area-wide implementation of integrated pest management programmes, an economist or at least someone with basic knowledge in economics, and if relevant, an entomologist with some background in the application of the sterile insect technique (SIT)

  4. Accelerometer-based wireless body area network to estimate intensity of therapy in post-acute rehabilitation

    Directory of Open Access Journals (Sweden)

    Hamel Mathieu

    2008-09-01

    Full Text Available Abstract Background It has been suggested that there is a dose-response relationship between the amount of therapy and functional recovery in post-acute rehabilitation care. To this day, only the total time of therapy has been investigated as a potential determinant of this dose-response relationship because of methodological and measurement challenges. The primary objective of this study was to compare time and motion measures during real life physical therapy with estimates of active time (i.e. the time during which a patient is active physically obtained with a wireless body area network (WBAN of 3D accelerometer modules positioned at the hip, wrist and ankle. The secondary objective was to assess the differences in estimates of active time when using a single accelerometer module positioned at the hip. Methods Five patients (77.4 ± 5.2 y with 4 different admission diagnoses (stroke, lower limb fracture, amputation and immobilization syndrome were recruited in a post-acute rehabilitation center and observed during their physical therapy sessions throughout their stay. Active time was recorded by a trained observer using a continuous time and motion analysis program running on a Tablet-PC. Two WBAN configurations were used: 1 three accelerometer modules located at the hip, wrist and ankle (M3 and 2 one accelerometer located at the hip (M1. Acceleration signals from the WBANs were synchronized with the observations. Estimates of active time were computed based on the temporal density of the acceleration signals. Results A total of 62 physical therapy sessions were observed. Strong associations were found between WBANs estimates of active time and time and motion measures of active time. For the combined sessions, the intraclass correlation coefficient (ICC was 0.93 (P ≤ 0.001 for M3 and 0.79 (P ≤ 0.001 for M1. The mean percentage of differences between observation measures and estimates from the WBAN of active time was -8.7% ± 2.0% using

  5. EMULACIÓN DE ESCENARIOS VIRTUALES, EN UNA SDWLAN (SOFTWARE DEFINED WIRELESS LOCAL AREA NETWORK, DE UN CAMPUS UNIVERSITARIO

    Directory of Open Access Journals (Sweden)

    Gerlyn Duarte

    2015-07-01

    Full Text Available Las redes definidas por software (SDN = Software Defined Network es una arquitectura de red emergente que se destaca como una tecnología capaz de ofrecer un control más flexible y dinámico a la hora de gestionar el diseño y funciones de la red, donde se separan los planos de control y enrutamiento. Esto permite la centralización de los controles de la red basada en software. Se puede decir que es posible tener flexibilidad y rapidez al momento de configurar, implementar y administrar diferentes protocolos personalizados para los requerimientos de distintas redes. Actualmente, en una red convencional, cada conmutador y/o enrutador tienen software propietario que le dice qué hacer. SDN se centra principalmente en la parte cableada de la red de datos. Sin embargo, todas las ventajas de las SDN sólo se obtienen si se logra abarcar la totalidad de la infraestructura, desde el centro de datos al extremo de la red, permitiendo extender todos los beneficios de SDN hasta la red inalámbrica, para conseguir a su vez una red inalámbrica de área local definida por software (SDWLAN = Software Define Wireless Local Area Network. Es por ello que en el presente trabajo, se emuló parte de una SDWLAN de un campus universitario para observar la factibilidad de implementar SDN en la misma. Para la emulación se utilizó una variante del emulador Mininet que permite trabajar con redes inalámbricas. De igual forma, se efectuaron mediciones del ancho de banda de las SDWLAN emuladas, así como la interconectividad entre ellas. Se evidenció la facilidad y el rendimiento de trabajar con las herramientas de emulación de SDWLAN empleadas, permitiendo de igual forma la estructuración de distintas topologías de SDWLAN. Se comprobó que el emulador, el cual está aún en la fase beta, permite interactuar y ejecutar cualquier proceso como si se ejecutara directamente en un equipo con GNU/Linux de forma eficaz.

  6. Power System Stabilization Control Based on the Wide Area Phasor Measurement

    Science.gov (United States)

    Watanabe, Masayuki; Hashiguchi, Takuhei; Izumi, Takanori; Mitani, Yasunori

    This paper presents a method for tuning of power system stabilizers (PSS) for damping low-frequency oscillations in a multi-machine power system based on the wide area phasor measurement. The authors have developed a method for detecting inter-area low-frequency modes from the measured small oscillation associated with the load fluctuation by approximating oscillations as a coupled vibration model. In this paper, the coupled vibration model is extended for including the effect of PSSs. PSSs are tuned directly by using the extended model since the model includes parameters of PSSs. The advantage of this method is that steady state phasor fluctuations are available to tuning PSSs and assess the effect of the tuning control. In other words, a large disturbance like a line fault is not necessary since the stability of the major modes can be investigated directly by using eigenvalues of the extended model. The identification process does not require the information on the input to the system for perturbation. Some numerical analyses demonstrate the effectiveness of the method by using phasor dynamical data obtained by a power system simulation package.

  7. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  8. Leaf Area Index Estimation Using Chinese GF-1 Wide Field View Data in an Agriculture Region.

    Science.gov (United States)

    Wei, Xiangqin; Gu, Xingfa; Meng, Qingyan; Yu, Tao; Zhou, Xiang; Wei, Zheng; Jia, Kun; Wang, Chunmei

    2017-07-08

    Leaf area index (LAI) is an important vegetation parameter that characterizes leaf density and canopy structure, and plays an important role in global change study, land surface process simulation and agriculture monitoring. The wide field view (WFV) sensor on board the Chinese GF-1 satellite can acquire multi-spectral data with decametric spatial resolution, high temporal resolution and wide coverage, which are valuable data sources for dynamic monitoring of LAI. Therefore, an automatic LAI estimation algorithm for GF-1 WFV data was developed based on the radiative transfer model and LAI estimation accuracy of the developed algorithm was assessed in an agriculture region with maize as the dominated crop type. The radiative transfer model was firstly used to simulate the physical relationship between canopy reflectance and LAI under different soil and vegetation conditions, and then the training sample dataset was formed. Then, neural networks (NNs) were used to develop the LAI estimation algorithm using the training sample dataset. Green, red and near-infrared band reflectances of GF-1 WFV data were used as the input variables of the NNs, as well as the corresponding LAI was the output variable. The validation results using field LAI measurements in the agriculture region indicated that the LAI estimation algorithm could achieve satisfactory results (such as R² = 0.818, RMSE = 0.50). In addition, the developed LAI estimation algorithm had potential to operationally generate LAI datasets using GF-1 WFV land surface reflectance data, which could provide high spatial and temporal resolution LAI data for agriculture, ecosystem and environmental management researches.

  9. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  10. Ground Testing of Prototype Hardware and Processing Algorithms for a Wide Area Space Surveillance System (WASSS)

    Science.gov (United States)

    Goldstein, N.; Dressler, R. A.; Richtsmeier, S. S.; McLean, J.; Dao, P. D.; Murray-Krezan, J.; Fulcoly, D. O.

    2013-09-01

    Recent ground testing of a wide area camera system and automated star removal algorithms has demonstrated the potential to detect, quantify, and track deep space objects using small aperture cameras and on-board processors. The camera system, which was originally developed for a space-based Wide Area Space Surveillance System (WASSS), operates in a fixed-stare mode, continuously monitoring a wide swath of space and differentiating celestial objects from satellites based on differential motion across the field of view. It would have greatest utility in a LEO orbit to provide automated and continuous monitoring of deep space with high refresh rates, and with particular emphasis on the GEO belt and GEO transfer space. Continuous monitoring allows a concept of change detection and custody maintenance not possible with existing sensors. The detection approach is equally applicable to Earth-based sensor systems. A distributed system of such sensors, either Earth-based, or space-based, could provide automated, persistent night-time monitoring of all of deep space. The continuous monitoring provides a daily record of the light curves of all GEO objects above a certain brightness within the field of view. The daily updates of satellite light curves offers a means to identify specific satellites, to note changes in orientation and operational mode, and to queue other SSA assets for higher resolution queries. The data processing approach may also be applied to larger-aperture, higher resolution camera systems to extend the sensitivity towards dimmer objects. In order to demonstrate the utility of the WASSS system and data processing, a ground based field test was conducted in October 2012. We report here the results of the observations made at Magdalena Ridge Observatory using the prototype WASSS camera, which has a 4×60° field-of-view , <0.05° resolution, a 2.8 cm2 aperture, and the ability to view within 4° of the sun. A single camera pointed at the GEO belt provided a

  11. Transient stability enhancement of modern power grid using predictive Wide-Area Monitoring and Control

    Science.gov (United States)

    Yousefian, Reza

    This dissertation presents a real-time Wide-Area Control (WAC) designed based on artificial intelligence for large scale modern power systems transient stability enhancement. The WAC using the measurements available from Phasor Measurement Units (PMUs) at generator buses, monitors the global oscillations in the system and optimally augments the local excitation system of the synchronous generators. The complexity of the power system stability problem along with uncertainties and nonlinearities makes the conventional modeling non-practical or inaccurate. In this work Reinforcement Learning (RL) algorithm on the benchmark of Neural Networks (NNs) is used to map the nonlinearities of the system in real-time. This method different from both the centralized and the decentralized control schemes, employs a number of semi-autonomous agents to collaborate with each other to perform optimal control theory well-suited for WAC applications. Also, to handle the delays in Wide-Area Monitoring (WAM) and adapt the RL toward the robust control design, Temporal Difference (TD) is proposed as a solver for RL problem or optimal cost function. However, the main drawback of such WAC design is that it is challenging to determine if an offline trained network is valid to assess the stability of the power system once the system is evolved to a different operating state or network topology. In order to address the generality issue of NNs, a value priority scheme is proposed in this work to design a hybrid linear and nonlinear controllers. The algorithm so-called supervised RL is based on mixture of experts, where it is initialized by linear controller and as the performance and identification of the RL controller improves in real-time switches to the other controller. This work also focuses on transient stability and develops Lyapunov energy functions for synchronous generators to monitor the stability stress of the system. Using such energies as a cost function guarantees the convergence

  12. Vehicle tracking in wide area motion imagery from an airborne platform

    Science.gov (United States)

    van Eekeren, Adam W. M.; van Huis, Jasper R.; Eendebak, Pieter T.; Baan, Jan

    2015-10-01

    Airborne platforms, such as UAV's, with Wide Area Motion Imagery (WAMI) sensors can cover multiple square kilometers and produce large amounts of video data. Analyzing all data for information need purposes becomes increasingly labor-intensive for an image analyst. Furthermore, the capacity of the datalink in operational areas may be inadequate to transfer all data to the ground station. Automatic detection and tracking of people and vehicles enables to send only the most relevant footage to the ground station and assists the image analysts in effective data searches. In this paper, we propose a method for detecting and tracking vehicles in high-resolution WAMI images from a moving airborne platform. For the vehicle detection we use a cascaded set of classifiers, using an Adaboost training algorithm on Haar features. This detector works on individual images and therefore does not depend on image motion stabilization. For the vehicle tracking we use a local template matching algorithm. This approach has two advantages. In the first place, it does not depend on image motion stabilization and it counters the inaccuracy of the GPS data that is embedded in the video data. In the second place, it can find matches when the vehicle detector would miss a certain detection. This results in long tracks even when the imagery is of low frame-rate. In order to minimize false detections, we also integrate height information from a 3D reconstruction that is created from the same images. By using the locations of buildings and roads, we are able to filter out false detections and increase the performance of the tracker. In this paper we show that the vehicle tracks can also be used to detect more complex events, such as traffic jams and fast moving vehicles. This enables the image analyst to do a faster and more effective search of the data.

  13. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  14. Wide Area Network Access to CMS Data Using the Lustre Filesystem

    CERN Document Server

    Rodríguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P

    2009-01-01

    In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...

  15. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  16. A Soft Curtailment of Wide-Area Central Air Conditioning Load

    Directory of Open Access Journals (Sweden)

    Leehter Yao

    2018-02-01

    Full Text Available An innovative solution to provide a demand response for power system is proposed in this paper by considering the feasibility of two-way direct load control (TWDLC of central air conditioning chiller system for wide-area in real-time manner. Particularly, the proposed TWDLC scheme is designed to tackle the load shedding ratio optimization problem for all under-controlled customers, aiming to satisfy the target load curtailment defined in each scheduling step. Another notable contribution of this work is the utilization of constraint loosening concept on actual load, curtailed to overcome the uncertainties of load reduction during TWDLC. Given the presence of fuzzy constraints, the proposed load shedding ratio optimization problem can be tackled using fuzzy linear programming. A delicate strategy is then formulated to transform the proposed fuzzy linear programming problem into a regular linear programming problem. A selection scheme used to obtain the feasible candidates set for load shedding at every sampling interval of TWDLC is also designed along with the fuzzy linear programming.

  17. Radiation distribution measurement using plastic scintillating optical fibers for survey of radioactive contamination in wide area

    International Nuclear Information System (INIS)

    Ito, Chikara; Ito, Keisuke; Ishikawa, Takashi; Yoshida, Akihiro; Sanada, Yukihisa; Torii, Tatsuo; Nohtomi, Akihiro; Wakabayashi, Genichiro; Miyazaki, Nobuyuki

    2013-01-01

    It is important to examine distribution of environmental contamination due to the accident of Fukushima Daiichi Nuclear Power Station and to confirm the effect of decontamination works. We have applied radiation distribution measurement using plastic scintillating optical fibers (PSFs) in the survey of contamination in wide area including residential, farmland, forests, etc. In the measurements system, two scintillation lights that emitted at an incidence of a radiation transmit to photomultiplier tubes at the both end of PSFs. The position where scintillation light emitted is obtained from the detection time difference of each photomultiplier tube. The distribution of light emission quantity indicates the distribution of radiation incident in a PSF which is corresponds to the distribution of dose-rate. The radiation detection system using the PSFs has been applied to the radiation distribution measurement on grounds, trees, etc. The results show a good agreement with point data measured by survey meters using sodium iodide scintillators. As the PSFs which have water resistance, they have been successfully applied to the radiation distribution measurement in the river. We have also succeeded in measuring two-dimensional distribution of radiation by measuring the count rate while moving to the fiber at a constant speed. (author)

  18. Genetic methods for area-wide management of Lepidopterous pests with emphasis on F1 sterility

    International Nuclear Information System (INIS)

    Ocampo, V.R.

    1996-01-01

    Enormous losses in the production and marketing of food and fiber are caused by larvae of Lepidoptera. Currently, large quantities of insecticides are used to combat these pests. Insecticide resistance, increasing concern over pesticide pollution, and the desire to effectively manage lepidopteran pests on an area-wide basis have motivated scientists to identify and develop new pest management tactics that are compatible with current IPM. Genetic methods have emerged as a promising control strategy for lepidopteran pests. Genetic control as a practical means of pest management was first successfully implemented by Knipling and colleagues in the USA during the 1960's with the sterile insect technique (SIT) program for the screwworm fly. SIT is not a readily adapted for use against Lepidoptera as against Diptera. Radiation-induced inherited sterility (or F 1 sterility) is generally considered the most promising genetic methods for large-scale suppression of lepidopteran populations. This papers discusses four genetic control methods that have been developed and the progress that has been made in integrating sterility with other IPM tactics. (author)

  19. Sterile insect technique. Principles and practice in area-wide integrated pest management

    International Nuclear Information System (INIS)

    Dyck, V.A.; Hendrichs, J.; Robinson, A.S.

    2005-01-01

    For several major insect pests, the environment-friendly sterile insect technique (SIT) is being applied as a component of area-wide integrated pest management (AW-IPM) programmes. This technology, using radiation to sterilize insects, was first developed in the USA, and is currently applied on six continents. For four decades it has been a major subject for research and development in the Joint FAO/IAEA Programme on Nuclear Techniques in Food and Agriculture, involving both research and the transfer of this technology to Member States so that they can benefit from improved plant, animal and human health, cleaner environments, increased production of plants and animals in agricultural systems, and accelerated economic development. The socio-economic impacts of AW-IPM programmes that integrate the SIT have confirmed the usefulness of this technology. Numerous publications related to the integration of the SIT in pest management programmes, arising from research, coordinated research projects, field projects, symposia, meetings, and training activities have already provided much information to researchers, pest-control practitioners, programme managers, plant protection and animal health officers, and policy makers. However, by bringing together and presenting in a generic fashion the principles, practice, and global application of the SIT, this book will be a major reference source for all current and future users of the technology. The book will also serve as a textbook for academic courses on integrated pest management. Fifty subject experts from 19 countries contributed to the chapters, which were all peer reviewed before final editing

  20. Time-Dependent Statistical Analysis of Wide-Area Time-Synchronized Data

    Directory of Open Access Journals (Sweden)

    A. R. Messina

    2010-01-01

    Full Text Available Characterization of spatial and temporal changes in the dynamic patterns of a nonstationary process is a problem of great theoretical and practical importance. On-line monitoring of large-scale power systems by means of time-synchronized Phasor Measurement Units (PMUs provides the opportunity to analyze and characterize inter-system oscillations. Wide-area measurement sets, however, are often relatively large, and may contain phenomena with differing temporal scales. Extracting from these measurements the relevant dynamics is a difficult problem. As the number of observations of real events continues to increase, statistical techniques are needed to help identify relevant temporal dynamics from noise or random effects in measured data. In this paper, a statistically based, data-driven framework that integrates the use of wavelet-based EOF analysis and a sliding window-based method is proposed to identify and extract, in near-real-time, dynamically independent spatiotemporal patterns from time synchronized data. The method deals with the information in space and time simultaneously, and allows direct tracking and characterization of the nonstationary time-frequency dynamics of oscillatory processes. The efficiency and accuracy of the developed procedures for extracting localized information of power system behavior from time-synchronized phasor measurements of a real event in Mexico is assessed.

  1. Discrete-event simulation of a wide-area health care network.

    Science.gov (United States)

    McDaniel, J G

    1995-01-01

    Predict the behavior and estimate the telecommunication cost of a wide-area message store-and-forward network for health care providers that uses the telephone system. A tool with which to perform large-scale discrete-event simulations was developed. Network models for star and mesh topologies were constructed to analyze the differences in performances and telecommunication costs. The distribution of nodes in the network models approximates the distribution of physicians, hospitals, medical labs, and insurers in the Province of Saskatchewan, Canada. Modeling parameters were based on measurements taken from a prototype telephone network and a survey conducted at two medical clinics. Simulation studies were conducted for both topologies. For either topology, the telecommunication cost of a network in Saskatchewan is projected to be less than $100 (Canadian) per month per node. The estimated telecommunication cost of the star topology is approximately half that of the mesh. Simulations predict that a mean end-to-end message delivery time of two hours or less is achievable at this cost. A doubling of the data volume results in an increase of less than 50% in the mean end-to-end message transfer time. The simulation models provided an estimate of network performance and telecommunication cost in a specific Canadian province. At the expected operating point, network performance appeared to be relatively insensitive to increases in data volume. Similar results might be anticipated in other rural states and provinces in North America where a telephone-based network is desired.

  2. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  3. Frequency Monitoring and Control during Power System Restoration Based on Wide Area Measurement System

    Directory of Open Access Journals (Sweden)

    Saber Nourizadeh

    2011-01-01

    Full Text Available Frequency control during power system restoration has not been strongly addressed. Operators are often concerned with the offline sizing of load and generation steps, but, nowadays, the introduction of Wide Area Measurement System (WAMS makes it possible to monitor the stability of power system online. The constraints of WAMS operation result in some changes in power system frequency control. This paper proposes a novel methodology for frequency control and monitoring during the early steps of power system restoration based on WAMS. Detailed load modeling is achieved based on the static load modeling approach. Power generators' modeling is also accomplished utilizing the single machine equivalent of the power system based on PMU measurements. Simulation results of the presented methodology on the 39 bus New England power system clearly show the effectiveness and applicability of the proposed method. The simulation results show that the presented approach has a completely acceptable precision and an outstanding speed with less than 0.05% error. The outstanding speed of the presented approach along with the result precision will result in a great promotion in power system restoration methodologies.

  4. A double area detector system for simultaneous small and wide-angle X-ray scattering

    CERN Document Server

    Pokric, B; Ryan, A J; Fairclough, P; Dobson, B R; Derbyshire, G E; Helsby, W; Long, G; Moon, K

    2002-01-01

    A novel area detector has been designed for material science SR studies, capable of simultaneously collecting the diffraction data in two angular regimes. The detector for collecting wide-angle X-ray scattering (WAXS) data consists of four taper-coupled CCDs arranged as a 2x2 mosaic with a central aperture about 40 mm in diameter, so permitting the inclusion of a distant on-axis CCD detector for small-angle X-ray scattering (SAXS). The distance of the SAXS detector from the sample can be varied over the range 0.27 m to about 2 m. The overall aperture of WAXS detector is approximately 200x200 mm sup 2 allowing the measurement of the diffraction patterns from 5 deg. to 45 deg. with an average angular resolution of 0.05 deg. The parallax error for large angles is substantially reduced as the individual WAXS CCDs are tilted towards the specimen location. Both WAXS and SAXS diffraction data are simultaneously collected at 30 MB/s data rate, which is equivalent to 6 complete frames per second. Each pixel value is d...

  5. From rainfall to slope instability: an automatic GIS procedure for susceptibility analyses over wide areas

    Directory of Open Access Journals (Sweden)

    Bianca Federici

    2015-07-01

    Full Text Available The paper proposes an automatic procedure in geographic information system (GIS for the analysis and prediction of landslides due to rainfall events over wide areas. It runs, for each unit cell, a hydrological balance based on the Curve Number method (USDA-SCS 1985–1986, computing the evolution of groundwater as a result of precipitation and then checks the overcoming, or not, of limit equilibrium conditions of the land in the domain of interest. The mathematical model was implemented in the free and open source GIS GRASS. For any sequence of consecutive days of rain, according to the conditions of soil moisture prior to the time history under study, the hydro-geotechnical model allows (1 the determination of the oscillations of the phreatic table, (2 the part of saturated soil and (3 the slope stability analysis, by taking into proper account the pore pressures buildup. The results of this procedure are returned in raster format, allowing an easy and intuitive interpretation of the land mass sensitivity to meteoric actions. The suggested procedure was applied on an extensive kinematic phenomenon surrounding the city of Santo Stefano d’Aveto (Liguria, Italy. The realized maps of landslide susceptibility are in excellent agreement with what is evident on site.

  6. Monitoring sterile and wild insects in area-wide integrated pest management programmes

    International Nuclear Information System (INIS)

    Vreysen, M.J.B.

    2005-01-01

    Insect pest control programmes, which integrate the release of sterile insects, can be efficient only if the released insects have an optimal biological quality. Frequent monitoring of the quality of reared insects after being released in the field is an important but often neglected component of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT). Parameters of sterile insects, which should be monitored regularly, are sexual competitiveness of the released insects, and related components, e.g. survival, mobility, dispersal characteristics, and spatial occupation of the habitat. A well-balanced monitoring programme will, at any given time, provide essential feedback on the progress being made. This information is prerequisite to efficient implementation of the release and cost-efficient use of sterile insects. The type of monitoring to be done will be determined largely by the particular biology of the target insect species. The most important parameter in relation to the release of sterile insects is the rate of sterility induced in the wild insect pest population; it will provide the best evidence that any observed changes, e.g. in the density of the target insect, are caused by the release of sterile insects. (author)

  7. Experiments and Analyses of Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Sen, Satyabrata [ORNL; Hanley, Jesse A. [ORNL; Foster, Ian [University of Chicago; Kettimuthu, R. [Argonne National Laboratory (ANL); Wu, Qishi [University of Memphis; Yun, Daqing [Harrisburg University; Towsley, Don [University of Massachusetts, Amherst; Vardoyan, Gayane [University of Massachusetts, Amherst

    2017-08-01

    Dedicated wide-area network connections are increasingly employed in high-performance computing and big data scenarios. One might expect the performance and dynamics of data transfers over such connections to be easy to analyze due to the lack of competing traffic. However, non-linear transport dynamics and end-system complexities (e.g., multi-core hosts and distributed filesystems) can in fact make analysis surprisingly challenging. We present extensive measurements of memory-to-memory and disk-to-disk file transfers over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory-to-memory transfers, profiles of both TCP and UDT throughput as a function of RTT show concave and convex regions; large buffer sizes and more parallel flows lead to wider concave regions, which are highly desirable. TCP and UDT both also display complex throughput dynamics, as indicated by their Poincare maps and Lyapunov exponents. For disk-to-disk transfers, we determine that high throughput can be achieved via a combination of parallel I/O threads, parallel network threads, and direct I/O mode. Our measurements also show that Lustre filesystems can be mounted over long-haul connections using LNet routers, although challenges remain in jointly optimizing file I/O and transport method parameters to achieve peak throughput.

  8. An UGS radar with micro-Doppler capabilities for wide area persistent surveillance

    Science.gov (United States)

    Tahmoush, Dave; Silvious, Jerry; Clark, John

    2010-04-01

    Detecting humans and distinguishing them from natural fauna is an important issue in security applications to reduce false alarm rates. In particular, it is important to detect and classify people who are walking in remote locations and transmit back detections over extended periods at a low cost and with minimal maintenance. The ability to discriminate men versus animals and vehicles at long range would give a distinct sensor advantage. The reduction in false positive detections due to animals would increase the usefulness of detections, while dismount identification could reduce friendly-fire. We developed and demonstrate a compact radar technology that is scalable to a variety of ultra-lightweight and low-power platforms for wide area persistent surveillance as an unattended, unmanned, and man-portable ground sensor. The radar uses micro-Doppler processing to characterize the tracks of moving targets and to then eliminate unimportant detections due to animals or civilian activity. This paper presents the system and data on humans, vehicles, and animals at multiple angles and directions of motion, demonstrates the signal processing approach that makes the targets visually recognizable, and verifies that the UGS radar has enough micro-Doppler capability to distinguish between humans, vehicles, and animals.

  9. NFU-Enabled FASTA: moving bioinformatics applications onto wide area networks

    Directory of Open Access Journals (Sweden)

    Liu Huadong

    2007-11-01

    Full Text Available Abstract Background Advances in Internet technologies have allowed life science researchers to reach beyond the lab-centric research paradigm to create distributed collaborations. Of the existing technologies that support distributed collaborations, there are currently none that simultaneously support data storage and computation as a shared network resource, enabling computational burden to be wholly removed from participating clients. Software using computation-enable logistical networking components of the Internet Backplane Protocol provides a suitable means to accomplish these tasks. Here, we demonstrate software that enables this approach by distributing both the FASTA algorithm and appropriate data sets within the framework of a wide area network. Results For large datasets, computation-enabled logistical networks provide a significant reduction in FASTA algorithm running time over local and non-distributed logistical networking frameworks. We also find that genome-scale sizes of the stored data are easily adaptable to logistical networks. Conclusion Network function unit-enabled Internet Backplane Protocol effectively distributes FASTA algorithm computation over large data sets stored within the scaleable network. In situations where computation is subject to parallel solution over very large data sets, this approach provides a means to allow distributed collaborators access to a shared storage resource capable of storing the large volumes of data equated with modern life science. In addition, it provides a computation framework that removes the burden of computation from the client and places it within the network.

  10. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  11. A Compact, Wide Area Surveillance 3D Imaging LIDAR Providing UAS Sense and Avoid Capabilities, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Eye safe 3D Imaging LIDARS when combined with advanced very high sensitivity, large format receivers can provide a robust wide area search capability in a very...

  12. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  13. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  14. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  15. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  16. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  17. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  18. Training Effectiveness of a Wide Area Virtual Environment in Medical Simulation.

    Science.gov (United States)

    Wier, Grady S; Tree, Rebekah; Nusr, Rasha

    2017-02-01

    The success of war fighters and medical personnel handling traumatic injuries largely depends on the quality of training they receive before deployment. The purpose of this study was to gauge the utility of a Wide Area Virtual Environment (WAVE) as a training adjunct by comparing and evaluating student performance, measuring sense of realism, and assessing the impact on student satisfaction with their training exposure in an immersive versus a field environment. This comparative prospective cohort study examined the utility of a three-screen WAVE where subjects were immersed in the training environment with medical simulators. Standard field training commenced for the control group subjects. Medical skills, time to completion, and Team Strategies and Tools to Enhance Performance and Patient Safety objective metrics were assessed for each team (n = 94). In addition, self-efficacy questionnaires were collected for each subject (N = 470). Medical teams received poorer overall team scores (F1,186 = 0.756, P = 0.001), took longer to complete the scenario (F1,186 = 25.15, P = 0.001), and scored lower on The National Registry of Emergency Medical Technicians trauma assessment checklist (F1,186 = 1.13, P = 0.000) in the WAVE versus the field environment. Critical thinking and realism factors within the self-efficacy questionnaires scored higher in the WAVE versus the field [(F1,466 = 8.04, P = 0.005), (F1,465 = 18.57, P = 0.000), and (F1,466 = 53.24, P = 0.000), respectively]. Environmental and emotional stressors may negatively affect critical thinking and clinical skill performance of medical teams. However, by introducing more advanced simulation trainings with added stressors, students may be able to adapt and overcome barriers to performance found in high-stress environments.

  19. LPWAN – Low-power Wide-area Network. Communication for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Vladislav Viktorovich Sheshalevich

    2017-07-01

    Full Text Available Recent advances in the field of cheaper sensors and various devices to control the parameters of industrial and household equipment has led to the emergence of new communication technologies, the so-called Internet of things, "machine-to-machine" or M2M technologies. The main feature of these technologies is a network communication of the physical objects without direct human intervention. The specifics of using the Low-power Wide-area Network (LPWAN network for these new communication technologies are considered. The LPWAN technologies have significant prospects for development adding to already traditional technologies such as Wi-Fi and cellular. This very term describes an approach, the communication technologies, characterized by the principles of reducing the connection speed in order to achieve wider range and lower power consumption of end nodes. Based on this concept different companies have built the specific competing systems of communication, such as Sigfox (first LPWAN technology, LoRa (derived from Long Range Ingenu RPMA, Weightless-P, “Strizh” telematics (the Russian analog of Sigfox and others. Each of the systems applies different methods to increase the range of coverage, to lower energy consumption and to use different possibilities for scalability. The principles of functioning of these communication systems are analyzed below. The major attention is paid to describing the very popular LPWAN-technology LoRa as one of the most open technology for practical applications. It is based on the same name radio modulation using its own unique method to broaden a spectrum. The topology and the main components of this network, including the sensor (end device with a radio module, the LoRa gateway and its network architecture are described in detail. Examples are given of the LoRa systems emerging on the domestic market of the Internet of things.

  20. New ray tracing method to investigate the various effects on wave propagation in medical scenario: an application of wireless body area network.

    Science.gov (United States)

    Islam, M J; Reza, A W; Kausar, A S M Z; Ramiah, H

    2014-01-01

    The advent of technology with the increasing use of wireless network has led to the development of Wireless Body Area Network (WBAN) to continuously monitor the change of physiological data in a cost efficient manner. As numerous researches on wave propagation characterization have been done in intrabody communication, this study has given emphasis on the wave propagation characterization between the control units (CUs) and wireless access point (AP) in a hospital scenario. Ray tracing is a tool to predict the rays to characterize the wave propagation. It takes huge simulation time, especially when multiple transmitters are involved to transmit physiological data in a realistic hospital environment. Therefore, this study has developed an accelerated ray tracing method based on the nearest neighbor cell and prior knowledge of intersection techniques. Beside this, Red-Black tree is used to store and provide a faster retrieval mechanism of objects in the hospital environment. To prove the superiority, detailed complexity analysis and calculations of reflection and transmission coefficients are also presented in this paper. The results show that the proposed method is about 1.51, 2.1, and 2.9 times faster than the Object Distribution Technique (ODT), Space Volumetric Partitioning (SVP), and Angular Z-Buffer (AZB) methods, respectively. To show the various effects on received power in 60 GHz frequency, few comparisons are made and it is found that on average -9.44 dBm, -8.23 dBm, and -9.27 dBm received power attenuations should be considered when human, AP, and CU move in a given hospital scenario.

  1. Method for collecting thermocouple data via secured shell over a wireless local area network in real time.

    Science.gov (United States)

    Arnold, F; DeMallie, I; Florence, L; Kashinski, D O

    2015-03-01

    This manuscript addresses the design, hardware details, construction, and programming of an apparatus allowing an experimenter to monitor and record high-temperature thermocouple measurements of dynamic systems in real time. The apparatus uses wireless network technology to bridge the gap between a dynamic (moving) sample frame and the static laboratory frame. Our design is a custom solution applied to samples that rotate through large angular displacements where hard-wired and typical slip-ring solutions are not practical because of noise considerations. The apparatus consists of a Raspberry PI mini-Linux computer, an Arduino micro-controller, an Ocean Controls thermocouple multiplexer shield, and k-type thermocouples.

  2. Method for collecting thermocouple data via secured shell over a wireless local area network in real time

    Science.gov (United States)

    Arnold, F.; DeMallie, I.; Florence, L.; Kashinski, D. O.

    2015-03-01

    This manuscript addresses the design, hardware details, construction, and programming of an apparatus allowing an experimenter to monitor and record high-temperature thermocouple measurements of dynamic systems in real time. The apparatus uses wireless network technology to bridge the gap between a dynamic (moving) sample frame and the static laboratory frame. Our design is a custom solution applied to samples that rotate through large angular displacements where hard-wired and typical slip-ring solutions are not practical because of noise considerations. The apparatus consists of a Raspberry PI mini-Linux computer, an Arduino micro-controller, an Ocean Controls thermocouple multiplexer shield, and k-type thermocouples.

  3. Cost-benefit analysis of an area-wide pest management program to control Asian tiger mosquito in New Jersey

    Science.gov (United States)

    Area-wide pest management (AWPM) is recommended to control urban mosquitoes, such as Aedes albopictus (Asian tiger mosquito), which limit outdoor activities. We conducted a cost-benefit analysis for an AWPM in Mercer and Monmouth counties, New Jersey, as part of a controlled design with matched area...

  4. Potential for area-wide control or eradication of tsetse flies in Africa

    International Nuclear Information System (INIS)

    Kabayo, J.P.; Feldmann, U.

    2000-01-01

    Tsetse flies (Glossina) are found in Africa over an area, estimated by various authors, of 7-11 million sq. km. The northern limit of this area corresponds closely to the southern edges of the Sahara and Somali Deserts, running along 14 deg. N and extending across the continent from Senegal in the west to Somalia in the east. The southern limit of tsetse distribution corresponds closely to the northern edges of the Kalahari and Namibian Deserts in the west and runs generally at 20-30 deg. S to the east of the continent (Ford and Katondo 1977). This tsetse fly belt covers the following 38 countries (listed below) in which the tsetse flies spread African trypanosomosis, a severe disease that affects man and his domestic livestock, and is among the factors responsible for limiting the pace and extent of development in those countries. The disease is of a major economic importance. Throughout the affected countries within the fly belt, areas that are heavily infested by the tsetse fly are virtually devoid of cattle and other species of domestic livestock. Distribution of livestock in all countries on the African continent where densely infested foci exist is almost exactly the reverse of the distribution of the fly (Finelle 1974, Brunhes et al. 1994). Attempts to control African trypanosomosis date back to the beginning of this century. Several different methods of control, some aimed at the disease-causing organism and other aimed at the vector, were employed (Nagel 1995, Jordan 1986). Until after the Second World War, when insecticides became available for use in tsetse control campaigns, the most widely used control measure against tsetse flies was habitat destruction (involving felling trees and bush-clearing), the elimination of host animals (involving killing of wild game) and, to a certain extent, the use of various trapping devices to catch the flies. The tsetse control campaigns mounted in the 40s, 50s and 60s were invariably extensive 'roll up the country

  5. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  6. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  7. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  8. Neural network-based multiuser detection for SDMA-OFDM system over IEEE 802.11n indoor wireless local area network channel models

    Science.gov (United States)

    Praveen Bagadi, Kala; Das, Susmita

    2013-10-01

    Space division multiple access - orthogonal frequency division multiplexing-based wireless communication has the potential to offer high-spectral efficiency, system performance and capacity. This article proposes an efficient blind multiuser detection (MUD) scheme using artificial neural network models such as the radial basis function. The proposed MUD technique is consistently outperforming the existing minimum mean square error and minimum bit error rate (MBER) MUDs with the performance close to the optimal maximum likelihood (ML) detector. Besides that, the computational complexity of the proposed one is comparatively lower than both the MBER and ML detectors. Further, it can also outperform MBER MUD in the overload scenario, where the number of users is more than that of the number of receiving antennas simulation-based study showing BER performance and complexity are carried out to prove the efficiency of the proposed techniques. This analysis is carried through the IEEE 802.11n standard channel models, which are designed for indoor wireless local area network applications of bandwidth up to 100 MHz at frequencies 2 and 5 GHz.

  9. DISTANT EARLY WARNING SYSTEM for Tsunamis - A wide-area and multi-hazard approach

    Science.gov (United States)

    Hammitzsch, Martin; Lendholt, Matthias; Wächter, Joachim

    2010-05-01

    system and to extend the CCUI with hazard specific functionality. The presentation covers the DEWS project, the system architecture and the CCUI in conjunction with details of information logistics. The DEWS Wide Area Centre connecting national centres to allow the international communication and warning exchange is presented also. REFERENCES: [1] DEWS, www.dews-online.org [2] OGC, www.opengeospatial.org [3] SWE, www.opengeospatial.org/projects/groups/sensorweb [4] Eclipse RCP, www.eclipse.org/home/categories/rcp.php [5] uDig, udig.refractions.net [6] WMS, www.opengeospatial.org/standards/wms [7] WFS, www.opengeospatial.org/standards/wfs [8] WPS, www.opengeospatial.org/standards/wps [9] OASIS, www.oasis-open.org [10] CAP, www.oasis-open.org/specs/#capv1.1 [11] EDXL-DE, www.oasis-open.org/specs/#edxlde-v1.0 [12] SOAP, www.w3.org/TR/soap [13] GITEWS (German Indonesian Tsunami Early Warning System) is a project of the German Federal Government to aid the recon¬struction of the tsunami-prone Indian Ocean region, www.gitews.org [14] The Tsunami Service Bus is the GITEWS sensor system integration platform offering standardised services for the detection and monitoring of tsunamis

  10. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  11. Small Airborne Hyperspectral Wide Area Imager for Disaster Response and Earth Science, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed hyperspectral plus LWIR system will deliver high signal to noise performance, a wide spectral range, nominally 365 nm to 1.7 um, a single long wave IR...

  12. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  13. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  14. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  15. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  16. Partnership Opportunities with AFRC for Wireless Systems Flight Testing

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview the flight test capabilities at NASA Armstrong Flight Research Center (AFRC), to open up partnership collaboration opportunities for Wireless Community to conduct flight testing of aerospace wireless technologies. Also, it will brief the current activities on wireless sensor system at AFRC through SBIR (Small Business Innovation Research) proposals, and it will show the current areas of interest on wireless technologies that AFRC would like collaborate with Wireless Community to further and testing.

  17. Wide area change detection with satellite imagery for locating underground nuclear testing

    International Nuclear Information System (INIS)

    Canty, M.J.; Jasani, B.; Schlittenhardt, J.

    2001-01-01

    nicest aspects of the MAD method: It sorts different categories of change into different image components. Another very important characteristic of the MAD transformation is that it is invariant to linear transformations of the data. This means that if for example the sensors used for the two images have different gains, or if atmospheric haze attenuates the reflectance measurement in one of the images but not in the other, the results of the analysis will be unaffected. A Bayesian model of the probability distribution of the MAD components intensities is applied to determine automatically the decision thresholds for change and no change. The prerequisite image-to-image registration is carried out automatically with the help contour and comer matching to determine ground control points, followed by nearest-neighbor resampling. The inclusion of higher resolution panchromatic information into the procedure without loss of spectral discrimination is accomplished via wavelet fusion with the multispectral channels. A computer program CDSAT (Change Detection with SATellite imagery), which implements a user-friendly graphical environment for performing the various steps involved, is described briefly. The technique has been applied successfully to detect the exact position of an underground nuclear test in Rajasthan in 1998. In the present paper we discuss further results for tests carried out in Lop Nor, China in the 1990's and at the Nevada test site in the 1980's. Historical LANDSAT TM satellite images are used for change detection. Results are correlated with seismic and ground truth data and conclusions are drawn regarding the applicability of wide area change detection to complement seismic verification of the Comprehensive Test Ban Treaty

  18. Tsunami risk assessment for facility group over a wide area using inundation assessment method considering energy conservation law

    International Nuclear Information System (INIS)

    Fukutani, Yo; Imamura, Fumihiko; Tokunaga, Takeshi; Sato, Ichiro

    2015-01-01

    We propose a quantitative evaluation method of overall tsunami risk that the entire facility group over a wide area holds. We considerably reduced the calculation cost for tsunami inundation depth by adopting the evaluation method using energy conservation law as compared with the evaluation method using non-linear long wave equation. For financial institutions such as banks and insurance companies with contractors over a wide area and business companies with multiple their assets and facilities in various places, the proposed evaluation method in this study could be a useful approach to implement their risk-based management decisions for tsunami risk. (author)

  19. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide...... a great advantage to final users and operators, compared with the nowadays situation with many disconnected systems and users equipped with different subscriptions, radio interfaces and terminals. To this issue, the IST project WINNER II has defined three system modes suited to local, metropolitan...... and wide area respectively. The aim of this paper is twofold: first, it presents an architectural solution for scalable and hybrid radio resource management to efficiently integrate the different WINNER modes; second, it proposes a hybrid handover mechanism to exploit the availability of the different...

  20. Recent invasion of world-wide wheat growing areas by two aggressive strains of Puccinia striiformis

    DEFF Research Database (Denmark)

    Walter, Stephanie; Ali, Sajid; Justesen, Annemarie Fejer

    2012-01-01

    The ever more frequent and severe large-scale epidemics of wheat yellow/stripe rust disease (caused by Puccinia striiformis) pose a severe threat to the world’s wheat production (Hovmøller et al. 2010). The onset of a new series of world-wide wheat yellow rust epidemics in 2000 has been linked...

  1. Data fusion in multi sensor platforms for wide-area perception

    NARCIS (Netherlands)

    Polychronopoulos, A.; Floudas, N.; Amditis, A.; Bank, D.; Broek, S.P. van den

    2006-01-01

    there is a strong belief that the improvement of preventive safety applications and the extension of their operative range will be achieved by the deployment of multiple sensors with wide fields of view (FOV). The paper contributes to the solution of the problem and introduces distributed sensor

  2. Feasibility Study of a Wearable System Based on a Wireless Body Area Network for Gait Assessment in Parkinson’s Disease Patients

    Directory of Open Access Journals (Sweden)

    Jorge Cancela

    2014-03-01

    Full Text Available Parkinson’s disease (PD alters the motor performance of affected individuals. The dopaminergic denervation of the striatum, due to substantia nigra neuronal loss, compromises the speed, the automatism and smoothness of movements of PD patients. The development of a reliable tool for long-term monitoring of PD symptoms would allow the accurate assessment of the clinical status during the different PD stages and the evaluation of motor complications. Furthermore, it would be very useful both for routine clinical care as well as for testing novel therapies. Within this context we have validated the feasibility of using a Body Network Area (BAN of wireless accelerometers to perform continuous at home gait monitoring of PD patients. The analysis addresses the assessment of the system performance working in real environments.

  3. A 274µW clock synchronized wireless body area network IC with super-regenerative RSSI for biomedical ad-hoc network system.

    Science.gov (United States)

    Yongsu Lee; Hoi-Jun Yoo

    2017-07-01

    A clock synchronized multi-node wireless body area network (WBAN) transceiver IC with super-regenerative RSSI is proposed for biomedical ad-hoc network system. The ad-hoc network makes stable communication even in the harsh human body channel condition (body channel communication (BCC). In the node IC, it has 2 key building blocks; 1) Injection locking clock synchronization receiver, and 2) Super-regenerative RSSI (SR-RSSI) and OOK receiver. As a result, the 240 MHz clock is exactly synchronized in the node IC with 90 μW power consumption. And a channel-condition-adapted ad-hoc network is constructed based on the SR-RSSI data. SR-RSSI consumes 184 μW concurrent achieving OOK receiver functionality for the ad-hoc network. The proposed WBAN IC is fabricated in 0.18 μm CMOS technology.

  4. A basic R and D for an analysis framework distributed on wide area network

    International Nuclear Information System (INIS)

    Ishino, M.; Kawabata, S.; Kawamoto, T.; Kobayashi, T.; Manabe, A.; Mashimo, T.; Matsumoto, H.; Morita, Y.; Sakamoto, H.; Sasaki, T.; Sato, H.; Tanaka, J.; Ueda, I.; Watase, Y.

    2004-01-01

    Present status is reported on several R and D issues related to world-wide analysis for forthcoming high-energy collider experiments. This study includes (1) high-density computer farm with effective configuration and management capability (2) high throughput data storage mechanisms covering disk arrays and hierarchical storage architecture, and (3) high-performance massive data transfer techniques on large latency WAN. Understanding these basic technologies is necessary for the deployment of developing data grid computing

  5. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  6. Economic evaluation of area-wide pest management program to control asian tiger mosquito in New Jersey

    Science.gov (United States)

    Area-wide pest management (AWPM) is recommended to control urban mosquitoes, such as Aedes albopictus, which limit outdoor activities. While several evaluations of effectiveness exist, information on costs is lacking. Economic evaluation of such a program is important to help inform policy makers an...

  7. Economic evaluation of an area-wide integrated pest management program to control the Asian tiger mosquito in New Jersey

    Science.gov (United States)

    Aedes albopictus is the most invasive mosquito in the world, an important disease vector, and a biting nuisance that limits outdoor activities. Area-wide integrated pest management (AW-IPM) is the recommended control strategy. We conducted an economic evaluation of the AW-IPM project in Mercer and ...

  8. Activity and function recognition for moving and static objects in urban environments from wide-area persistent surveillance inputs

    Science.gov (United States)

    Levchuk, Georgiy; Bobick, Aaron; Jones, Eric

    2010-04-01

    In this paper, we describe results from experimental analysis of a model designed to recognize activities and functions of moving and static objects from low-resolution wide-area video inputs. Our model is based on representing the activities and functions using three variables: (i) time; (ii) space; and (iii) structures. The activity and function recognition is achieved by imposing lexical, syntactic, and semantic constraints on the lower-level event sequences. In the reported research, we have evaluated the utility and sensitivity of several algorithms derived from natural language processing and pattern recognition domains. We achieved high recognition accuracy for a wide range of activity and function types in the experiments using Electro-Optical (EO) imagery collected by Wide Area Airborne Surveillance (WAAS) platform.

  9. Clinical potential of implantable wireless sensors for orthopedic treatments.

    Science.gov (United States)

    Karipott, Salil Sidharthan; Nelson, Bradley D; Guldberg, Robert E; Ong, Keat Ghee

    2018-03-21

    Implantable wireless sensors have been used for real-time monitoring of chemicals and physical conditions of bones, tendons and muscles to diagnose and study orthopedic diseases and injuries. Due to the importance of these sensors in orthopedic care, a critical review, which not only analyzes the underlying technologies but also their clinical implementations and challenges, will provide a landscape view on their current state and their future clinical role. Areas covered: By conducting an extensive literature search and following the leaders of orthopedic implantable wireless sensors, this review covers the battery-powered and battery-free wireless implantable sensor technologies, and describes their implementation for hips, knees, spine, and shoulder stress/strain monitoring. Their advantages, limitations, and clinical challenges are also described. Expert commentary: Currently, implantable wireless sensors are mostly limited for scientific investigations and demonstrative experiments. Although rapid advancement in sensors and wireless technologies will push the reliability and practicality of these sensors for clinical realization, regulatory constraints and financial viability in medical device industry may curtail their continuous adoption for clinical orthopedic applications. In the next five years, these sensors are expected to gain increased interest from researchers, but wide clinical adoption is still unlikely.

  10. Data transmission techniques for short-range optical fiber and wireless communication links

    DEFF Research Database (Denmark)

    Pham, Tien Thang

    -speed optical/wireless integration and advanced modulation formats for intensity modulation with direct detection (IM/DD) optical systems. Regarding optical/wireless integration, this thesis focuses on integration of broadband ultra-wide band (UWB) and 60-GHz band wireless systems into optical fiber access...... signals into a unified optical fiber platform. Additionally, half-cycle QAM modulation has prospects to increase SE and bit rates in high-speed short-range optical communication systems.......The research work described in this thesis is devoted to experimental investigation of techniques for cost-effective high-speed optical communications supporting both wired and wireless services. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high...

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into  the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances

  12. Projected impacts of climate change on a continent-wide protected area network

    DEFF Research Database (Denmark)

    Hole, David G; Willis, Stephen G; Pain, Deborah J

    2009-01-01

    . Using modelled projected shifts in the distributions of sub-Saharan Africa's entire breeding avifauna, we show that species turnover across the continent's Important Bird Area (IBA) network is likely to vary regionally and will be substantial at many sites (> 50% at 42% of IBAs by 2085 for priority...

  13. Area burned in alpine treeline ecotones reflects region-wide trends

    Science.gov (United States)

    C. Alina Cansler; Donald McKenzie; Charles B. Halpern

    2016-01-01

    The direct effects of climate change on alpine treeline ecotones – the transition zones between subalpine forest and non-forested alpine vegetation – have been studied extensively, but climate-induced changes in disturbance regimes have received less attention. To determine if recent increases in area burned extend to these higher-elevation landscapes, we analysed...

  14. Wide Area UXO Screening with the Multi-Sensor Fixed-Wing Airborne System MARS

    Science.gov (United States)

    2008-02-01

    and avoid contact with all types of cacti to minimize the potential for irritation or injury from this hazard. Bee and wasp stings, spider bites...other than caffeinated coffee), and warm rest areas are essential to preventing cold-related injury. Local body injury from exposure to cold is

  15. The South African fruit fly action plan: area-wide suppression and exotic species surveillance

    International Nuclear Information System (INIS)

    Barnes, Brian N.; Venter, Jan-Hendrik

    2006-01-01

    Two species of tephritid fruit flies of economic importance, Mediterranean fruit fly (Medfly, Ceratitis capitata [Wiedemann]) and Natal fruit fly (C. rosa Karsch) cause economic losses in the South African deciduous fruit industry of approximately US$3 million per annum. A third species, marula fruit fly, C. cosyra (Walker), causes damage to citrus and sub-tropical fruits in the north-eastern part of the country. In 1999 a sterile insect technique (SIT) programme against Medfly was initiated over 10,000 ha of table grapes with a goal of cost-effective, ecologically compatible suppression of Medfly. The SIT programme was extended to two other fruit production areas in 2004. Although results in all three SIT areas have been mixed, populations of wild Medflies, as well as associated pesticide usage and control costs, have been reduced since the start of sterile fly releases. Reasons for the partial degree of success and the relatively slow expansion of Medfly SIT to other areas include economic, operational and cultural factors, as well as certain fruit production practices. Before fruit fly-free areas can be created, deficiencies in the ability to mass-rear Natal fruit fly need to be overcome so that an SIT programme against this species can be initiated. Any fruit fly suppression or eradication campaign will be severely compromised by any introductions into South Africa of exotic fruit fly species. The risk of such introductions is increasing as trade with and travel to the country increases. A Plant Health Early Warning Systems Division has been initiated to formulate fruit fly detection and action plans. Melon fly (Bactrocera cucurbitae [Coquillett]), Asian fruit fly (B. invadens Drew, Tsurutu and White) and peach fruit fly (B. zonata [Saunders]), which are all well established in parts of Africa and/or Indian Ocean islands, have been identified as presenting the highest risk for entering and becoming established in South Africa. An exotic fruit fly surveillance

  16. The South African fruit fly action plan: area-wide suppression and exotic species surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Brian N., E-mail: barnesb@arc.agric.z [ARC Infruitec-Nietvoorbij Institute for Fruit, Vine and Wine, Stellenbosch (South Africa); Venter, Jan-Hendrik, E-mail: janhendrikv@nda.agric.z [Directorate Plant Health, Pretoria (South Africa)

    2006-07-01

    Two species of tephritid fruit flies of economic importance, Mediterranean fruit fly (Medfly, Ceratitis capitata [Wiedemann]) and Natal fruit fly (C. rosa Karsch) cause economic losses in the South African deciduous fruit industry of approximately US$3 million per annum. A third species, marula fruit fly, C. cosyra (Walker), causes damage to citrus and sub-tropical fruits in the north-eastern part of the country. In 1999 a sterile insect technique (SIT) programme against Medfly was initiated over 10,000 ha of table grapes with a goal of cost-effective, ecologically compatible suppression of Medfly. The SIT programme was extended to two other fruit production areas in 2004. Although results in all three SIT areas have been mixed, populations of wild Medflies, as well as associated pesticide usage and control costs, have been reduced since the start of sterile fly releases. Reasons for the partial degree of success and the relatively slow expansion of Medfly SIT to other areas include economic, operational and cultural factors, as well as certain fruit production practices. Before fruit fly-free areas can be created, deficiencies in the ability to mass-rear Natal fruit fly need to be overcome so that an SIT programme against this species can be initiated. Any fruit fly suppression or eradication campaign will be severely compromised by any introductions into South Africa of exotic fruit fly species. The risk of such introductions is increasing as trade with and travel to the country increases. A Plant Health Early Warning Systems Division has been initiated to formulate fruit fly detection and action plans. Melon fly (Bactrocera cucurbitae [Coquillett]), Asian fruit fly (B. invadens Drew, Tsurutu and White) and peach fruit fly (B. zonata [Saunders]), which are all well established in parts of Africa and/or Indian Ocean islands, have been identified as presenting the highest risk for entering and becoming established in South Africa. An exotic fruit fly surveillance

  17. TeleMed: Wide-area, secure, collaborative object computing with Java and CORBA for healthcare

    Energy Technology Data Exchange (ETDEWEB)

    Forslund, D.W.; George, J.E.; Gavrilov, E.M.

    1998-12-31

    Distributed computing is becoming commonplace in a variety of industries with healthcare being a particularly important one for society. The authors describe the development and deployment of TeleMed in a few healthcare domains. TeleMed is a 100% Java distributed application build on CORBA and OMG standards enabling the collaboration on the treatment of chronically ill patients in a secure manner over the Internet. These standards enable other systems to work interoperably with TeleMed and provide transparent access to high performance distributed computing to the healthcare domain. The goal of wide scale integration of electronic medical records is a grand-challenge scale problem of global proportions with far-reaching social benefits.

  18. Wide area tracking method for augmented reality supporting nuclear power plant maintenance work

    International Nuclear Information System (INIS)

    Ishii, Hirotake; Yan, Weida; Yang, Shou-feng; Shimoda, Hiroshi; Izumi, Masanori

    2010-01-01

    A new fiducial marker for augmented reality was designed along with a method that recognizes the markers captured by a camera and calculates the relative position and orientation between the markers and the camera. These markers can be used at both long and short distances without increasing their number in the environment. Results of the experimental evaluation show that the new marker can be used in a larger area than legacy markers such as square markers and circular markers. (author)

  19. Development of wide area tracking method for augmented reality using multi-range fiducials

    International Nuclear Information System (INIS)

    Ishii, Hirotake; Fujino, Hidenori; Yan, Weida; Yang, Shoufeng; Shimoda, Hiroshi; Izumi, Masanori

    2009-01-01

    A new fiducial marker for augmented reality was designed along with a method that recognizes the markers captured by a camera and calculates the relative position and orientation between the markers and the camera. These markers can be used at both long and short distances without increasing the number of markers pasted in the environment. Results of the experimental evaluation show that the new marker can be used in a larger area than circular markers and more stably than square markers. (author)

  20. Wireless information system for frost detection in orchards

    OpenAIRE

    Marković, Dušan B.; Glišić, Ivan P.; Pešović, Uroš M.; Ranđić, Siniša S.

    2013-01-01

    Electronic devices are widely used in many fields and agriculture is also one of the areas with great intensity of applications in the last years. Electronic sensor devices are particularly interesting because they are enable measure of parameters which have a major impact on agriculture production. The use of electronic devices additionally came to the fore with the development of wireless communication that allows gathering timely information about the status of important parameters for veg...

  1. Wide-area mapping of snow water equivalent by Sentinel-1&2 data

    Science.gov (United States)

    Conde, Vasco; Nico, Giovanni; Catalao, Joao; Kontu, Anna; Gritsevich, Maria

    2017-04-01

    The mapping of snow physical properties over large mountain areas of remote areas is an important topic in both climatological studies and hydrological models where the effects of snow melting are modeled and used to forecast extreme flood events. Usually, these models are run using in-situ measurements of snow which are expensive and statistically not representative of the spatial distribution of snow properties due to slope orientation of terrain, local terrain morphology and height as well as vegetation cover. In this work we investigate the use of data acquired by Sentinel-1 and 2 missions using a C-band SAR and multispectral sensor, respectively. The Sentinel-1 SAR data are processed to estimate the Snow Water Equivalent (SWE) using both the radar amplitude and the output of the SAR interferometry processing. Both approaches need in-situ data to process SAR data and calibrate SWE estimates. The use of SAR amplitude to estimate the SWE is well established and the basic idea is that the radar signal backscattered by snow is related to the SWE so, after modeling the relationship between these two quantities at the site of in-situ measurements this relationship can be used to map the SWE at all site where the SAR amplitude information is available. The physical principle used by SAR interferometry is that of phase delay due to propagation in a non-dispersive medium. This implies that the snow is supposed to be dry in order to allow the propagation of the SAR signal. Sentinel-2 images have been used to get land-use maps and identify areas covered by vegetation. Finland has been chosen as a study region with in-situ measurements acquired thanks to the availability of rich database of in-situ measurements of SWE. Sentinel data used in this work have been acquired starting from November 2015. Publication supported by FCT- project UID/GEO/50019/2013 - Instituto Dom Luiz.

  2. Many play concepts seen over wide area in Erris, Slyne troughs off Ireland

    International Nuclear Information System (INIS)

    Murphy, N.J.; Croker, P.F.

    1992-01-01

    This paper reports that the Erris and Slyne troughs are underexplored Mesozoic sedimentary basins off Ireland's northwest coast. The Irish Minister for Energy announced on Apr. 19, 1991, a frontier acreage licensing round of 128 blocks covering 29,000 sq km in these basins and the adjacent Rockall trough. Closing date for the round is June 30, 1993, set to allow two seasons for the acquisition of new geophysical and geological data over the area. Ireland has recently announced a new petroleum taxation regime. Revised licensing terms, which will acknowledge the specific circumstances of frontier acreage, will be announced

  3. Delayed-Input Wide Area Power System Stabilizer for Mode Selective Damping of Electromechanical Oscillations

    Directory of Open Access Journals (Sweden)

    Ashfaque Ahmed Hashmani

    2011-04-01

    Full Text Available A long time delay due to the transmission and processing of remote signal may degrade stability of power system. This paper discusses the design of H? -based local decentralized delayed-input PSS (Power System Stabilizer controllers for a separate better damping of inter-area modes. The controllers use selected suitable remote signals from whole system as supplementary inputs. The local and remote input signals, used by the controller, are the ones in which the assigned single inter-area mode is most observable. The controller is located at a generator which is most effective in controlling the assigned mode. The controller, designed for a particular single interarea mode, also works mainly in the natural frequency of the assigned mode. Pade approximation approach is used to model time delay. The time delay model is then merged into delay-free power system model to obtain the delayed-input power system model. The controllers are then redesigned for the delayed-input system.

  4. Wide-area mapping of small-scale features in agricultural landscapes using airborne remote sensing

    Science.gov (United States)

    O'Connell, Jerome; Bradter, Ute; Benton, Tim G.

    2015-11-01

    Natural and semi-natural habitats in agricultural landscapes are likely to come under increasing pressure with the global population set to exceed 9 billion by 2050. These non-cropped habitats are primarily made up of trees, hedgerows and grassy margins and their amount, quality and spatial configuration can have strong implications for the delivery and sustainability of various ecosystem services. In this study high spatial resolution (0.5 m) colour infrared aerial photography (CIR) was used in object based image analysis for the classification of non-cropped habitat in a 10,029 ha area of southeast England. Three classification scenarios were devised using 4 and 9 class scenarios. The machine learning algorithm Random Forest (RF) was used to reduce the number of variables used for each classification scenario by 25.5 % ± 2.7%. Proportion of votes from the 4 class hierarchy was made available to the 9 class scenarios and where the highest ranked variables in all cases. This approach allowed for misclassified parent objects to be correctly classified at a lower level. A single object hierarchy with 4 class proportion of votes produced the best result (kappa 0.909). Validation of the optimum training sample size in RF showed no significant difference between mean internal out-of-bag error and external validation. As an example of the utility of this data, we assessed habitat suitability for a declining farmland bird, the yellowhammer (Emberiza citronella), which requires hedgerows associated with grassy margins. We found that ˜22% of hedgerows were within 200 m of margins with an area >183.31 m2. The results from this analysis can form a key information source at the environmental and policy level in landscape optimisation for food production and ecosystem service sustainability.

  5. Wide-area mapping of small-scale features in agricultural landscapes using airborne remote sensing

    Science.gov (United States)

    O’Connell, Jerome; Bradter, Ute; Benton, Tim G.

    2015-01-01

    Natural and semi-natural habitats in agricultural landscapes are likely to come under increasing pressure with the global population set to exceed 9 billion by 2050. These non-cropped habitats are primarily made up of trees, hedgerows and grassy margins and their amount, quality and spatial configuration can have strong implications for the delivery and sustainability of various ecosystem services. In this study high spatial resolution (0.5 m) colour infrared aerial photography (CIR) was used in object based image analysis for the classification of non-cropped habitat in a 10,029 ha area of southeast England. Three classification scenarios were devised using 4 and 9 class scenarios. The machine learning algorithm Random Forest (RF) was used to reduce the number of variables used for each classification scenario by 25.5 % ± 2.7%. Proportion of votes from the 4 class hierarchy was made available to the 9 class scenarios and where the highest ranked variables in all cases. This approach allowed for misclassified parent objects to be correctly classified at a lower level. A single object hierarchy with 4 class proportion of votes produced the best result (kappa 0.909). Validation of the optimum training sample size in RF showed no significant difference between mean internal out-of-bag error and external validation. As an example of the utility of this data, we assessed habitat suitability for a declining farmland bird, the yellowhammer (Emberiza citronella), which requires hedgerows associated with grassy margins. We found that ∼22% of hedgerows were within 200 m of margins with an area >183.31 m2. The results from this analysis can form a key information source at the environmental and policy level in landscape optimisation for food production and ecosystem service sustainability. PMID:26664131

  6. Wide-area mapping of small-scale features in agricultural landscapes using airborne remote sensing.

    Science.gov (United States)

    O'Connell, Jerome; Bradter, Ute; Benton, Tim G

    2015-11-01

    Natural and semi-natural habitats in agricultural landscapes are likely to come under increasing pressure with the global population set to exceed 9 billion by 2050. These non-cropped habitats are primarily made up of trees, hedgerows and grassy margins and their amount, quality and spatial configuration can have strong implications for the delivery and sustainability of various ecosystem services. In this study high spatial resolution (0.5 m) colour infrared aerial photography (CIR) was used in object based image analysis for the classification of non-cropped habitat in a 10,029 ha area of southeast England. Three classification scenarios were devised using 4 and 9 class scenarios. The machine learning algorithm Random Forest (RF) was used to reduce the number of variables used for each classification scenario by 25.5 % ± 2.7%. Proportion of votes from the 4 class hierarchy was made available to the 9 class scenarios and where the highest ranked variables in all cases. This approach allowed for misclassified parent objects to be correctly classified at a lower level. A single object hierarchy with 4 class proportion of votes produced the best result (kappa 0.909). Validation of the optimum training sample size in RF showed no significant difference between mean internal out-of-bag error and external validation. As an example of the utility of this data, we assessed habitat suitability for a declining farmland bird, the yellowhammer ( Emberiza citronella ), which requires hedgerows associated with grassy margins. We found that ∼22% of hedgerows were within 200 m of margins with an area >183.31 m 2 . The results from this analysis can form a key information source at the environmental and policy level in landscape optimisation for food production and ecosystem service sustainability.

  7. Improvement of Wide-Area Damping Controller Subject to Actuator Saturations: A Dynamic Anti-windup Approach

    DEFF Research Database (Denmark)

    Fang, Jiakun; Wei, Yao; Chen, Zhe

    2018-01-01

    This paper presents results on a dynamic anti-windup compensator (DAWC) for the flexible AC transmission system (FACTS) based wide-area damping controller (WADC). A systematic design approach of the DAWC is proposed following a typical two-step design procedure. First, a 3rd order WADC is designed...... for a 10 machine, 39-bus power system reinforced with a static synchronous compensator (STATCOM) to damp the critical inter-area modes by employing appropriate global signal measurements. The full-order DAWC design method is applied to improve the dynamic performance with the saturated WADC. The robustness...... of the DAWC can cover a wide range of the operating conditions. Comparative studies on static anti-windup and DAWC has been carried out on both the numerical simulation and experimental platform. Both simulation and experimental results demonstrate the improved performances of the DAWC....

  8. A novel wide-area backup protection based on fault component current distribution and improved evidence theory.

    Science.gov (United States)

    Zhang, Zhe; Kong, Xiangping; Yin, Xianggen; Yang, Zengli; Wang, Lijun

    2014-01-01

    In order to solve the problems of the existing wide-area backup protection (WABP) algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S) evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance.

  9. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Directory of Open Access Journals (Sweden)

    Zhe Zhang

    2014-01-01

    Full Text Available In order to solve the problems of the existing wide-area backup protection (WABP algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance.

  10. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Science.gov (United States)

    Zhang, Zhe; Kong, Xiangping; Yin, Xianggen; Yang, Zengli; Wang, Lijun

    2014-01-01

    In order to solve the problems of the existing wide-area backup protection (WABP) algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S) evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance. PMID:25050399

  11. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  12. Subsurface Wireless Sensor Networks

    Science.gov (United States)

    Niemeier, J. J.; Davies, J. L.; Kruger, A.

    2008-12-01

    Conventional thinking holds that underground- and underwater radio communication is not possible, except at very low frequencies employing very long antennas and high transmit power. However, researchers at The University of Iowa have demonstrated that using inexpensive, low-power radios, it is in fact possible to achieve reliable underground radio communication over distances of several meters. This allows for creating underground wireless sensor networks. A proof-of-concept network was established at The University of Iowa, where nodes that measure soil moisture content are buried over a 20×20 m area (up to 1 m deep). The nodes organize themselves into a wireless sensor network, reconfigure routes as radio link quality waxes and wanes, cooperate in routing data packets to a surface base station, and so on. In an agricultural research setting, an advantage of such buried wireless sensor networks is that, if nodes were buried deep enough, they may be left in place during agricultural field work. Power consumption is an important issue in wireless sensor networks. This is especially true in a buried network where battery replacement is a major undertaking. The focus of continuing research is developing methods of inductively recharging buried sensor batteries.

  13. A Location-Based Duplex Scheme for Cost Effective Rural Broadband Connectivity Using IEEE 802.22 Cognitive Radio Based Wireless Regional Area Networks

    Science.gov (United States)

    Kalidoss, R.; Bhagyaveni, M. A.; Vishvaksenan, K. S.

    2014-08-01

    The search for a method of utilizing the scarce spectrum in an efficient manner is an active area of research in both academic and industrial communities. IEEE 802.22 is a standard for wireless regional area network (WRAN) based on cognitive radio (CR) that operates over underutilized portions of TV bands (54-862 MHz). Time division duplex (TDD)-based WRAN cells have such advantages as dynamic traffic allocation, traffic asymmetry to users and ease of spectrum allocation. However, these cells suffer from severe cross time slot (CTS) interference when the frames of the cells are not synchronized with adjacent WRAN cells. In this paper, we evaluate the location-based duplex (LBD) scheme for eliminating the CTS interference. The proposed LBD system is much more flexible and efficient in providing asymmetric data service and eliminating CTS interference by exploiting the advantages of both TDD and frequency division duplex (FDD) schemes. We also compare the performance of LBD systems with virtual cell concepts. Furthermore, our simulation results reveal that LBD-based systems outperform the virtual cell approach in terms of the low signal-to-interference (SIR) ratio requirement by mitigating the effects of CTS.

  14. Distributed power-line outage detection based on wide area measurement system.

    Science.gov (United States)

    Zhao, Liang; Song, Wen-Zhan

    2014-07-21

    In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i) high computational complexity; and (ii) relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM) for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  15. Area-wide approaches to insect pest management: history and lessons

    International Nuclear Information System (INIS)

    Klassen, Waldemar

    2000-01-01

    World agriculture is now entering a very trying era because currently our numbers are expanding by more than 90 million additional people per year. Demographers project that our growth will not drop below 90 million people per year until about 2020 (United Nations 1993, Nygaard 1998). The challenge is to increase food production every three or four years sufficiently to feed an additional population equivalent to that of Western Europe or North America. The land available for agriculture on a per capita basis is becoming progressively more limited so than in 2010, on average, 1 hectare in developing countries will have to feed 5 people, and in South Asia, 1 hectare will have to feed 8 people (Alexandratos 1995, Klassen 1995). On an average, 66 percent of the additional food must come from increased yields, and in South Asia, fully 80 percent must come from increased yields. The balance will come from expanding the area cultivated and use of intensified cropping systems. However, this is not a simple matter since pest populations tend to be favoured by yield-boosting measures. Since population growth rates recede as people overcome poverty, and since increasing food production is the principal means of overcoming poverty in many countries, it is imperative that in the decades immediately ahead major improvements be made in reducing losses to pests and in other yield enhancing measures

  16. The Plasmonic Pixel: Large Area, Wide Gamut Color Reproduction Using Aluminum Nanostructures.

    Science.gov (United States)

    James, Timothy D; Mulvaney, Paul; Roberts, Ann

    2016-06-08

    We demonstrate a new plasmonic pixel (PP) design that produces a full-color optical response over macroscopic dimensions. The pixel design employs arrays of aluminum nanorods "floating" above their Babinet complementary screen, Concepts from conventional cyan magenta yellow key (CMYK) printing techniques and red green blue (RGB) digital displays are integrated with nanophotonic design principles and adapted to the production of PP elements. The fundamental PP color blocks of CMYK are implemented via a composite plasmonic nanoantenna/slot design and then mixed in a digital display analog 3 × 3 array to produce a broad-gamut PP. The PP goes beyond current investigations into plasmonic color production by enabling a broad color gamut and physically large plasmonic color features/devices/images. The use of nanorods also leads to a color response that is polarization tunable. Furthermore, devices are fabricated using aluminum and the fabrication strategy is compatible with inexpensive, rapid-throughput, nanoimprint approaches. Here we quantify, both computationally and experimentally, the performance of the PP. Spectral data from a test palette is obtained and a large area (>1.5 cm lateral dimensions) reproduction of a photograph is generated exemplifying the technqiue.

  17. Distributed Power-Line Outage Detection Based on Wide Area Measurement System

    Directory of Open Access Journals (Sweden)

    Liang Zhao

    2014-07-01

    Full Text Available In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i high computational complexity; and (ii relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  18. The design of delay-dependent wide-area DOFC with prescribed degree of stability α for damping inter-area low-frequency oscillations in power system.

    Science.gov (United States)

    Sun, Miaoping; Nian, Xiaohong; Dai, Liqiong; Guo, Hua

    2017-05-01

    In this paper, the delay-dependent wide-area dynamic output feedback controller (DOFC) with prescribed degree of stability is proposed for interconnected power system to damp inter-area low-frequency oscillations. Here, the prescribed degree of stability α is used to maintain all the poles on the left of s=-α in the s-plane. Firstly, residue approach is adopted to select input-output control signals and the schur balanced truncation model reduction method is utilized to obtain the reduced power system model. Secondly, based on Lyapunov stability theory and transformation operation in complex plane, the sufficient condition of asymptotic stability for closed-loop power system with prescribed degree of stability α is derived. Then, a novel method based on linear matrix inequalities (LMIs) is presented to obtain the parameters of DOFC and calculate delay margin of the closed-loop system considering the prescribed degree of stability α. Finally, case studies are carried out on the two-area four-machine system, which is controlled by classical wide-area power system stabilizer (WAPSS) in reported reference and our proposed DOFC respectively. The effectiveness and advantages of the proposed method are verified by the simulation results under different operating conditions. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  20. Area-wide control of Chagas disease vectors in Latin America

    International Nuclear Information System (INIS)

    Schofield, C.J.

    2000-01-01

    Argentina, Brazil and Venezuela. Without exception, the results followed a similar course, with a rapid decline in house infestation rates and a reduction in the incidence of human infection. Generally however, it was impossible to consolidate the initial successes due to changes in intervention policy and a corresponding lack of programme continuity. Although domestic populations of Triatomine bugs can be cleared from individual houses, or from particular localities, the houses remain vulnerable to re-infestation by bugs brought in from untreated regions. In Brazil, the national programme to eliminate the primary vector, Triatoma infestans (Klug), was launched in 1983. It was highly successful, but - as with previous local campaigns - there were problems of sustainability and re-infestation of many of the treated localities (Dias 1987). To address this problem, governments of the six southern cone countries (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) in 1991 set up a joint initiative to control Chagas disease through the elimination of all domestic and peridomestic populations of the triatomine vectors (Kingman 1991). With the addition of Peru to this programme in 1996, the initiative now covers the entire geographic distribution of the primary vector, T. infestans. The Southern Cone Initiative was planned as a 10-year programme to eliminate all domestic and peridomestic populations of T. infestans, with concurrent suppression of other vector species of local importance. Now just past its mid-point, the programme has already met with considerable success with Chagas disease transmission interrupted over vast areas of Argentina, Chile, Uruguay, central Brazil, eastern Paraguay and southern Bolivia (Schmunis et al. 1996, WHO 1996, 1997a, 1998). Other domestic vectors in the region - such as Triatoma brasiliensis Neiva in northeast Brazil - are also being controlled and the World Health Organisation (WHO) now predicts complete interruption of Chagas disease

  1. Wide-Area Landslide Deformation Mapping with Multi-Path ALOS PALSAR Data Stacks: A Case Study of Three Gorges Area, China

    Directory of Open Access Journals (Sweden)

    Xuguo Shi

    2016-02-01

    Full Text Available In recent years, satellite synthetic aperture radar interferometry (InSAR has been adopted as a spaceborne geodetic tool to successfully measure surface deformation of a few well-known landslides in the Three Gorges area. In consideration of the fact that most events of slope failure happened at places other than those famous landslides since the reservoir impoundment in 2003, focusing on a limited number of slopes is insufficient to meet the requirements of regional-scale landslide disaster prevention and early warning. As a result, it has become a vital task to evaluate the overall stability of slopes across the vast area of Three Gorges using wide-coverage InSAR datasets. In this study, we explored the approach of carrying out joint analysis of multi-path InSAR data stacks for wide-area landslide deformation mapping. As an example, three ALOS (Advanced Land Observing Satellite PALSAR (Phased Array type L-band Synthetic Aperture Radar data stacks of neighboring ascending paths covering the area along the Yangtze River from Fengjie to Zigui were analyzed. A key problem to be solved is the separation of the tropospheric signal from the interferometric phase, for which we employed a hybrid description model of the atmospheric phase screen (APS to improve APS estimation from time series interferograms. The estimated atmospheric phase was largely correlated with the seasonal rainfall in the temporal dimension. The experimental results show that about 30 slopes covering total areas of 48 km2 were identified to be landslides in active deformation and should be kept under routine surveillance. Analyses of time series displacement measurements revealed that most landslides in the mountainous area far away from Yangtze River suffered from linear deformation, whereas landslides located on the river bank were destabilized predominantly by the influences of reservoir water level fluctuation and rainfall.

  2. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  3. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  4. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  5. PDCI Wide-Area Damping Control: PSLF Simulations of the 2016 Open and Closed Loop Test Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wilches Bernal, Felipe [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pierre, Brian Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Elliott, Ryan Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Byrne, Raymond H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Neely, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Trudnowski, Daniel J. [Montana Tech of the Univ. of Montana, Butte, MT (United States); Donnelly, Matthew K. [Montana Tech of the Univ. of Montana, Butte, MT (United States)

    2017-03-01

    To demonstrate and validate the performance of the wide-are a damping control system, the project plans to conduct closed-loop tests on the PDCI in summer/fall 2016. A test plan details the open and closed loop tests to be conducted on the P DCI using the wide-area damping control system. To ensure the appropriate level of preparedness, simulations were performed in order to predict and evaluate any possible unsafe operations before hardware experiments are attempted. This report contains the result s from these simulations using the power system dynamics software PSLF (Power System Load Flow, trademark of GE). The simulations use the WECC (Western Electricity Coordinating Council) 2016 light summer and heavy summer base cases.

  6. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  7. Practical design of SMES controller for improving power system stability based on wide area synchronized phasor measurement

    Energy Technology Data Exchange (ETDEWEB)

    Dechanupaprittha, S.; Watanabe, M.; Mitani, Y. [Kyushu Inst. of Technology, Kitakyushu-shi, Fukuoka (Japan); Hongesombut, K. [Tokyo Electric Power Company, Tokyo (Japan); Ngamroo, I. [King Mongkut' s Inst. of Technhology, Ladkrabang (Thailand)

    2007-07-01

    Various load demands with abrupt changes adversely affects power system operations and control, which can lead to significant problems such as system frequency oscillations due to insufficient system damping. In interconnected power systems, a local frequency control is needed in a given area. In addition, fluctuations of tie-line power flow should be stabilized. Superconducting magnetic energy storage (SMES) can be used as an effective device to exchange electrical energy with a power system. Wide area monitoring of power systems based on multiple synchronized phasor measurements such as the phasor measurement unit (PMU) using the global positioning system (GPS) offers the possibility of data synchronization at a common time reference. With the GPS, oscillation modes can be detected from measured data by modeling measured data as a coupled vibration model (CVM). This paper presented a practical design of a SMES controller based on wide area synchronized phasor measurement. The CVM can be used to represents an estimated power system model that is used for tuning SMES controller parameters. In addition, it can be used to evaluate the performance and effectiveness of the designed controller in the power system. For the desired damping performance, the controller parameters were optimally tuned using a heuristic optimization method, called a TABU search algorithm. A simulation study was then conducted in order to show and confirm the effectiveness of the design method on a two-area four machine power system. The paper explained the controller design methodology and discussed the application to a two-area, four-machine power system. The simulation revealed that the proposed design method could be implemented in a practical manner. 11 refs., 3 tabs., 7 figs.

  8. Ultra wide band antennas

    CERN Document Server

    Begaud, Xavier

    2013-01-01

    Ultra Wide Band Technology (UWB) has reached a level of maturity that allows us to offer wireless links with either high or low data rates. These wireless links are frequently associated with a location capability for which ultimate accuracy varies with the inverse of the frequency bandwidth. Using time or frequency domain waveforms, they are currently the subject of international standards facilitating their commercial implementation. Drawing up a complete state of the art, Ultra Wide Band Antennas is aimed at students, engineers and researchers and presents a summary of internationally recog

  9. A method exploiting direct communication between phasor measurement units for power system wide-area protection and control algorithms.

    Science.gov (United States)

    Almas, Muhammad Shoaib; Vanfretti, Luigi

    2017-01-01

    Synchrophasor measurements from Phasor Measurement Units (PMUs) are the primary sensors used to deploy Wide-Area Monitoring, Protection and Control (WAMPAC) systems. PMUs stream out synchrophasor measurements through the IEEE C37.118.2 protocol using TCP/IP or UDP/IP. The proposed method establishes a direct communication between two PMUs, thus eliminating the requirement of an intermediate phasor data concentrator, data mediator and/or protocol parser and thereby ensuring minimum communication latency without considering communication link delays. This method allows utilizing synchrophasor measurements internally in a PMU to deploy custom protection and control algorithms. These algorithms are deployed using protection logic equations which are supported by all the PMU vendors. Moreover, this method reduces overall equipment cost as the algorithms execute internally in a PMU and therefore does not require any additional controller for their deployment. The proposed method can be utilized for fast prototyping of wide-area measurements based protection and control applications. The proposed method is tested by coupling commercial PMUs as Hardware-in-the-Loop (HIL) with Opal-RT's eMEGAsim Real-Time Simulator (RTS). As illustrative example, anti-islanding protection application is deployed using proposed method and its performance is assessed. The essential points in the method are: •Bypassing intermediate phasor data concentrator or protocol parsers as the synchrophasors are communicated directly between the PMUs (minimizes communication delays).•Wide Area Protection and Control Algorithm is deployed using logic equations in the client PMU, therefore eliminating the requirement for an external hardware controller (cost curtailment)•Effortless means to exploit PMU measurements in an environment familiar to protection engineers.

  10. TV White spaces for wireless broadband in rural areas: the regulator, broadcaster and telecommunication(s) operator viewpoint

    CSIR Research Space (South Africa)

    Mfupe, LP

    2012-05-01

    Full Text Available Television White Spaces (TVWS) coupled with Dynamic Spectrum Access and Cognitive Radio (DSA-CR) technologies are increasingly viewed as key enablers to the bridging of the digital divide in rural areas. However, in order to realize maximum benefits...

  11. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  12. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus).

    Science.gov (United States)

    Ureña-Aranda, Cinthya A; Rojas-Soto, Octavio; Martínez-Meyer, Enrique; Yáñez-Arenas, Carlos; Landgrave Ramírez, Rosario; Espinosa de los Monteros, Alejandro

    2015-01-01

    A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  13. Error Analysis of Fast Moving Target Geo-location in Wide Area Surveillance Ground Moving Target Indication Mode

    Directory of Open Access Journals (Sweden)

    Zheng Shi-chao

    2013-12-01

    Full Text Available As an important mode in airborne radar systems, Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI mode has the ability of monitoring a large area in a short time, and then the detected moving targets can be located quickly. However, in real environment, many factors introduce considerable errors into the location of moving targets. In this paper, a fast location method based on the characteristics of the moving targets in WAS-GMTI mode is utilized. And in order to improve the location performance, those factors that introduce location errors are analyzed and moving targets are relocated. Finally, the analysis of those factors is proved to be reasonable by simulation and real data experiments.

  14. WIDE-AREA BASED ON COORDINATED TUNING OF FUZZY PSS AND FACTS CONTROLLER IN MULTI-MACHINE ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Homayoun Ebrahimian

    2016-03-01

    Full Text Available In this paper coordination of fuzzy power system stabilizer (FPSS and flexible ac transmission systems (FACTS have been considered in a multi-machine power system. The proposed model, has been applied for a wide-area power system. The proposed FPSS presented with local, nonlinear feedbacks, and the corresponding control synthesis conditions are given in terms of solutions to a set of linear matrix inequalities (LMIs. For this model, in fuzzy control synthesis, the new proposed control design method is based on fewer fuzzy rules and less computational burden. Also, the parameters of FACTS controller have been evaluated by improved honey bee mating optimization (IHBMO. The effectiveness of the proposed method has been applied over two case studies of single-machine infinite-bus (SMIB and two areas four machine (TAFM Kundur’s power system. The obtained results demonstrate the superiority of proposed strategy.

  15. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  16. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  17. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  18. 2D PWV monitoring of a wide and orographically complex area with a low dense GNSS network

    Science.gov (United States)

    Ferrando, Ilaria; Federici, Bianca; Sguerso, Domenico

    2018-04-01

    This study presents an innovative procedure to monitor the precipitable water vapor (PWV) content of a wide and orographically complex area with low-density networks. The procedure, termed G4M (global navigation satellite system, GNSS, for Meteorology), has been developed in a geographic information system (GIS) environment using the free and open source GRASS GIS software (https://grass.osgeo.org). The G4M input data are zenith total delay estimates obtained from GNSS permanent stations network adjustment and pressure ( P) and temperature ( T) observations using existing infrastructure networks with different geographic distributions in the study area. In spite of the wide sensor distribution, the procedure produces 2D maps with high spatiotemporal resolution (up to 250 m and 6 min) based on a simplified mathematical model including data interpolation, which was conceived by the authors to describe the atmosphere's physics. In addition to PWV maps, the procedure provides ΔPWV and heterogeneity index maps: the former represents PWV variations with respect to a "calm" moment, which are useful for monitoring the PWV evolution; and the latter are promising indicators to localize severe meteorological events in time and space. This innovative procedure is compared with meteorological simulations in this paper; in addition, an application to a severe event that occurred in Genoa (Italy) is presented.[Figure not available: see fulltext.

  19. A Robust WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2015-04-01

    Full Text Available With the development of modern society, the scale of the power system is rapidly increased accordingly, and the framework and mode of running of power systems are trending towards more complexity. It is nowadays much more important for the dispatchers to know exactly the state parameters of the power network through state estimation. This paper proposes a robust power system WLS state estimation method integrating a wide-area measurement system (WAMS and SCADA technology, incorporating phasor measurements and the results of the traditional state estimator in a post-processing estimator, which greatly reduces the scale of the non-linear estimation problem as well as the number of iterations and the processing time per iteration. This paper firstly analyzes the wide-area state estimation model in detail, then according to the issue that least squares does not account for bad data and outliers, the paper proposes a robust weighted least squares (WLS method that combines a robust estimation principle with least squares by equivalent weight. The performance assessment is discussed through setting up mathematical models of the distribution network. The effectiveness of the proposed method was proved to be accurate and reliable by simulations and experiments.

  20. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    Energy Technology Data Exchange (ETDEWEB)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    2017-07-01

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC that addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    OpenAIRE

    Ye, Song-Hae; Kim, Young-Sik; Lyou, Ho-Sun; Kim, Min-Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency respons...

  2. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  3. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  4. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  5. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  6. The transmission of monetary shocks in the euro area: a V AR analysis based on euro-wide data

    Directory of Open Access Journals (Sweden)

    Jan Kakes

    2000-06-01

    Full Text Available Using area-wide data, we simulate the responses of inflation and real output following monetary shocks in the EMU. We find that short-term interest rate shocks have a significant impact on real activity, but hardly on prices. M3 shows a perverse short-term response to a monetary contraction, which should be taken into account when interpreting the reference value of money growth (the "first pillar" of the Eurosystem's monetary strategy. Shocks to the effective exchange rate have a rapid impact on prices, money growth and real activity. As the exchange rate itself is hardly affected by monetary policy shocks, though, there is little scope for an exchange rate policy. Rather, these findings underscore the important role that the exchange rate should play as an information variable within the "second pillar" of the monetary strategy.

  7. A GIS-assisted approach to wide-area wind resource assessment and site selection for the state of Colorado

    Energy Technology Data Exchange (ETDEWEB)

    Brower, M.C. [Brower & Company, Andover, MA (United States); Hurley, P. [RLA Consulting, Bothell, WA (United States); Simon, R. [Consulting Meteorologist, Mill Valley, CA (United States)

    1996-12-31

    This paper describes the methodology and results of a wide-area wind resource assessment and site selection in Colorado. This was the first phase in a three-part assessment and monitoring program conducted for the State of Colorado Office of Energy Conservation and several collaborating utilities. The objective of this phase was to identify up to 20 candidate sites for evaluation and possible long-term monitoring. This was accomplished using a geographic information system (GIS), which takes into account such factors as topography, existing wind resource data, locations of transmission lines, land cover, and land use. The resulting list of sites recommended for evaluation in Phase 2 of the study includes locations throughout Colorado, but most are in the eastern plains. The GIS wind siting model may be modified and updated in the future as additional information becomes available. 3 figs., 1 tab.

  8. Public relations and political support in area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Dyck, V.A.; Regidor Fernandez, E.E.; Reyes Flores, J.; Teruya, T.; Barnes, B.; Gomez Riera, P.; Lindquist, D.; Reuben, R.

    2005-01-01

    The public relations component of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT) has a large impact on programme success. Full-time professionals should direct public relations activities and secure vital political support from governments and community organizations. Good communication among programme staff, and between programme staff and the public, is required to maintain participation and support, and to keep the work goal-oriented even when some programme activities are controversial. The media can be valuable and effective partners by informing the public about the real facts and activities of a programme, especially if this is done in a non-technical and straightforward way. Ongoing research support improves the programme technology, provides technical credibility on contentious issues, and solves operational problems. Programme failure can result from poor public relations and inadequate public support. (author)

  9. Turbo-FSK, a physical layer for low-power wide-area networks: Analysis and optimization

    Science.gov (United States)

    Roth, Yoann; Doré, Jean-Baptiste; Ros, Laurent; Berg, Vincent

    2017-02-01

    As the Internet-of-Things is becoming a reality, the need for a new Low-Power Wide-Area (LPWA) network emerged in the last few years. Numerous low-cost devices will be connected, and this requires an optimization of the link budget: the physical layer needs to be designed highly energy efficient. The combination of M-ary orthogonal Frequency-Shift-Keying (M-FSK) modulation and coding in the same process has been shown to be a promising candidate when associated with an iterative receiver (turbo principle). In this work, we study this new digital transmission scheme, called Turbo-FSK. An EXtrinsic Information Transfer (EXIT) chart analysis is realized. The influence of the packet length is investigated, and the scheme is shown to stay energy efficiency even with short packet sizes. Comparison with LPWA current technologies is performed, showing the potential of this technology. xml:lang="fr"

  10. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  11. Wide area scanning system and carbon microbeams at the external microbeam facility of the INFN LABEC laboratory in Florence

    Energy Technology Data Exchange (ETDEWEB)

    Giuntini, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Massi, M. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Calusi, S. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Castelli, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Carraresi, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Fedi, M.E.; Gelli, N. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Liccioli, L.; Mandò, P.A.; Mazzinghi, A. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Palla, L. [INFN, Sezione di Pisa and Università di Pisa, Largo B. Pontecorvo 3, I-56127 Pisa (Italy); Romano, F.P. [Consiglio Nazionale delle Ricerche (CNR), Istituto per i Beni Archeologici e Monumentali (IBAM), Via Biblioteca, 4, 95124 Catania (Italy); Istituto Nazionale di Fisica Nucleare (INFN), LNS, Via S.Sofia 62, 95125 Catania (Italy); and others

    2015-04-01

    Recently, developments have been made to the external scanning microbeam of INFN-LABEC laboratory in Florence. A new system for mechanical sample scanning was implemented. This system allows us to acquire large maps (up to 20 × 20 cm{sup 2}), of great interest in the Cultural Heritage field. In parallel, the possibility of using carbon microbeams for experiments, such as, for example, ion beam modification of materials and MeV Secondary Ion Mass Spectrometry, has been investigated. As a test application, Particle Induced X-ray Emission with carbon microbeams has been performed on a lapis lazuli stone. First results for both wide area imaging and external carbon microbeams are briefly reported.

  12. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  13. The use of semiochemical-based devices and formulations in area-wide programmes - A commercial perspective

    International Nuclear Information System (INIS)

    Jones, Owen T.; Casagrande, Enzo D.

    2000-01-01

    It is now almost 40 years since the first insect pheromone was isolated and identified and many authors have referred over the years to their commercial potential. Although much progress has been made during those years in terms of scientific and technological advances related to semiochemicals, the 'progress' that has actually been made in the commercial exploitation of pheromones and other semiochemicals has been rather limited when viewed in terms of their share of the agrochemical market. Based on published data and unpublished information which has been made available to the authors, semiochemical-based products are estimated to have world-wide sales in the US$70-80 million range at the manufacturers' level. This compares with a world-wide insecticide market of nearly US$8 billion in 1995 so that it therefore constitutes less than 1% of that market. In terms of the biopesticide market (bacteria, viruses, botanical insecticides, entomopathogenic nematodes and beneficial insects) on the other hand, semiochemicals constitute a much higher percentage (ca. 30%) and probably are third in importance after bacterial and botanical products. The industry has taken over 20 years to achieve its current size and has been pioneered mostly by small to medium-sized enterprises (SMEs). Several technical and biological factors have played a part in determining the rate at which semiochemical-based technology has been adopted commercially in the field but one factor in particular has greatly influenced this technology transfer process, namely, area-wide programmes. These have often been government-backed programmes that have demonstrated the effectiveness of the semiochemical-based technique being implemented and have convinced the farmers and growers of the benefits that these novel techniques can bring. Several strategies have been developed where semiochemicals have been used either alone or in combination with other control technologies but three in particular stands out

  14. Deep seismic transect across the Tonankai earthquake area obtained from the onshore- offshore wide-angle seismic study

    Science.gov (United States)

    Nakanishi, A.; Obana, K.; Kodaira, S.; Miura, S.; Fujie, G.; Ito, A.; Sato, T.; Park, J.; Kaneda, Y.; Ito, K.; Iwasaki, T.

    2008-12-01

    In the Nankai Trough subduction seismogenic zone, M8-class great earthquake area can be divided into three segments; they are source regions of the Nankai, Tonankai and presumed Tokai earthquakes. The Nankai and Tonankai earthquakes had often occurred simultaneously, and caused a great event. Hypocenters of these great earthquakes were usually located off the cape Shiono, Kii Peninsula, and the rupture propagated westwards and eastwards, respectively. To obtain the deep structure of the down-dip limit of around the Nankai Trough seismogenic zone, the segment boundary and first break area off the Kii Peninsula, the onshore-offshore wide-angle seismic studies was conducted in the western and eastern part of the Kii Peninsula and their offshore area in 2004 and 2006, respectively. The result of the seismic study in 2004 is mainly shown here. Structural images along the onshore and offshore profiles have already been separately obtained. In this study, an onshore-offshore integrated image of the western part of the Kii Peninsula, ~400km in a total length, is obtained from first arrival tomography and traveltime mapping of reflection phases by combining dataset of 13 land explosions, 2269 land stations, 36 OBSs and 1806 offshore airgun shots. The subduction angle of the Philippine Sea plate (PSP) gradually increases landward up to ~20-25 degree. Beneath the onshore part, the subducting PSP is estimated at ~5km shallower than that previously derived from seismicity. Low frequency earthquakes (identified and picked by Japan Meteorological Agency) are relocated around the plate interface of the subducting PSP by using the deep seismic transect obtained in this study. The offshore research is part of 'Structure research on plate dynamics of the presumed rupture zone of the Tonankai-Nankai Earthquakes' funded by Ministry of Education, Culture, Sports, Science and Technology (MEXT). The onshore research carried by the Kyoto University is part of 'Special Project for

  15. Mass Releases of Genetically Modified Insects in Area-Wide Pest Control Programs and Their Impact on Organic Farmers

    Directory of Open Access Journals (Sweden)

    R. Guy Reeves

    2017-01-01

    Full Text Available The mass release of irradiated insects to reduce the size of agricultural pest populations of the same species has a more than 50-year record of success. Using these techniques, insect pests can be suppressed without necessarily dispersing chemical insecticides into the environment. Ongoing release programs include the suppression of medfly at numerous locations around the globe (e.g., California, Chile and Israel and the pink bollworm eradication program across the southern USA and northern Mexico. These, and other successful area-wide programs, encompass a large number of diverse organic farms without incident. More recently, mass release techniques have been proposed that involve the release of genetically modified insects. Given that the intentional use of genetically modified organisms by farmers will in many jurisdictions preclude organic certification, this prohibits the deliberate use of this technology by organic farmers. However, mass releases of flying insects are not generally conducted by individual farmers but are done on a regional basis, often without the explicit consent of all situated farms (frequently under the auspices of government agencies or growers’ collectives. Consequently, there exists the realistic prospect of organic farms becoming involved in genetically modified insect releases as part of area-wide programs or experiments. Herein, we describe genetically modified insects engineered for mass release and examine their potential impacts on organic farmers, both intended and unintended. This is done both generally and also focusing on a hypothetical organic farm located near an approved experimental release of genetically modified (GM diamondback moths in New York State (USA.

  16. Interpretation of the concentrations of aldehydes in rainwater over a wide area and local areas of Japan by some dominant factors

    Science.gov (United States)

    Taguchi, Shigeru; Murai, Keita; Takamatsu, Mizuho; Hayakawa, Yukari; Tamizu, Shinya; Kuwata, Makoto; Katayama, Yuuki; Kuramitz, Hideki; Hata, Noriko

    2012-12-01

    Rainwater pollution with formaldehyde, acetaldehyde and other aliphatic aldehydes was investigated from May 2008 to June 2011 at 19 locations over a wide area in Japan to survey the pollution level. The pollution level was remarkably controlled by the amount of precipitation. The concentrations of total aliphatic aldehydes and formaldehyde sometimes exceeded 0.6 mg L-1 and 0.2 mg L-1 when the rainfall was small, and decreased rapidly with increasing the amount of rainfall. And in larger rainfall, the concentrations were converged to ca. 0.09 mg L-1 and 0.06 mg L-1 respectively. It was found that the concentration of the pollutants collected in a bottle for a single rainfall event is expressed by an equation based on a dilution model where heavy deposition occurred only at early rainfall followed by continuous dilution of the water with less polluted rainwater. These results were interpreted that the aldehydes in air were washed out very quickly due to their high solubility in water. As progressing of rainfall, the pollution level attained to an equilibrium state between influx and outflux of the pollutants. Precise investigation through a sequential sampling of rainwater by 1 mm during a rainfall event was also performed at several sites. It was found that a break of rainfall is another dominant factor to control the pollution level. A break of rainfall quickly enhanced the pollution level of the resumed rain. Regional difference on rainwater pollution level was observed only at the early stage throughout a rainfall event. The air-pollution levels were high just before beginning rainfall, and they decreased quickly with increasing the amount of rainfall, but never converged to zero. These results suggest that continuous influx of the pollutants occurs in a wide area in Japan besides regional influx.

  17. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2003-01-01

    We added data transmission to the through-the-earth communications system using quadrature synchronous detection. The results are adequate for computer-to-computer communication as well as for sensor data transmission. We added a feature to the in-mine communications system that allows a person to call an individual, rather than broadcasting, by dialing an identification number before speaking.

  18. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2004-01-01

    A prototype tracking system was built and tested. Moving vehicles were detected by the tracking system when a vehicle was 20 to 30 feet away from a location sensor. The identity of the vehicle was transmitted to Transtek's in-mine communications system and relayed to a desktop computer.

  19. Area-wide control of fruit flies and other insect pests. Joint proceedings of the international conference on area-wide control of insect pests and the fifth international symposium on fruit flies of economic importance

    International Nuclear Information System (INIS)

    Tan, Keng-Hong

    2000-01-01

    With the world population attaining the six billion mark, the urgency of increasing quality food production and reducing the spread of diseases transmitted by insects, without affecting our fragile environment, will be of paramount importance. Losses currently experienced in agricultural production, due to insect pests and through diseases transmitted by insect vectors, are very high especially in developing and poor countries. Many insect pests and vectors are of economic importance, and several such as fruit flies, mosquitoes and tsetse flies have attracted international concerns. Most pests are traditionally controlled through heavy reliance on pesticides which can cause environmental pollution, pesticide resistance, and pest resurgence. The control, management or eradication of insect pests and vectors with minimal adverse impact on our food quality, environment, health and well-being should be of great concern to many agriculturists, biological and physical scientists as well as to national and international agencies responsible for pest control. Steps taken by the various concerned agencies to improve and implement the area-wide control will hopefully lead us into the next millennium free from major insect pests and vectors while at the same time protect our precarious global environment. This volume is the culmination of proceedings conducted in two recent international meetings, FAO/IAEA International Conference on Area-Wide Control of Insect Pests, 28 May - 2 June 1998, and the Fifth International Symposium on Fruit Flies of Economic Importance, 1-5 June 1998, held in Penang, Malaysia. Over three hundred papers (both oral contributions and posters) were presented at the two meetings. The manuscripts submitted by authors are divided according to broad topics into eighteen sections originally defined by the organisers as corresponding to the sessions of the meetings. The organisers identified one to several individuals in each of the sessions to deliver an

  20. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sabrina Boubiche

    2016-04-01

    Full Text Available Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  1. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  2. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  3. An Analysis of Electromagnetic Interference (EMI) of Ultra Wideband(UWB) and IEEE 802.11A Wireless Local Area Network (WLAN) Employing Orthogonal Frequency Division Multiplexing (OFDM)

    Science.gov (United States)

    2004-03-01

    be monitored with an electronic monitoring device that records the ambient temperature periodically. The data is collected and logged daily...Fi) Networking Handbook, McGraw-Hill: NY, 2003. [Sal02]. M.P. Salud , Investigation of RF Emissions from Wireless Networks as a Threat to Avionic

  4. Artificial Neural Network for Location Estimation in Wireless Communication Systems

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2012-03-01

    Full Text Available In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS. To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA measurements and the angle of arrival (AOA information to locate MS when three base stations (BSs are available. Artificial neural networks (ANN are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line, based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  5. Artificial neural network for location estimation in wireless communication systems.

    Science.gov (United States)

    Chen, Chien-Sheng

    2012-01-01

    In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS). To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA) measurements and the angle of arrival (AOA) information to locate MS when three base stations (BSs) are available. Artificial neural networks (ANN) are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line), based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS) environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  6. Economic evaluation of an area-wide integrated pest management program to control the Asian tiger mosquito in New Jersey.

    Directory of Open Access Journals (Sweden)

    Donald S Shepard

    Full Text Available Aedes albopictus is the most invasive mosquito in the world, an important disease vector, and a biting nuisance that limits outdoor activities. Area-wide integrated pest management (AW-IPM is the recommended control strategy. We conducted an economic evaluation of the AW-IPM project in Mercer and Monmouth Counties, New Jersey with a controlled design (AW-IPM vs. control from 2009 through 2011. The study analyzed financial documents and staff time for AW-IPM and surveyed an average of 415 randomly chosen households in AW-IPM and control areas each fall from 2008 through 2011. Hours lost from yard and porch activities were calculated as differences between actual and potential hours of these activities in an average summer week if there had been no mosquito concerns. Net estimated benefits of AW-IPM were based on cross-over and difference-in-difference analyses. Reductions in hours lost were valued based on respondents' willingness to pay for a hypothetical extra hour free of mosquitoes spent on yard or porch activities and literature on valuation of a quality adjusted life year (QALY. The incremental cost of AW-IPM per adult was $41.18 per year. Number of hours lost due to mosquitoes in AW-IPM areas between the base year (2008 and the intervention years (2009-2011 declined by 3.30 hours per summer week in AW-IPM areas compared to control areas. Survey respondents valued this improvement at $27.37 per adult per summer week. Over the 13-week summer, an average adult resident gained 42.96 hours of yard and porch time, worth $355.82. The net benefit over the summer was $314.63. With an average of 0.0027 QALYs gained per adult per year, AW-IPM was cost effective at $15,300 per QALY gained. The benefit-cost ratio from hours gained was 8.64, indicating that each $1 spent on AW-IPM gave adults additional porch and yard time worth over $8.

  7. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Francesco Licandro

    2007-03-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  8. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Licandro Francesco

    2007-01-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  9. Raspberry Pi Based Intelligent Wireless Sensor Node for Localized Torrential Rain Monitoring

    Directory of Open Access Journals (Sweden)

    Zhaozhuo Xu

    2016-01-01

    Full Text Available Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.

  10. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  11. WirelessHART vs. ISA100.11a: The Format War Hits the Factory Floor

    OpenAIRE

    Petersen, Stig; Carlsen, Simon

    2011-01-01

    The first decade of the new millennium has been a stage for the rapid development of wireless communication technologies for low-cost, low-power wireless solutions capable of robust and reliable communication [1]. IEEE Standard 802.15.4 for low-rate wireless personal area networks (WPANs) [2] has been the enabling technology for numerous applications within the field of wireless sensor networks (WSNs) [3], and more recently, wireless instrumentation. Although WSNs quickly found their way into...

  12. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  13. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  14. Wide-area mapping of resting state hemodynamic correlations at microvascular resolution with multi-contrast optical imaging (Conference Presentation)

    Science.gov (United States)

    Senarathna, Janaka; Hadjiabadi, Darian; Gil, Stacy; Thakor, Nitish V.; Pathak, Arvind P.

    2017-02-01

    Different brain regions exhibit complex information processing even at rest. Therefore, assessing temporal correlations between regions permits task-free visualization of their `resting state connectivity'. Although functional MRI (fMRI) is widely used for mapping resting state connectivity in the human brain, it is not well suited for `microvascular scale' imaging in rodents because of its limited spatial resolution. Moreover, co-registered cerebral blood flow (CBF) and total hemoglobin (HbT) data are often unavailable in conventional fMRI experiments. Therefore, we built a customized system that combines laser speckle contrast imaging (LSCI), intrinsic optical signal (IOS) imaging and fluorescence imaging (FI) to generate multi-contrast functional connectivity maps at a spatial resolution of 10 μm. This system comprised of three illumination sources: a 632 nm HeNe laser (for LSCI), a 570 nm ± 5 nm filtered white light source (for IOS), and a 473 nm blue laser (for FI), as well as a sensitive CCD camera operating at 10 frames per second for image acquisition. The acquired data enabled visualization of changes in resting state neurophysiology at microvascular spatial scales. Moreover, concurrent mapping of CBF and HbT-based temporal correlations enabled in vivo mapping of how resting brain regions were linked in terms of their hemodynamics. Additionally, we complemented this approach by exploiting the transit times of a fluorescent tracer (Dextran-FITC) to distinguish arterial from venous perfusion. Overall, we demonstrated the feasibility of wide area mapping of resting state connectivity at microvascular resolution and created a new toolbox for interrogating neurovascular function.

  15. Data transfer nodes and demonstration of 100-400 Gbps wide area throughput using the Caltech SDN testbed

    Science.gov (United States)

    Mughal, A.; Newman, H.

    2017-10-01

    We review and demonstrate the design of efficient data transfer nodes (DTNs), from the perspective of the highest throughput over both local and wide area networks, as well as the highest performance per unit cost. A careful system-level design is required for the hardware, firmware, OS and software components. Furthermore, additional tuning of these components, and the identification and elimination of any remaining bottlenecks is needed once the system is assembled and commissioned, in order to obtain optimal performance. For high throughput data transfers, specialized software is used to overcome the traditional limits in performance caused by the OS, file system, file structures used, etc. Concretely, we will discuss and present the latest results using Fast Data Transfer (FDT), developed by Caltech. We present and discuss the design choices for three generations of Caltech DTNs. Their transfer capabilities range from 40 Gbps to 400 Gbps. Disk throughput is still the biggest challenge in the current generation of available hardware. However, new NVME drives combined with RDMA and a new NVME network fabric are expected to improve the overall data-transfer throughput and simultaneously reduce the CPU load on the end nodes.

  16. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  17. Multi-Domain SDN Survivability for Agricultural Wireless Sensor Networks

    OpenAIRE

    Huang, Tao; Yan, Siyu; Yang, Fan; Liu, Jiang

    2016-01-01

    Wireless sensor networks (WSNs) have been widely applied in agriculture field; meanwhile, the advent of multi-domain software-defined networks (SDNs) have improved the wireless resource utilization rate and strengthened network management. In recent times, multi-domain SDNs have been applied to agricultural sensor networks, namely multi-domain software-defined wireless sensor networks (SDWSNs). However, when the SDNs controlling agriculture networks suddenly become unavailable, whether intra-...

  18. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Many wireless technologies are already available for sensor applications. It is inevitable that many non-interoperable wireless technologies between 400 MHz and 5.8...

  19. Bone cancer induces a unique central sensitization through synaptic changes in a wide area of the spinal cord.

    Science.gov (United States)

    Yanagisawa, Yoshikazu; Furue, Hidemasa; Kawamata, Tomoyuki; Uta, Daisuke; Yamamoto, Jun; Furuse, Shingo; Katafuchi, Toshihiko; Imoto, Keiji; Iwamoto, Yukihide; Yoshimura, Megumu

    2010-07-05

    Chronic bone cancer pain is thought to be partly due to central sensitization. Although murine models of bone cancer pain revealed significant neurochemical changes in the spinal cord, it is not known whether this produces functional alterations in spinal sensory synaptic transmission. In this study, we examined excitatory synaptic responses evoked in substantia gelatinosa (SG, lamina II) neurons in spinal cord slices of adult mice bearing bone cancer, using whole-cell voltage-clamp recording techniques. Mice at 14 to 21 days after sarcoma implantation into the femur exhibited hyperalgesia to mechanical stimuli applied to the skin of the ipsilateral hind paw, as well as showing spontaneous and movement evoked pain-related behaviors. SG neurons exhibited spontaneous excitatory postsynaptic currents (EPSCs). The amplitudes of spontaneous EPSCs were significantly larger in cancer-bearing than control mice without any changes in passive membrane properties of SG neurons. In the presence of TTX, the amplitude of miniature EPSCs in SG neurons was increased in cancer-bearing mice and this was observed for cells sampled across a wide range of lumbar segmental levels. Alpha-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid (AMPA) receptor- and N-methyl-D-aspartate (NMDA) receptor-mediated EPSCs evoked by focal stimulation were also enhanced in cancer-bearing mice. Dorsal root stimulation elicited mono- and/or polysynaptic EPSCs that were caused by the activation of Adelta and/or C afferent fibers in SG neurons from both groups of animals. The number of cells receiving monosynaptic inputs from Adelta and C fibers was not different between the two groups. However, the amplitude of the monosynaptic C fiber-evoked EPSCs and the number of SG neurons receiving polysynaptic inputs from Adelta and C fibers were increased in cancer-bearing mice. These results show that spinal synaptic transmission mediated through Adelta and C fibers is enhanced in the SG across a wide area of

  20. Bone cancer induces a unique central sensitization through synaptic changes in a wide area of the spinal cord

    Directory of Open Access Journals (Sweden)

    Uta Daisuke

    2010-07-01

    enhanced in the SG across a wide area of lumbar levels following sarcoma implantation in the femur. This widespread spinal sensitization may be one of the underlying mechanisms for the development of chronic bone cancer pain.

  1. Downlink interference suppression of 802.11ac wireless network

    Directory of Open Access Journals (Sweden)

    WANG Huan

    2016-04-01

    Full Text Available In the 802.11ac wireless local area network,wireless intelligent devices(WID need to be connected to the network through the wireless access point(AP,and other wireless APs in the downlink transmission process will cause interference to the target WID.In this paper,we propose a method based on iterative minimum mean square error interference alignment,which can suppress the interference from the other wireless APs to the target WIDs.The wireless access terminal and wireless smart devices have designed linear precode and decode respectively.Under the minimum mean square error criterion and limitation the power constraint,optimal precode and decode can be received.Simulation results show that the proposed method,when the signal to noise ratio is 5 dB,the transmission rate of the unit bandwidth transmission rate is increased by 1 bit/s compared with the traditional Max-SINR algorithm.

  2. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  3. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  4. Designing and implementing a geographical information system: A guide for managers of area-wide pest management programmes

    International Nuclear Information System (INIS)

    2006-04-01

    Over the past two decades, the use of computer software and mapping methods known as geographical information systems (GIS) has been adopted by an ever growing variety of professionals. Every activity that deals with location dependent information can use GIS, and agriculture is no exception. The potential of GIS and remote sensing (RS) to facilitate the planning and implementation of areawide integrated pest management (AW-IPM) programmes is enormous but unfortunately, these methods are still much underused. AW-IPM programmes, especially those that integrate the sterile insect technique (SIT) with other surveillance and control methods, would benefit considerably by drawing on GIS/RS. These programmes are often implemented over large areas of even tens of thousands of square kilometres, where surveillance methods are deployed and large data sets are systematically generated on a daily basis. The acquisition of geo-referenced data sets on pest presence/absence, relative abundance, disease prevalence, crop damage, etc., that will allow accurate spatial and temporal analysis is important for proper and timely decision making to efficiently plan and implement any operational pest management programme. Animal health and plant protection officials and pest control programme managers might be intuitively aware of the importance of employing GIS as an analytical tool. However, they often lack a deeper understanding of its capabilities. Since GIS is a desk exercise using computers, data analysis is often left to the computer staff without proper directives from the programme managers on programmatic needs. This is unfortunate as it will usually NOT bring the desired GIS-processed information to the decision makers. This manual targets area-wide pest control programme administrators and managers of FAO and IAEA Member States in an attempt to demonstrate the type of data processing and spatial analysis that can be expected of GIS. The manual does not aim to provide

  5. Preparing the way for coming area wide integrated pest management projects against the new world screwworm, Cochliomyia hominivorax, in MERCOSUR

    International Nuclear Information System (INIS)

    Mastrangelo, Thiago; Fernandes, Thiago; Walder, Julio; Bezerra, Fernando

    2011-01-01

    The New World Screwworm (NWS), Cochliomyia hominivorax, was eradicated from the USA, Central America to Panama, but in most tropical regions of Latin America, the NWS is still a serious threat to livestock, provoking estimated annual losses of US$ 1.8 billion in Brazil. Between January and May 2009, a pilot-project was performed at the Brazil-Uruguay border. As the results were positive, novel regional Area-Wide Integrated Pest Management projects are being planned. To set a mass-rearing center based in South America is strategic when considering long-term programs. In partnership with CENA/USP and the Biofactory MOSCAMED Brazil, a project to produce sterile NWS started on 2009. The project aimed to maintain a colony of a regional NWS strain, to develop a mass-rearing system and a sterilization protocol by X rays, and to study the sterility induction in regional strains. A colony was successfully established. The adults were kept in cages and fed on a diet (honey and spray dried egg). The larvae were reared in a medium made of spray dried blood, spray dried egg, milk, water, formalin and Ecogel. Egg hatch has been of 80 ± 10%. From F 1 to F 22 , the total amount of pupae produced was about 38 L (∼ 315,400 pupae). The mean adult emergence and sex ratio were 86.7 ± 3% and 0.59 ± 0.08 respectively. The mean pupal weight was 47.1 ± 1.7 mg. The estimated X ray doses to induce 99% sterility in males and females were 43.7 Gy and 47.5 Gy, respectively. To produce 1.5 L of pupae, the current cost is about US$ 15.00. (author)

  6. Preparing the way for coming area wide integrated pest management projects against the new world screwworm, Cochliomyia hominivorax, in MERCOSUR

    Energy Technology Data Exchange (ETDEWEB)

    Mastrangelo, Thiago; Fernandes, Thiago; Walder, Julio, E-mail: piaui@cena.usp.br [Centro de Energia Nuclear na Agricultura (CENA/USP), Piracicaba, SP (Brazil); Bezerra, Fernando [Instituto Federal de Educacao, Ciencia e Tecnologia do Sertao Pernambucano (IFSERTAO-PE), Petrolina, PE (Brazil)

    2011-07-01

    The New World Screwworm (NWS), Cochliomyia hominivorax, was eradicated from the USA, Central America to Panama, but in most tropical regions of Latin America, the NWS is still a serious threat to livestock, provoking estimated annual losses of US$ 1.8 billion in Brazil. Between January and May 2009, a pilot-project was performed at the Brazil-Uruguay border. As the results were positive, novel regional Area-Wide Integrated Pest Management projects are being planned. To set a mass-rearing center based in South America is strategic when considering long-term programs. In partnership with CENA/USP and the Biofactory MOSCAMED Brazil, a project to produce sterile NWS started on 2009. The project aimed to maintain a colony of a regional NWS strain, to develop a mass-rearing system and a sterilization protocol by X rays, and to study the sterility induction in regional strains. A colony was successfully established. The adults were kept in cages and fed on a diet (honey and spray dried egg). The larvae were reared in a medium made of spray dried blood, spray dried egg, milk, water, formalin and Ecogel. Egg hatch has been of 80 {+-} 10%. From F{sub 1} to F{sub 22}, the total amount of pupae produced was about 38 L ({approx} 315,400 pupae). The mean adult emergence and sex ratio were 86.7 {+-} 3% and 0.59 {+-} 0.08 respectively. The mean pupal weight was 47.1 {+-} 1.7 mg. The estimated X ray doses to induce 99% sterility in males and females were 43.7 Gy and 47.5 Gy, respectively. To produce 1.5 L of pupae, the current cost is about US$ 15.00. (author)

  7. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  8. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  9. Effectiveness of the Area-wide Pest Management Program to Control Asian Tiger Mosquito in New Jersey: Evidence from a Household Survey

    Science.gov (United States)

    Households’ behaviors can both mitigate and measure the spread of urban mosquitos. Beginning in 2009, a comprehensive area-wide pest management (AWPM) project to control Aedes albopictus was implemented in 4 areas in Monmouth and Mercer Counties, New Jersey. Including other activities, the project f...

  10. Effectiveness of the area wide pest management program to control asian tiger mosquito in New Jersey: evidence from a household survey

    Science.gov (United States)

    Households’ behaviors can both mitigate and measure the spread of urban mosquito species. Beginning in 2009, an area-wide pest management (AWPM) project to control Ae. Albopictus was implemented in 6 areas in Monmouth and Mercer counties, NJ. Including other activities, the project focused on increa...

  11. Wireless Sensing Opportunities for Aerospace Applications

    Directory of Open Access Journals (Sweden)

    William Wilson

    2008-07-01

    Full Text Available Wireless sensors and sensor networks is an emerging technology area with many applications within the aerospace industry. Integrated vehicle health monitoring (IVHM of aerospace vehicles is needed to ensure the safety of the crew and the vehicle, yet often high costs, weight, size and other constraints prevent the incorporation of instrumentation onto spacecraft. This paper presents a few of the areas such as IVHM, where new wireless sensing technology is needed on both existing vehicles as well as future spacecraft. From ground tests to inflatable structures to the International Space Station, many applications could receive benefits from small, low power, wireless sensors. This paper also highlights some of the challenges that need to overcome when implementing wireless sensor networks for aerospace vehicles.

  12. Awareness of Emerging Wireless Technologies: Ad-hoc and Personal Area Networks Standards and Emerging Technologies (Sensibilisation a l'emergence des technologies sans fil: technologies emergeantes et normes de reseaux personnels et ad-hoc)

    National Research Council Canada - National Science Library

    Stassinopoulos, George; Boucher, L; Churavy, M; Plesse, T; Marquart, D; Kyriazakos, S; Papaoulakis, N; Nikitopoulos, D; Maseng, T

    2007-01-01

    .... The report starts with ad-hoc networking concepts and maturing technological solutions. Ad-hoc networking is a necessary companion to wireless communication, due to the inherent lack of reliability of any wireless based link level protocol...

  13. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  14. Wireless cortical implantable systems

    CERN Document Server

    Majidzadeh Bafar, Vahid

    2013-01-01

    Wireless Cortical Implantable Systems examines the design for data acquisition and transmission in cortical implants. The first part of the book covers existing system-level cortical implants, as well as future devices. The authors discuss the major constraints in terms of microelectronic integration. The second part of the book focuses on system-level as well as circuit and system level solutions to the development of ultra low-power and low-noise microelectronics for cortical implants. Existing solutions are presented and novel methods and solutions proposed. The third part of the book focuses on the usage of digital impulse radio ultra wide-band transmission as an efficient method to transmit cortically neural recorded data at high data-rate to the outside world. Original architectural and circuit and system solutions are discussed.

  15. Network preservation through a topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-09-01

    Full Text Available Wireless mesh networks (WMNs) is becoming a promising new technology for extending coverage to farflung rural areas. This it achieves by linking the various wireless LANS (WLANs) in distant locations thus providing a vital mode complimentary...

  16. Effect of mobility models on infrastructure based wireless networks ...

    African Journals Online (AJOL)

    The tremendous demand is pushing the development of wireless mobile communications faster than ever before. Handoff management has widely been recognized as one of the most important and challenging problems for a seamless access to wireless network and mobile services. Mobility Models plays an important ...

  17. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  18. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  19. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  20. Use of geographic information systems and spatial analysis in area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Cox, J.St.H.; Vreysen, M.J.B.

    2005-01-01

    The advantages that geographic information systems (GIS) and associated technologies can offer, in terms of the design and implementation of area-wide programmes of insect and/or disease suppression, are becoming increasingly recognised, even if the realization of this potential has not been fully exploited and for some area-wide programmes adoption appears to be progressing slowly. This chapter provides a basic introduction to the science of GIS, Global Positioning System (GPS), and satellite remote sensing (RS), and reviews the principal ways in which these technologies can be used to assist various stages of development of the sterile insect technique (SIT) as part of area-wide integrated pest management (AW-IPM) programmes - from the selection of project sites, and feasibility assessments and planning of pre-intervention surveys, to the monitoring and analysis of insect suppression programmes, and the release of sterile insects. Potential barriers to the successful deployment of GIS tools are also discussed. (author)

  1. 77 FR 38731 - Defense Federal Acquisition Regulation Supplement: Updates to Wide Area WorkFlow (DFARS Case 2011...

    Science.gov (United States)

    2012-06-29

    ... the submission of payment requests and receiving reports in electronic format. DATES: Effective date... policies and procedures for electronic submission of payment requests and receiving reports through Wide... with the primary DoD payment systems, is the accepted DoD system for generating invoices and receiving...

  2. 2014 International Conference on Wireless Communications, Networking and Applications

    CERN Document Server

    2016-01-01

    This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and applications and facilitate researchers, engineers and students to share the latest research results and the advanced research methods of the field. The broad variety of disciplines involved in this research and the differences in approaching the basic problems are probably typical of a developing field of interdisciplinary research. However, some main areas of research and development in the emerging areas of wireless communication technology can now be identified. The contributions to this book are mainly selected from the papers of the conference on wireless communications, networking and applications and reflect the main areas of interest: Section 1 - Emerging Topics in Wireless and Mobile Computing and Communications...

  3. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    Science.gov (United States)

    Pan, Guobing; Xin, Wenhui; Yan, Guozheng; Chen, Jiaoliao

    2011-06-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic.

  4. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  5. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  6. Guidelines for the use of mathematics in operational area-wide integrated pest management programs using the sterile insect technique with a special focus on Tephritid Fruit Flies

    Science.gov (United States)

    Pest control managers can benefit from using mathematical approaches, particularly models, when implementing area-wide pest control programs that include sterile insect technique (SIT), especially when these are used to calculate required rates of sterile releases to result in suppression or eradica...

  7. Willingness-to-pay for an area-wide integrated Pest Managment Program to control the Asian Tiger Mosquito in New Jersey.

    Science.gov (United States)

    Using contingent valuation, the perceived value of an area-wide, integrated pest management program for the Asian tiger mosquito, Aedes albopictus, implemented in Monmouth and Mercer Counties, New Jersey, was estimated. The residents’ maximum willingness-to-pay (WTP) and payment modality was estimat...

  8. Industrial and non-consumer applications of wireless sensor networks

    Science.gov (United States)

    Pentikäinen, Vesa; Heikkilä, Tapio; Määttä, Kalle; Tukeva, Pirkka; Korkalainen, Marko; Saavalainen, Pekka; Kilpeläinen, Pekka

    2008-04-01

    There is a growing potential of applications for wireless monitoring, control and instrumentation in industrial environments, construction sites and agriculture. Wireless communication technologies have clear benefits in harsh environments where traditional cables are too vulnerable or they cannot be installed permanently. Sensor networks with multiple wireless sensor nodes are needed when the size of the monitored area is large and especially in dynamic environments, like construction sites where the sensors can be installed to moving vehicles and work machines. In this paper we present results from some of our developments where short range wireless communication technologies have been applied for industrial and non-consumer monitoring applications.

  9. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  10. Adaptive Wireless Transceiver Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless technologies are an increasingly attractive means for spatial data, input, manipulation, and distribution. Mobitrum is proposing an innovative Adaptive...

  11. EU protected area network did not prevent a country wide population decline in a threatened grassland bird.

    Science.gov (United States)

    Silva, João P; Correia, Ricardo; Alonso, Hany; Martins, Ricardo C; D'Amico, Marcello; Delgado, Ana; Sampaio, Hugo; Godinho, Carlos; Moreira, Francisco

    2018-01-01

    Few studies have assessed the effectiveness of the Protected Area networks on the conservation status of target species. Here, we assess the effectiveness of the Portuguese Natura 2000 (the European Union network of protected areas) in maintaining a species included in the Annex I of the Bird Directive, namely the population of a priority farmland bird, the little bustard Tetrax tetrax . We measured the effectiveness of the Natura 2000 by comparing population trends across time (2003-2006 and 2016) in 51 areas, 21 of which within 12 Special Protection Areas (SPA) that were mostly designated for farmland bird conservation and another 30 areas without EU protection. Overall, the national population is estimated to have declined 49% over the last 10-14 years. This loss was found to be proportionally larger outside SPA (64% decline) compared to losses within SPA (25% decline). However, the absolute male density decline was significantly larger within SPA . In spite of holding higher population densities and having prevented habitat loss, we conclude that Natura 2000 was not effective in buffering against the overall bustard population decline. Results show that the mere designation of SPA in farmland is not enough to secure species populations and has to be combined with agricultural policies and investment to maintain not only habitat availability but also habitat quality.

  12. EU protected area network did not prevent a country wide population decline in a threatened grassland bird

    Directory of Open Access Journals (Sweden)

    João P. Silva

    2018-01-01

    Full Text Available Background Few studies have assessed the effectiveness of the Protected Area networks on the conservation status of target species. Here, we assess the effectiveness of the Portuguese Natura 2000 (the European Union network of protected areas in maintaining a species included in the Annex I of the Bird Directive, namely the population of a priority farmland bird, the little bustard Tetrax tetrax. Methods We measured the effectiveness of the Natura 2000 by comparing population trends across time (2003–2006 and 2016 in 51 areas, 21 of which within 12 Special Protection Areas (SPA that were mostly designated for farmland bird conservation and another 30 areas without EU protection. Results Overall, the national population is estimated to have declined 49% over the last 10–14 years. This loss was found to be proportionally larger outside SPA (64% decline compared to losses within SPA (25% decline. However, the absolute male density decline was significantly larger within SPA . Discussion In spite of holding higher population densities and having prevented habitat loss, we conclude that Natura 2000 was not effective in buffering against the overall bustard population decline. Results show that the mere designation of SPA in farmland is not enough to secure species populations and has to be combined with agricultural policies and investment to maintain not only habitat availability but also habitat quality.

  13. A General Framework for Flow Control in Wireless Networks

    National Research Council Canada - National Science Library

    Chen, Minghua

    2006-01-01

    .... Current widely accepted solutions assume that congestion is the only cause of packet loss and are not applicable to wireless networks in which the bulk of packet loss is due to errors at the physical layer...

  14. Coordination of Regenerative Relays and Direct Users in Wireless Cellular Networks

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar

    2011-01-01

    The area of wireless cooperation/relaying has recently been significantly enriched by the ideas of wireless network coding (NC), which bring substantial gains in spectral efficiency. These gains have mainly been demonstrated in scenarios with two-way relaying. Inspired by the ideas of wireless NC...

  15. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  16. Outcomes from the USDA/ARS area-wide project for management of the Asian tiger mosquito, Aedes albopictus

    Science.gov (United States)

    The Asian tiger mosquito, Aedes albopictus, became established in the continental US in 1985 and now infests 30 states. In 2007 the USDA Agricultural Research Service funded an “area-wide” project focused on the management of this species. The project was a unique federal, state, local collaborati...

  17. BoulSat Project: Low-Cost Wireless Metropolitan Network Implementation in Burkina Faso

    Science.gov (United States)

    Catusian, Samuele S.; Longobardi, Federico; Panicucci, Francesco; Bartalesi, Raphael P.; Demi, Libertario; Cuomo, Antonio D.; Orlandi, Silvano

    The BoulSat Project involves the realization of a bidirectional VSAT (satellite connection system) and the study of "poor" a Wireless Metropolitan Area Network (WMAN) to extend the Internet connectivity to the public institutions in the town area. Low-cost or waste materials have been used to build components where possible, thus to make possible for the local technicians with no specific and theoretical skills to build their network components by hand. This pilot scheme has been applied in Boulsa, in the Sahel region at the north of Burkina Faso. Besides the Boulsa case study, the whole work analyses a typical situation, due to the wide range of problems which have been handled, of remote communities in the South of the World. The aim is to characterize a standard of intervention, suitable for Developing Countries, to set up low-cost wireless telecommunication infrastructures.

  18. Convergence of Photonics and Electronics for Terahertz Wireless Communications

    DEFF Research Database (Denmark)

    Salazar, Adrian Ruiz; Rommel, Simon; Anufriyev, E.

    2016-01-01

    Terahertz wireless communications are expected to offer the required high capacity and low latency performance necessary for short-range wireless access and control applications. We present an overview of some the activities in this area in the newly started H2020 ITN project CELTA: Convergence o...... of Electronics and Photonics Technologies Enabling Terahertz Applications....

  19. Wireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelines

    Science.gov (United States)

    2016-06-16

    Wireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelines Christopher Alberts Audrey Dorofee Carol Woody...Technology Direc- torate. The WEA capability provides a valuable service , disseminating emergency alerts to users of capable mobile devices if they are... mobile service providers (CMSPs)—commercial wireless carriers that broadcast WEA messages to a designated geographic area 4. Alert recipients—the

  20. Energy Efficient Routing in Wireless Sensor Networks based on Ant ...

    African Journals Online (AJOL)

    Wireless Sensor Networks (WSN's) have become an important and challenging research area in recent years. Wireless Sensor Networks consisting of nodes with limited power are deployed to gather useful information from the field. In WSNs it is critical to collect the information in an energy efficient manner. Ant Colony ...

  1. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  2. Mobility needs and wireless solutions

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    The main purpose of this report is to spell out a methodological approach to the analysis of user needs with respect to mobility. Furthermore, this methodological approach is used in an exemplary analysis of the relationship between user needs and technology solutions offered by different wireless...... technologies. The report is based on a research approach, emphasizing important aspects in relation to developing more user oriented mobile services and applications in a heterogeneous network environment. As a staring point, Scandinavian research within the field of social science concerning mobility...... is described and discussed. Furthermore different wireless technologies are briefly described and discussed in relation to possible transmission capacities and coverage areas. In addition to this, a preliminary framework regarding the implications of mobility on the use and development of mobile services...

  3. Range-wide network of priority areas for greater sage-grouse - a design for conserving connected distributions or isolating individual zoos?

    Science.gov (United States)

    Crist, Michele R.; Knick, Steven T.; Hanser, Steven E.

    2015-09-08

    The network of areas delineated in 11 Western States for prioritizing management of greater sage-grouse (Centrocercus urophasianus) represents a grand experiment in conservation biology and reserve design. We used centrality metrics from social network theory to gain insights into how this priority area network might function. The network was highly centralized. Twenty of 188 priority areas accounted for 80 percent of the total centrality scores. These priority areas, characterized by large size and a central location in the range-wide distribution, are strongholds for greater sage-grouse populations and also might function as sources. Mid-ranking priority areas may serve as stepping stones because of their location between large central and smaller peripheral priority areas. The current network design and conservation strategy has risks. The contribution of almost one-half (n = 93) of the priority areas combined for less than 1 percent of the cumulative centrality scores for the network. These priority areas individually are likely too small to support viable sage-grouse populations within their boundary. Without habitat corridors to connect small priority areas either to larger priority areas or as a clustered group within the network, their isolation could lead to loss of sage-grouse within these regions of the network. 

  4. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chao Chen

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  5. Wide-area Power System Damping Control Coordination Based on Particle Swarm Optimization with Time Delay Considered

    Science.gov (United States)

    Zhang, J. Y.; Jiang, Y.

    2017-10-01

    To ensure satisfactory dynamic performance of controllers in time-delayed power systems, a WAMS-based control strategy is investigated in the presence of output feedback delay. An integrated approach based on Pade approximation and particle swarm optimization (PSO) is employed for parameter configuration of PSS. The coordination configuration scheme of power system controllers is achieved by a series of stability constraints at the aim of maximizing the minimum damping ratio of inter-area mode of power system. The validity of this derived PSS is verified on a prototype power system. The findings demonstrate that the proposed approach for control design could damp the inter-area oscillation and enhance the small-signal stability.

  6. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  7. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  8. Stratified Entomological Sampling in Preparation for an Area-Wide Integrated Pest Management Program: The Example of Glossina palpalis gambiensis (Diptera: Glossinidae) in the Niayes of Senegal

    International Nuclear Information System (INIS)

    Bouyer, Jeremy; Seck, Momar Talla; Guerrini, Laure; Sall, Baba; Ndiaye, Elhadji Youssou; Vreysen, Marc J.B.

    2010-01-01

    The riverine tsetse species Glossina palpalis gambiensis Vanderplank 1949 (Diptera: Glossinidae) inhabits riparian forests along river systems in West Africa. The government of Senegal has embarked on a project to eliminate this tsetse species, and African animal trypanosomoses, from the Niayes are using an area-wide integrated pest management approach. A stratified entomological sampling strategy was therefore developed using spatial analytical tools and mathematical modeling. A preliminary phytosociological census identified eight types of suitable habitat, which could be discriminated from LandSat 7ETM satellite images and denominated wet areas. At the end of March 2009, 683 unbaited Vavoua traps had been deployed, and the observed infested area in the Niayes was 525 km2. In the remaining area, a mathematical model was used to assess the risk that flies were present despite a sequence of zero catches. The analysis showed that this risk was above 0.05 in19% of this area that will be considered as infested during the control operations.The remote sensing analysis that identifed the wet areas allowed a restriction of the area to be surveyed to 4% of the total surface area (7,150km2), whereas the mathematical model provided an efficient method to improve the accuracy and the robustness of the sampling protocol. The final size of the control area will be decided based on the entomological collection data.This entomological sampling procedure might be used for other vector or pest control scenarios. (Authors)

  9. Comparison of the New LEAF Area INDEX (LAI 3G) with the Kazahstan-Wide LEAF Area INDEX DATA SET (GGRS-LAI) over Central ASIA

    Science.gov (United States)

    Kappas, M.; Propastin, P.; Degener, J.; Renchin, T.

    2014-12-01

    Long-term global data sets of Leaf Area Index (LAI) are important for monitoring global vegetation dynamics. LAI indicating phenological development of vegetation is an important state variable for modeling land surface processes. The comparison of long-term data sets is based on two recently available data sets both derived from AVHRR time series. The LAI 3g data set introduced by Zaichun Zhu et al. (2013) is developed from the new improved third generation Global Inventory Modeling and Mapping Studies (GIMMS) Normalized Difference Vegetation Index (NDVI3g) and best-quality MODIS LAI data. The second long-term data set is based on the 8 km spatial resolution GIMMS-AVHRR data (GGRS-data set by Propastin et al. 2012). The GGRS-LAI product uses a three-dimensional physical radiative transfer model which establishes relationship between LAI, vegetation fractional cover and given patterns of surface reflectance, view-illumination conditions and optical properties of vegetation. The model incorporates a number of site/region specific parameters, including the vegetation architecture variables such as leaf angle distribution, clumping index, and light extinction coefficient. For the application of the model to Kazakhstan, the vegetation architecture variables were computed at the local (pixel) level based on extensive field surveys of the biophysical properties of vegetation in representative grassland areas of Kazakhstan. The comparison of both long-term data sets will be used to interpret their quality for scientific research in other disciplines. References:Propastin, P., Kappas, M. (2012). Retrieval of coarse-resolution leaf area index over the Republic of Kazakhstan using NOAA AVHRR satellite data and ground measurements," Remote Sensing, vol. 4, no. 1, pp. 220-246. Zaichun Zhu, Jian Bi, Yaozhong Pan, Sangram Ganguly, Alessandro Anav, Liang Xu, Arindam Samanta, Shilong Piao, Ramakrishna R. Nemani and Ranga B. Myneni (2013). Global Data Sets of Vegetation Leaf Area

  10. Rotating-Disk-Based Hybridized Electromagnetic-Triboelectric Nanogenerator for Sustainably Powering Wireless Traffic Volume Sensors.

    Science.gov (United States)

    Zhang, Binbin; Chen, Jun; Jin, Long; Deng, Weili; Zhang, Lei; Zhang, Haitao; Zhu, Minhao; Yang, Weiqing; Wang, Zhong Lin

    2016-06-28

    Wireless traffic volume detectors play a critical role for measuring the traffic-flow in a real-time for current Intelligent Traffic System. However, as a battery-operated electronic device, regularly replacing battery remains a great challenge, especially in the remote area and wide distribution. Here, we report a self-powered active wireless traffic volume sensor by using a rotating-disk-based hybridized nanogenerator of triboelectric nanogenerator and electromagnetic generator as the sustainable power source. Operated at a rotating rate of 1000 rpm, the device delivered an output power of 17.5 mW, corresponding to a volume power density of 55.7 W/m(3) (Pd = P/V, see Supporting Information for detailed calculation) at a loading resistance of 700 Ω. The hybridized nanogenerator was demonstrated to effectively harvest energy from wind generated by a moving vehicle through the tunnel. And the delivered power is capable of triggering a counter via a wireless transmitter for real-time monitoring the traffic volume in the tunnel. This study further expands the applications of triboelectric nanogenerators for high-performance ambient mechanical energy harvesting and as sustainable power sources for driving wireless traffic volume sensors.

  11. Topology Optimisation of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thike Aye Min

    2016-01-01

    Full Text Available Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.

  12. WMSA for wireless communication applications

    Energy Technology Data Exchange (ETDEWEB)

    Vats, Monika; Agarwal, Alok, E-mail: alokagarwal26@yahoo.com; Kumar, Ravindra [Dept. of Electronics & Electrical Engineering, Lingaya’s University Faridabad (India)

    2016-03-09

    Modified rectangular compact microstrip patch antenna having finite ground plane is proposed in this paper. Wideband Microstrip Antenna (WMSA) is achieved by corner cut and inserting air gaps inside the edges of the radiating patch having finite ground plane. The obtained impedance bandwidth for 10 dB return loss for the operating frequency f{sub 0} = 2.09 GHz is 28.7 % (600 MHz), which is very high as compared to the bandwidth obtained for the conventional microstrip antenna. Compactness with wide bandwidth of this antenna is practically useful for the wireless communication systems.

  13. Report of the workshop on strategic planning of area-wide tsetse and trypanosomiasis control in West Africa

    International Nuclear Information System (INIS)

    2002-01-01

    Tsetse-transmitted trypanosomiasis is a disease unique to Africa affecting both humans and animals. This disease occurs in about 10 million km 2 in 37 sub-Saharan countries corresponding approximately to one-third of Africa's total land area, and threatens an estimated 50 million people, 48 million cattle and a countless population of other domestic animal species. Trypanosomiasis has a severe impact on African agriculture; estimated annual losses in cattle production alone are in the range of 1.0-1.2 billion dollars. To this, we have to add the indirect negative effects engendered by trypanosomiasis on total crop production. The disease influences where people decide to live, how they manage their livestock and the intensity of crop agriculture. The combined effects result in changes in land use, environment and affect human welfare and increase the vulnerability of agricultural activity. FAO has identified the reinforcement of agriculture as a key element in the fight against poverty and the improvement of food security in developing countries. The need to reduce poverty is particularly felt in tsetse infested areas of sub-Saharan Africa. In this region half of the population suffers from food insecurity. Approximately 85% of the poor are located in rural areas and more than 80% of the population depends on agricultural production for their livelihood. In order to respond to the need in the fight against tsetse and trypanosomiasis (T and T) in people as well as livestock, the Programme Against African Trypanosomiasis (PAAT) was endorsed in November 1997 by the FAO Conference. The Programme seeks to combine the forces of FAO, IAEA, OAU/IBAR and WHO in order to: promote and co-ordinate international alliances and efforts assisting in harmonised interventions against T and T; effectively combat the disease in Africa; and delineate the polity framework, strategies and guiding pest management principles. This workshop was primarily concerned with the development of

  14. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  15. [Detection of TBEV RNA in ticks as a tool for valuation of endemic area wide and sensitivity of TBE surveillance].

    Science.gov (United States)

    Makówka, Agata; Gut, Włodzimierz; Rogalska, Justyna; Michalik, Jerzy; Wodecka, Beata; Rymaszewska, Anna; Stefanoff, Paweł

    2009-01-01

    In this study we present the nested RT-PCR strategy designed for detection of TBEV RNA in ticks Ixodes ricinus. The presented nested RT-PCR method using 2 different primer pairs specific primers for NS5 gene provides specific TBEV cDNA detectable by electroforesis in agarose gel. Of the 177 polls of ticks investigated, TBEV RNA was detected in 14, which accounts for 7.9% of all pools. We confront the PCR results of tested ticks to routine surveillance data. The obtained results showed that the TBEV RNA is detectable in ticks collected in areas in Poland, which are defined as an non-endemic. The nested RT-PCR method can be used as a tool of epidemiological surveillance as well as for screening of occurrence of circulating TBEV.

  16. Under the canopy: Community-wide effects of invasive algae in Marine Protected Areas revealed by metabarcoding.

    Science.gov (United States)

    Wangensteen, Owen S; Cebrian, Emma; Palacín, Creu; Turon, Xavier

    2018-02-01

    We analysed with multigene (18S and COI) metabarcoding the effects of the proliferation of invasive seaweeds on rocky littoral communities in two Spanish Marine Protected Areas. The invasive algae studied were Caulerpa cylindracea, Lophocladia lallemandii and Asparagopsis armata. They are canopy-forming, landscape-dominant seaweeds, and we were interested in their effects on the underlying communities of meiobenthos and macrobenthos, separated in two size fractions through sieving. A new semiquantitative treatment of metabarcoding data is introduced. The results for both markers showed that the presence of the invasive seaweed had a significant effect on the understory communities for Lophocladia lallemandii and Asparagopsis armata but not for Caulerpa cylindracea. Likewise, changes in MOTU richness and diversity with invasion status varied in magnitude and direction depending on the alga considered. Our results showed that metabarcoding allows monitoring of the less conspicuous, but not least important, effects of the presence of dominant invasive seaweeds. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. THE PANCHROMATIC HUBBLE ANDROMEDA TREASURY. VIII. A WIDE-AREA, HIGH-RESOLUTION MAP OF DUST EXTINCTION IN M31

    Energy Technology Data Exchange (ETDEWEB)

    Dalcanton, Julianne J.; Fouesneau, Morgan; Weisz, Daniel R.; Williams, Benjamin F. [Department of Astronomy, Box 351580, University of Washington, Seattle, WA 98195 (United States); Hogg, David W. [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Pl #424, New York, NY 10003 (United States); Lang, Dustin [McWilliams Center for Cosmology, Department of Physics, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213 (United States); Leroy, Adam K. [National Radio Astronomy Observatory, 520 Edgemont Road, Charlottesville, VA 22903 (United States); Gordon, Karl D.; Gilbert, Karoline M. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Sandstrom, Karin [Steward Observatory, University of Arizona, 933 N Cherry Ave, Tucson, AZ 85721 (United States); Bell, Eric F. [Department of Astronomy, University of Michigan, 500 Church St., Ann Arbor, MI 48109 (United States); Dong, Hui; Lauer, Tod R. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States); Gouliermis, Dimitrios A. [Max Planck Institute für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Guhathakurta, Puragra [Department of Astronomy and Astrophysics, University of California Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Schruba, Andreas [California Institute of Technology, Cahill Center for Astrophysics, 1200 E. California Blvd, Pasadena, CA 91125 (United States); Seth, Anil C. [University of Utah, Salt Lake City, UT (United States); Skillman, Evan D., E-mail: jd@astro.washington.edu [Minnesota Institute for Astrophysics, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States)

    2015-11-20

    We map the distribution of dust in M31 at 25 pc resolution using stellar photometry from the Panchromatic Hubble Andromeda Treasury survey. The map is derived with a new technique that models the near-infrared color–magnitude diagram (CMD) of red giant branch (RGB) stars. The model CMDs combine an unreddened foreground of RGB stars with a reddened background population viewed through a log-normal column density distribution of dust. Fits to the model constrain the median extinction, the width of the extinction distribution, and the fraction of reddened stars in each 25 pc cell. The resulting extinction map has a factor of ≳4 times better resolution than maps of dust emission, while providing a more direct measurement of the dust column. There is superb morphological agreement between the new map and maps of the extinction inferred from dust emission by Draine et al. However, the widely used Draine and Li dust models overpredict the observed extinction by a factor of ∼2.5, suggesting that M31's true dust mass is lower and that dust grains are significantly more emissive than assumed in Draine et al. The observed factor of ∼2.5 discrepancy is consistent with similar findings in the Milky Way by the Plank Collaboration et al., but we find a more complex dependence on parameters from the Draine and Li dust models. We also show that the the discrepancy with the Draine et al. map is lowest where the current interstellar radiation field has a harder spectrum than average. We discuss possible improvements to the CMD dust mapping technique, and explore further applications in both M31 and other galaxies.

  18. Enhanced Chemical Incident Response Plan (ECIRP). Appendix F, remediation analysis with Decision Support Tools (DSTs) for wide-area chemical hazards.

    Energy Technology Data Exchange (ETDEWEB)

    Hassig, Nancy L. (Pacific Northwest National Laboratory, Richland, WA); Pulsipher, Brent A. (Pacific Northwest National Laboratory, Richland, WA); Foltz, Greg W.; Hoette, Trisha Marie

    2011-07-01

    The Defense Threat Reduction Agency (DTRA) commissioned an assessment of the Consequence Management (CM) plans in place on military bases for response to a chemical attack. The effectiveness of the CM plans for recovering from chemical incidents was modeled using a multiple Decision Support Tools (DSTs). First, a scenario was developed based on an aerial dispersion of a chemical agent over a wide-area of land. The extent of contamination was modeled with the Hazard Prediction and Assessment Capability (HPAC) tool. Subsequently, the Analyzer for Wide Area Restoration Effectiveness (AWARE) tool was used to estimate the cost and time demands for remediation based on input of contamination maps, sampling and decontamination resources, strategies, rates and costs. The sampling strategies incorporated in the calculation were designed using the Visual Sample Plan (VSP) tool. Based on a gaps assessment and the DST remediation analysis, an Enhanced Chemical Incident Response Plan (ECIRP) was developed.

  19. Clinical evaluation of short and wide-diameter implants immediately placed into extraction sockets of posterior areas: a 2-year retrospective study.

    Science.gov (United States)

    Jiansheng, Huang; Dongying, Xuan; Xianfeng, Wang; Baoyi, Xie; Qiong, Liu; Jincai, Zhang

    2012-12-01

    The objective of the study was to determine the short-term success rate of short and wide single-tooth implants, immediately placed into extraction sockets of the posterior area. A retrospective cohort study design was used. A total of 145 subjects received 162 short and wide-diameter single-tooth implants between 2006 and 2009. A minimal 7-mm residual height and 9-mm ridge width was available in all the implant sites, and the attached gingivae were at least 2 mm wide. All implants were placed and restored with the single crown by one experienced operator. The data were analyzed with descriptive statistics. All implants were placed in molar areas. There were 20 Ankylos implants with a diameter 5.5 or 7 mm and a length of 8 mm and 142 hydroxyapatite-coated implants with a diameter 5 or 6 mm and a length of 5.7 to 8 mm. One of the 162 implants failed before prosthetic restoration, resulting in a survival rate of 99.4% after loading. Patients were followed for up to 56 months (mean = 24 months) after loading of implants. The radiographic and clinical data revealed well-maintained hard and soft tissues with acceptable short-term results. For residual ridges with minimal height but adequate width, the immediate placement of short and wide-diameter implants in fresh extraction sockets may offer a simple and predictable treatment alternative if implants are positioned appropriately after a thorough preoperative analysis.

  20. Wide Area Recovery and Resiliency Program (WARRP) Biological Attack Response and Recovery: End to End Medical Countermeasure Distribution and Dispensing Processes

    Science.gov (United States)

    2012-04-24

    Bioterrorism?‖ Hearing Before the United States Senate. 110th Cong. (2007) Print . Courtney, Brooke, Eric Toner , and Richard Waldhorn."Preparing the...34Sverdlovsk Revisited: Modeling Human Inhalation Anthrax." Proceedings of the National Academy of Sciences 103.20 (2006): 7589-594. Print . 3 IOM...Institute of Medicine). ―Prepositioning Antibiotics for Anthrax.‖ Washington, DC: The National Academies Press, 2011. Print . 4 Wide Area Recovery