WorldWideScience

Sample records for wireless wide area

  1. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  2. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  3. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  4. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  5. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  6. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  7. Handheld Devices with Wide-Area Wireless Connectivity: Applications in Astronomy Educational Technology and Remote Computational Control

    Science.gov (United States)

    Budiardja, R. D.; Lingerfelt, E. J.; Guidry, M. W.

    2003-05-01

    Wireless technology implemented with handheld devices has attractive features because of the potential to access large amounts of data and the prospect of on-the-fly computational analysis from a device that can be carried in a shirt pocket. We shall describe applications of such technology to the general paradigm of making digital wireless connections from the field to upload information and queries to network servers, executing (potentially complex) programs and controlling data analysis and/or database operations on fast network computers, and returning real-time information from this analysis to the handheld device in the field. As illustration, we shall describe several client/server programs that we have written for applications in teaching introductory astronomy. For example, one program allows static and dynamic properties of astronomical objects to be accessed in a remote observation laboratory setting using a digital cell phone or PDA. Another implements interactive quizzing over a cell phone or PDA using a 700-question introductory astronomy quiz database, thus permitting students to study for astronomy quizzes in any environment in which they have a few free minutes and a digital cell phone or wireless PDA. Another allows one to control and monitor a computation done on a Beowulf cluster by changing the parameters of the computation remotely and retrieving the result when the computation is done. The presentation will include hands-on demonstrations with real devices. *Managed by UT-Battelle, LLC, for the U.S. Department of Energy under contract DE-AC05-00OR22725.

  8. Electronic prescribing: criteria for evaluating handheld prescribing systems and an evaluation of a new, handheld, wireless wide area network (WWAN) prescribing system.

    Science.gov (United States)

    Goldblum, O M

    2001-02-01

    The objectives of this study were: 1) to establish criteria for evaluating handheld computerized prescribing systems; and 2) to evaluate out-of-box performance and features of a new, Palm Operating System (OS)-based, handheld, wireless wide area network (WWAN) prescribing system. The system consisted of a Palm Vx handheld organizer, a Novatel Minstrel V wireless modem, OmniSky wireless internet access and ePhysician ePad 1.1, the Palm OS electronic prescribing software program. A dermatologist familiar with healthcare information technology conducted an evaluation of the performance and features of a new, handheld, WWAN electronic prescribing system in an office practice during a three-month period in 2000. System performance, defined as transmission success rate, was determined from data collected during the three-month trial. Evaluation criteria consisted of an analysis of features found in electronic prescribing systems. All prescriptions written for all patients seen during a three-month period (August - November, 2000) were eligible for inclusion. Prescriptions written for patients who intended to fill them at pharmacies without known facsimile receiving capabilities were excluded from the study. The performance of the system was evaluated using data collected during the study. Criteria for evaluating features of electronic prescribing systems were developed and used to analyze the system employed in this study. During this three-month trial, 200 electronic prescriptions were generated for 132 patients included in the study. Of these prescriptions, 92.5 percent were successfully transmitted to pharmacies. Transmission failures resulted from incorrect facsimile numbers and non-functioning facsimile machines. Criteria established for evaluation of electronic prescribing systems included System (Hardware & Software), Costs, System Features, Printing & Transmission, Formulary & Insurance, Customization, Drug Safety and Security. This study is the first effort to

  9. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2004-03-01

    A comprehensive mine-wide, two-way wireless voice and data communication system for the underground mining industry was developed. The system achieves energy savings through increased productivity and greater energy efficiency in meeting safety requirements within mines. The mine-wide system is comprised of two interfaced subsystems: a through-the-earth communications system and an in-mine communications system. The mine-wide system permits two-way communication among underground personnel and between underground and surface personnel. The system was designed, built, and commercialized. Several systems are in operation in underground mines in the United States. The use of these systems has proven they result in considerable energy savings. A system for tracking the location of vehicles and people within the mine was also developed, built and tested successfully. Transtek's systems are being used by the National Institute of Occupational Safety and Health (NIOSH) in their underground mine rescue team training program. This project also resulted in a spin-off rescue team lifeline and communications system. Furthermore, the project points the way to further developments that can lead to a GPS-like system for underground mines allowing the use of autonomous machines in underground mining operations, greatly reducing the amount of energy used in these operations. Some products developed under this program are transferable to applications in fields other than mining. The rescue team system is applicable to use by first responders to natural, accidental, or terrorist-caused building collapses. The in-mine communications system can be installed in high-rise buildings providing in-building communications to security and maintenance personnel as well as to first responders.

  10. Wide area monitoring study

    International Nuclear Information System (INIS)

    Wogman, N.A.; Holdren, G.R. Jr.

    1999-01-01

    Environmental sampling can be used to complement the safeguarding of nuclear material, especially in the detection of undeclared nuclear activities. Routine monitoring of nuclear installations has provided valuable information about the fate of key signature materials within different environmental settings. The approach collates information regarding the generation of individual radiochemical signatures within different nuclear processes, the potential for release of these signatures to the environment and, the chemical form and mobility of the signatures in environmental media along which the material could migrate. Meteorological, geological and hydrological information is used to determine where to sample, what to sample, and how often to sample to provide the greatest likelihood for detection. Multiple strategies can be used to implement wide area monitoring for safeguards purposes. The most complex, and expensive of these, involves establishing extensive networks of fixed location sampling sites. The sites would be operated continuously, and would be instrumented with automated sampling, analysis, and communication equipment to relay information regarding potential anomalies to control centers in near-real time. Alternative strategies can be used to supplement fixed location monitoring equipment, especially in regions that cannot support (financially or logistically) the fixed stations. Through combinations of these various strategies, using a variety of environmental media to monitor a region, we believe that a competent network, one with a quantifiable probability for detecting undeclared nuclear activities, can be designed. While this approach cannot and should not replace other inspection and monitoring activities, it can potentially contribute valuable information to an international safeguards system. (author)

  11. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  12. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  13. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  14. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  15. Wide area continuous offender monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hoshen, J. [Lucent Technologies (United States); Drake, G. [New Mexico Dept. of Corrections, Santa Fe, NM (United States); Spencer, D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-11-01

    The corrections system in the U.S. is supervising over five million offenders. This number is rising fast and so are the direct and indirect costs to society. To improve supervision and reduce the cost of parole and probation, first generation home arrest systems were introduced in 1987. While these systems proved to be helpful to the corrections system, their scope is rather limited because they only cover an offender at a single location and provide only a partial time coverage. To correct the limitations of first-generation systems, second-generation wide area continuous electronic offender monitoring systems, designed to monitor the offender at all times and locations, are now on the drawing board. These systems use radio frequency location technology to track the position of offenders. The challenge for this technology is the development of reliable personal locator devices that are small, lightweight, with long operational battery life, and indoors/outdoors accuracy of 100 meters or less. At the center of a second-generation system is a database that specifies the offender`s home, workplace, commute, and time the offender should be found in each. The database could also define areas from which the offender is excluded. To test compliance, the system would compare the observed coordinates of the offender with the stored location for a given time interval. Database logfiles will also enable law enforcement to determine if a monitored offender was present at a crime scene and thus include or exclude the offender as a potential suspect.

  16. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  17. Ultra wideband wireless body area networks

    CERN Document Server

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit

    2014-01-01

    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  18. Wide area Hyperspectral Motion Imaging

    Science.gov (United States)

    2017-02-03

    detection at a manageable false alarm rate using the adaptive coherence estimator algorithm. A radiance spectrum was calculated with MODTRAN at 5km...1mHz. In order to meet SNR and update rate, the area coverage is reduced to less than the size of a football stadium. An interferometer has

  19. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  20. Data security in wireless local area network

    International Nuclear Information System (INIS)

    Kishk, A.M.A

    2010-01-01

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  1. Real Time Wide Area Radiation Surveillance System

    Science.gov (United States)

    Biafore, M.

    2012-04-01

    We present the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). Within this project, we propose a novel mobile system for real time, wide area radiation surveillance. The system is based on the integration of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit will include a wireless communication interface to send the data remotely to a monitoring base station which also uses a GPS system to calculate the position of the tag. The system will also incorporate middleware and high level software to provide web-service interfaces for the exchange of information, and that will offer top level functionalities as management of users, mobile tags and environment data and alarms, database storage and management and a web-based graphical user interface. Effort will be spent to ensure that the software is modular and re-usable across as many architectural levels as possible. Finally, an expert system will continuously analyze the information from the radiation sensor and correlate it with historical data from the tag location in order to generate an alarm when an abnormal situation is detected. The system will be useful for many different scenarios, including such lost radioactive sources and radioactive contamination. It will be possible to deploy in emergency units and in general in any type of mobile or static equipment. The sensing units will be highly portable thanks to their low size and low energy consumption. The complete system will be scalable in terms of complexity and cost and will offer very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system will allow for a realistic introduction to the market. Authorities may start with a

  2. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI” Project

    Directory of Open Access Journals (Sweden)

    Michele Zorzi

    2009-05-01

    Full Text Available This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISEWAI” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity, a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated, as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper.

  3. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  4. Sierra Nevada snowpack and runoff prediction integrating basin-wide wireless-sensor network data

    Science.gov (United States)

    Yoon, Y.; Conklin, M. H.; Bales, R. C.; Zhang, Z.; Zheng, Z.; Glaser, S. D.

    2016-12-01

    We focus on characterizing snowpack and estimating runoff from snowmelt in high elevation area (>2100 m) in Sierra Nevada for daily (for use in, e.g. flood and hydropower forecasting), seasonal (supply prediction), and decadal (long-term planning) time scale. Here, basin-wide wireless-sensor network data (ARHO, http://glaser.berkeley.edu/wsn/) is integrated into the USGS Precipitation-Runoff Modeling System (PRMS), and a case study of the American River basin is presented. In the American River basin, over 140 wireless sensors have been planted in 14 sites considering elevation gradient, slope, aspect, and vegetation density, which provides spatially distributed snow depth, temperature, solar radiation, and soil moisture from 2013. 800 m daily gridded dataset (PRISM) is used as the climate input for the PRMS. Model parameters are obtained from various sources (e.g., NLCD 2011, SSURGO, and NED) with a regionalization method and GIS analysis. We use a stepwise framework for a model calibration to improve model performance and localities of estimates. For this, entire basin is divided into 12 subbasins that include full natural flow measurements. The study period is between 1982 and 2014, which contains three major storm events and recent severe drought. Simulated snow depth and snow water equivalent (SWE) are initially compared with the water year 2014 ARHO observations. The overall results show reasonable agreements having the Nash-Sutcliffe efficiency coefficient (NS) of 0.7, ranged from 0.3 to 0.86. However, the results indicate a tendency to underestimate the SWE in a high elevation area compared with ARHO observations, which is caused by the underestimated PRISM precipitation data. Precipitation at gauge-sparse regions (e.g., high elevation area), in general, cannot be well represented in gridded datasets. Streamflow estimates of the basin outlet have NS of 0.93, percent bias of 7.8%, and normalized root mean square error of 3.6% for the monthly time scale.

  5. Traffic flow wide-area surveillance system definition

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.; Carnal, C.L. [Oak Ridge National Lab., TN (United States); Moynihan, P.I. [Jet Propulsion Lab., Pasadena, CA (United States)

    1994-11-01

    Traffic Flow Wide-Area Surveillance (TFWAS) is a system for assessing the state of traffic flow over a wide area for enhanced traffic control and improved traffic management and planning. The primary purpose of a TFWAS system is to provide a detailed traffic flow description and context description to sophisticated traffic management and control systems being developed or envisioned for the future. A successful TFWAS system must possess the attributes of safety, reconfigurability, reliability, and expandability. The primary safety premise of TFWAS is to ensure that no action or failure of the TFWAS system or its components can result in risk of injury to humans. A wide variety of communication techniques is available for use with TFWAS systems. These communication techniques can be broken down into two categories, landlines and wireless. Currently used and possible future traffic sensing technologies have been examined. Important criteria for selecting TFWAS sensors include sensor capabilities, costs, operational constraints, sensor compatibility with the infrastructure, and extent. TFWAS is a concept that can take advantage of the strengths of different traffic sensing technologies, can readily adapt to newly developed technologies, and can grow with the development of new traffic control strategies. By developing innovative algorithms that will take information from a variety of sensor types and develop descriptions of traffic flows over a wide area, a more comprehensive understanding of the traffic state can be provided to the control system to perform the most reasonable control actions over the entire wide area. The capability of characterizing the state of traffic over an entire region should revolutionize developments in traffic control strategies.

  6. Development and Evaluation of a City-Wide Wireless Weather Sensor Network

    Science.gov (United States)

    Chang, Ben; Wang, Hsue-Yie; Peng, Tian-Yin; Hsu, Ying-Shao

    2010-01-01

    This project analyzed the effectiveness of a city-wide wireless weather sensor network, the Taipei Weather Science Learning Network (TWIN), in facilitating elementary and junior high students' study of weather science. The network, composed of sixty school-based weather sensor nodes and a centralized weather data archive server, provides students…

  7. Economics of area-wide pest control

    International Nuclear Information System (INIS)

    Mumford, J.D.

    2000-01-01

    Area-wide pest management is commonly practised throughout the world, probably much more so than is generally recognised (Lindquist 2000, Klassen 2000). Apart from highly publicised area-wide schemes such as the sterile insect technique (SIT) for fruit flies, pheromone disruption for cotton bollworms and classical biological control, there are many examples of actions such as concerted host plant eradication, enforced closed crop seasons, organised pesticide rotation for resistance management, coordination of resistant crop genotypes, etc., some going back several centuries, which should also be considered as area-wide practices. Each of these is faced with many of the economic issues generally associated with area-wide management which will be discussed below. In general, there are to be four major questions to answer in devising an area-wide pest management programme: 1) Should a particular pest be controlled locally or area-wide? 2) What is an appropriate area over which management should be attempted? 3) Within that area what form of control is most efficient? 4) What level of organisation should be used to get the job done? It should be noted that apart from clearly objective measures such as technical effectiveness (say, mortality) or cost efficiency (mortality per dollar), there are many subjective measures that come into the evaluation of area-wide control due to the element of risk (for example, in quarantine and eradication), the boundaries of externalities (for example, variable probabilities of pesticide drift under different conditions or target organism sensitivities) and time preferences for returns on capital investments (such as insect rearing facilities or research to develop pheromone technologies). As a result of these subjective components, it may sometimes be difficult to reach clearly agreed decisions based on objective economic analyses, even with a consensus on the data used. There are three general classes of economic problems in comparing

  8. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  9. Reconfigurable antenna options for 2.45/5 GHz wireless body area networks in healthcare applications.

    Science.gov (United States)

    Abbas, Syed Muzahir; Ranga, Yogesh; Esselle, Karu P

    2015-01-01

    This paper presents electronically reconfigurable antenna options in healthcare applications. They are suitable for wireless body area network devices operating in the industrial, scientific, and medical (ISM) band at 2.45 GHz and IEEE 802.11 Wireless Local Area Network (WLAN) band at 5 GHz (5.15-5.35 GHz, 5.25-5.35 GHz). Two types of antennas are investigated: Antenna-I has a full ground plane and Antenna-II has a partial ground plane. The proposed antennas provide ISM operation in one mode while in another mode they support 5 GHz WLAN band. Their performance is assessed for body centric wireless communication using a simplified human body model. Antenna sensitivity to the gap between the antenna and the human body is investigated for both modes of each antenna. The proposed antennas exhibit a wide radiation pattern along the body surface to provide wide coverage and their small width (14 mm) makes them suitable for on-body communication in healthcare applications.

  10. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  11. Radiation area monitoring by wireless-communicating area monitor with surveillance camera

    International Nuclear Information System (INIS)

    Shimura, Mitsuo; Kobayashi, Hiromitsu; Kitahara, Hideki; Kobayashi, Hironobu; Okamoto, Shinji

    2004-01-01

    Aiming at a dose reduction and a work efficiency improvement for nuclear power plants that have high dose regions, we have developed our system of wireless-communicating Area Monitor with Surveillance Camera, and have performed an on-site test. Now we are implementing this Area Monitor with Surveillance Camera for a use as a TV camera in the controlled-area, which enables a personal computer to simultaneously display two or more dose values and site live images on the screen. For the radiation detector of this Area Monitor System, our wireless-communicating dosimeter is utilized. Image data are transmitted via a wireless Local Area Network (LAN). As a test result, image transmission of a maximum of 20 frames per second has been realized, which shows that this concept is a practical application. Remote-site monitoring also has been realized from an office desk located within the non-controlled area, adopting a Japan's wireless phone system, PHS (Personal Handy Phone) for the transmission interface. (author)

  12. Traffic Flow Wide-Area Surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.

    1994-09-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a Traffic Flow Wide-Area Surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  13. Traffic flow wide-area surveillance system

    Science.gov (United States)

    Allgood, Glenn O.; Ferrell, Regina K.; Kercel, Stephen W.; Abston, Ruth A.

    1995-01-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a traffic flow wide-area surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  14. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  15. VillageLink: Wide-Area Wireless Coverage

    CSIR Research Space (South Africa)

    Pejovic, V

    2014-01-01

    Full Text Available is required to coordinate probing timing for channel probe senders and listeners. We use a token mechanism, in which a BS only sends channel probes when it has a token. All other BSs and CPEs without tokens are in a listening state. When a BS is in a probing... similar notion when listening for probes. CPEs of one BS experience interference from all other BSs. To account for this CPEs can be instructed to listen for probes from BSs with whom they are not associated. Frequency profiling results for CPEs are sent...

  16. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-11-01

    Wireless power transfer (WPT) is the key enabler for a myriad of applications, from low-power RFIDs, and wireless sensors, to wirelessly charged electric vehicles, and even massive power transmission from space solar cells. One of the major challenges in designing implantable biomedical devices is the size and lifetime of the battery. Thus, replacing the battery with a miniaturized wireless power receiver (WPRx) facilitates designing sustainable biomedical implants in smaller volumes for sentient medical applications. In the first part of this dissertation, we propose a miniaturized, fully integrated, wirelessly powered implantable sensor with on-chip antenna, designed and implemented in a standard 0.18μm CMOS process. As a batteryless device, it can be implanted once inside the body with no need for further invasive surgeries to replace batteries. The proposed single-chip solution is designed for intraocular pressure monitoring (IOPM), and can serve as a sustainable platform for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W transmitter 3cm away from the chip. In the second part, we propose a self-biased, differential rectifier with enhanced efficiency over an extended range of input power. A prototype is designed for the medical implant communication service (MICS) band at 433MHz. It demonstrates an efficiency improvement of more than 40% in the rectifier power conversion efficiency (PCE) and a dynamic range extension of more than 50% relative to the conventional cross-coupled rectifier. A sensitivity of -15.2dBm input power for 1V output voltage and a peak PCE of 65% are achieved for a 50k load. In the third part, we propose a wide-range, differential RF-to-DC power converter using an adaptive, self-biasing technique. The proposed architecture doubles

  17. Propagation Characteristics of International Space Station Wireless Local Area Network

    Science.gov (United States)

    Sham, Catherine C.; Hwn, Shian U.; Loh, Yin-Chung

    2005-01-01

    This paper describes the application of the Uniform Geometrical Theory of Diffraction (UTD) for Space Station Wireless Local Area Networks (WLANs) indoor propagation characteristics analysis. The verification results indicate good correlation between UTD computed and measured signal strength. It is observed that the propagation characteristics are quite different in the Space Station modules as compared with those in the typical indoor WLANs environment, such as an office building. The existing indoor propagation models are not readily applicable to the Space Station module environment. The Space Station modules can be regarded as oversized imperfect waveguides. Two distinct propagation regions separated by a breakpoint exist. The propagation exhibits the guided wave characteristics. The propagation loss in the Space Station, thus, is much smaller than that in the typical office building. The path loss model developed in this paper is applicable for Space Station WLAN RF coverage and link performance analysis.

  18. Power allocation strategies to minimize energy consumption in wireless body area networks.

    Science.gov (United States)

    Kailas, Aravind

    2011-01-01

    The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.

  19. Equalized Energy Consumption in Wireless Body Area Networks for a Prolonged Network Lifetime

    Directory of Open Access Journals (Sweden)

    Maryam El Azhari

    2017-01-01

    Full Text Available The phenomenal advances in electronics contributed to a widespread use of distributed sensors in wireless communications. A set of biosensors can be deployed or implanted in the human body to form a Wireless Body Area Network (WBAN, where various WBAN PHY layers are utilized. The WBAN allows the measurement of physiological data, which is forwarded by the gateway to the base station for analysis purposes. The main issue in conceiving a WBAN communication mechanism is to manage the residual energy of sensors. The mobile agent system has been widely applied for surveillance applications in Wireless Sensor Networks (WSNs. It consists in dispatching one or more mobile agents simultaneously to collect data, while following a predetermined optimum itinerary. The continuous use of the optimal itinerary leads to a rapid depletion of sensor nodes batteries, which minimizes the network lifetime. This paper presents a new algorithm to equalize the energy consumption among sensor motes. The algorithm exploits all the available paths towards the destination and classifies them with respect to the end-to-end delay and the overall energy consumption. The proposed algorithm performs better compared to the optimal routing path. It increases the network lifetime to the maximum by postponing routing of data via the most-recently used path, and it also maintains data delivery within the delay interval threshold.

  20. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  1. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  2. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  3. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project

    Science.gov (United States)

    Casari, Paolo; Castellani, Angelo P.; Cenedese, Angelo; Lora, Claudio; Rossi, Michele; Schenato, Luca; Zorzi, Michele

    2009-01-01

    This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper. PMID:22408513

  4. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  5. Patient Health Monitoring Using Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Hsu Myat Thwe

    2015-06-01

    Full Text Available Abstract Nowadays remote patient health monitoring using wireless technology plays very vigorous role in a society. Wireless technology helps monitoring of physiological parameters like body temperature heart rate respiration blood pressure and ECG. The main aim of this paper is to propose a wireless sensor network system in which both heart rate and body temperature ofmultiplepatients can monitor on PC at the same time via RF network. The proposed prototype system includes two sensor nodes and receiver node base station. The sensor nodes are able to transmit data to receiver using wireless nRF transceiver module.The nRF transceiver module is used to transfer the data from microcontroller to PC and a graphical user interface GUI is developed to display the measured data and save to database. This system can provide very cheaper easier and quick respondent history of patient.

  6. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  7. Directional MAC approach for wireless body area networks.

    Science.gov (United States)

    Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  8. Directional MAC Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Md. Asdaque Hussain

    2011-01-01

    Full Text Available Wireless Body Area Networks (WBANs designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA at BAN Coordinator (BAN_C node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  9. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  10. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  11. Survey of main challenges (security and privacy in wireless body area networks for healthcare applications

    Directory of Open Access Journals (Sweden)

    Samaher Al-Janabi

    2017-07-01

    Full Text Available Wireless Body Area Network (WBAN is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.

  12. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  13. An Efficient Topology for Wireless Power Transfer over a Wide Range of Loading Conditions

    Directory of Open Access Journals (Sweden)

    Tianqing Li

    2018-01-01

    Full Text Available Although an inductive power transfer (IPT system can transfer power efficiently in full-load conditions, its efficiency obviously decreases in light-load conditions. To solve this problem, based on a two-coil IPT system with a series-series compensation topology, a single-ended primary-inductor converter is introduced at the secondary side. By adjusting the set effective value of the current in the primary coil, the converter input voltage changes to maintain the equivalent input resistance of the converter in an optimal condition. The system can then transfer the power efficiently with the wide load conditions. Moreover, the system operates at a constant resonance frequency with a high power factor. Both the simulation and experimentation of a prototype with a 10 W IPT system demonstrate the effectiveness of the proposed topology for wireless power transfer.

  14. Design and implementation on wireless transmission platform of area radiation monitoring data

    International Nuclear Information System (INIS)

    Li Dan; Ge Liangquan; Lai Wanchang; Ren Yong; Liu Huijun; Wang Guangxi

    2011-01-01

    To solve data transmission problems of radiation area monitoring system, Wireless transmission platform is built based on ZigBee module, thus wireless transmission between the radiation area central node and the monitoring points is achieved. It introduces the framework of ZigBee protocol, APL applications between FFD and RFD module, FFD, module and central node host, and RFD module and monitoring equipment, are developed using simplified protocol stack. Wireless network is set up using a FFD module and two RFD modules, the results show that RSSI are above 50, and the data communication is normal for the transmission distance of 60 m. (authors)

  15. 3D-Printed Disposable Wireless Sensors with Integrated Microelectronics for Large Area Environmental Monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad; Karimi, Muhammad Akram; Salama, Khaled N.; Shamim, Atif

    2017-01-01

    disposable, compact, dispersible 3D-printed wireless sensor nodes with integrated microelectronics which can be dispersed in the environment and work in conjunction with few fixed nodes for large area monitoring applications. As a proof of concept

  16. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  17. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  18. Wireless Interconnect in Multilayer Chip-Area-Networks for Future Multimaterial High-Speed Systems Design

    Directory of Open Access Journals (Sweden)

    Oluwole John Famoriji

    2017-01-01

    Full Text Available Wireless chip area network which enables wireless communication among chips fosters development in wireless communication and it is envisioned that future hardware system and developmental functionality will require multimaterial. However, the traditional system architecture is limited by channel bandwidth-limited interfaces, throughput, delay, and power consumption and as a result limits the efficiency and system performance. Wireless interconnect has been proposed to overcome scalability and performance limitations of multihop wired architectures. Characterization and modeling of channel become more important for specification of choice of modulation or demodulation techniques, channel bandwidths, and other mitigation techniques for channel distortion and interference such as equalization. This paper presents an analytical channel model for characterization, modeling, and analysis of wireless chip-to-chip or interchip interconnects in wireless chip area network with a particular focus on large-scale analysis. The proposed model accounts for both static and dynamic channel losses/attenuation in high-speed systems. Simulation and evaluation of the model with experimental data conducted in a computer desktop casing depict that proposed model matched measurement data very closely. The transmission of EM waves via a medium introduces molecular absorption due to various molecules within the material substance. This model is a representative of channel loss profile in wireless chip-area-network communication and good for future electronic circuits and high-speed systems design.

  19. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  20. A TR-UWB Downconversion Autocorrelation Receiver for Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Islam SMRiazul

    2009-01-01

    Full Text Available Low power UWB receiver architecture is proposed for a Wireless Body Area Network (WBAN. This receiving technology is a synergy of existing downconversion-based narrowband rejection mechanism in RF front end and signal processing in frequency domain. Frequency components of converted and filtered UWB pulses are separated into real and imaginary parts, independently correlated and effectively combined to achieve an improved output Signal to noise ratio (SNR. An extensive mathematical analysis has been performed to formulate the close-form expressions for SNRs in order to compare system performances toward favorable BER under BPSK modulation scheme. Analysis shows that optimal rotation of coordination plays an important role for the enhancement of receiving SNR which is further confirmed by computer simulation. A wide range of link level simulation (LLS urges that the proposed system is more power efficient in higher-order modulation (HOM schemes. Transmitted Reference (TR scheme has been considered as the basis for wideband communication.

  1. Seattle wide-area information for travelers (SWIFT) : architecture study

    Science.gov (United States)

    1998-10-19

    The SWIFT (Seattle Wide-area Information For Travelers) Field Operational Test was intended to evaluate the performance of a large-scale urban Advanced Traveler Information System (ATIS) deployment in the Seattle area. The unique features of the SWIF...

  2. Software-Defined Radio for Wireless Local-Area Networks

    NARCIS (Netherlands)

    Schiphorst, Roelof

    2004-01-01

    New wireless communications standards do not replace old ones, instead the number of standards keeps on increasing and by now an abundance of standards exists. Moreover there is no reason to assume that this trend will ever stop. Therefore, the software-radio concept is emerging as a potential

  3. Human++: Wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, R. de; Pflug, H.; Santana, J.; Visser, H.; Vullers, R.; Groot, H. de; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  4. Human++ : wireless autonomous sensor technology for body area networks

    NARCIS (Netherlands)

    Pop, V.; Francisco, de R.; Pflug, H.; Santana, J.; Visser, H.J.; Vullers, R.J.M.; Groot, de H.; Gyselinckx, B.

    2011-01-01

    Recent advances in ultra-low-power circuits and energy harvesters are making self-powered body wireless autonomous transducer solutions (WATS) a reality. Power optimization at the system and application level is crucial in achieving ultra-low-power consumption for the entire system. This paper deals

  5. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  6. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg

    2010-01-01

    /actuators attached to the body and a host server application. The gateway uses the BlackFin BF533 processor from Analog Devices, and uses Bluetooth for wireless communication. Two types of sensors are attached to the network: an electro-cardio-gram sensor and an oximeter sensor. The testbed has been successfully...

  7. Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks

    OpenAIRE

    Muhammad Mostafa Monowar; Mohammad Mehedi Hassan; Fuad Bajaber; Md. Abdul Hamid; Atif Alamri

    2014-01-01

    Wireless body area networks (WBANs) can be formed including implanted biosensors for health monitoring and diagnostic purposes. However, implanted biosensors could cause thermal damages on human tissue as it exhibits temperature rise due to wireless communication and processing tasks inside the human body. Again, Quality of Service (QoS) provisioning with multiconstraints (delay and reliability) is a striking requirement for diverse application types in WBANs to meet their objectives. This pa...

  8. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  9. Wireless Local Area Network Performance Inside Aircraft Passenger Cabins

    Science.gov (United States)

    Whetten, Frank L.; Soroker, Andrew; Whetten, Dennis A.; Whetten, Frank L.; Beggs, John H.

    2005-01-01

    An examination of IEEE 802.11 wireless network performance within an aircraft fuselage is performed. This examination measured the propagated RF power along the length of the fuselage, and the associated network performance: the link speed, total throughput, and packet losses and errors. A total of four airplanes: one single-aisle and three twin-aisle airplanes were tested with 802.11a, 802.11b, and 802.11g networks.

  10. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....

  11. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  12. Security Analysis of a Software Defined Wide Area Network Solution

    OpenAIRE

    Rajendran, Ashok

    2016-01-01

    Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...

  13. Securing Wireless Local Area Networks with GoC PKI

    Science.gov (United States)

    2007-10-01

    profit de la technologie d’infrastructure à clé publique (ICP) du Gouvernement du Canada (GC) pour une authentification forte des utilisateurs...environnements protégés du GC lorsqu’il fonctionne en mode entreprise et qu’il est combiné à des certificats délivrés par l’ICP du GC et à une...on the WPA2 secured wireless link. The VPN gateway carries out VPN authentication with the same user certificates used to perform WLAN authentication

  14. 3D-Printed Disposable Wireless Sensors with Integrated Microelectronics for Large Area Environmental Monitoring

    KAUST Repository

    Farooqui, Muhammad Fahad

    2017-05-19

    Large area environmental monitoring can play a crucial role in dealing with crisis situations. However, it is challenging as implementing a fixed sensor network infrastructure over large remote area is economically unfeasible. This work proposes disposable, compact, dispersible 3D-printed wireless sensor nodes with integrated microelectronics which can be dispersed in the environment and work in conjunction with few fixed nodes for large area monitoring applications. As a proof of concept, the wireless sensing of temperature, humidity, and H2S levels are shown which are important for two critical environmental conditions namely forest fires and industrial leaks. These inkjet-printed sensors and an antenna are realized on the walls of a 3D-printed cubic package which encloses the microelectronics developed on a 3D-printed circuit board. Hence, 3D printing and inkjet printing are uniquely combined in order to realize a low-cost, fully integrated wireless sensor node.

  15. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  16. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  17. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  18. An Implementation of Wireless Body Area Networks for Improving Priority Data Transmission Delay.

    Science.gov (United States)

    Gündoğdu, Köksal; Çalhan, Ali

    2016-03-01

    The rapid growth of wireless sensor networks has enabled the human health monitoring of patients using body sensor nodes that gather and evaluate human body parameters and movements. This study describes both simulation model and implementation of a new traffic sensitive wireless body area network by using non-preemptive priority queue discipline. A wireless body area network implementation employing TDMA is designed with three different priorities of data traffics. Besides, a coordinator node having the non-preemptive priority queue is performed in this study. We have also developed, modeled and simulated example network scenarios by using the Riverbed Modeler simulation software with the purpose of verifying the implementation results. The simulation results obtained under various network load conditions are consistent with the implementation results.

  19. A MIMO-OFDM Testbed for Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Conrat Jean-Marc

    2006-01-01

    Full Text Available We describe the design steps and final implementation of a MIMO OFDM prototype platform developed to enhance the performance of wireless LAN standards such as HiperLAN/2 and 802.11, using multiple transmit and multiple receive antennas. We first describe the channel measurement campaign used to characterize the indoor operational propagation environment, and analyze the influence of the channel on code design through a ray-tracing channel simulator. We also comment on some antenna and RF issues which are of importance for the final realization of the testbed. Multiple coding, decoding, and channel estimation strategies are discussed and their respective performance-complexity trade-offs are evaluated over the realistic channel obtained from the propagation studies. Finally, we present the design methodology, including cross-validation of the Matlab, C++, and VHDL components, and the final demonstrator architecture. We highlight the increased measured performance of the MIMO testbed over the single-antenna system.

  20. Advanced Wireless Local Area Networks in the Unlicensed Sub-1GHz ISM-bands

    NARCIS (Netherlands)

    Aust, S.H.

    2014-01-01

    This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To

  1. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  2. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design

    NARCIS (Netherlands)

    Selimis, G.; Huang, L.; Massé, F.; Tsekoura, I.; Ashouei, M.; Catthoor, F.; Huisken, J.; Stuyt, J.; Dolmans, G.; Penders, J.; Groot, H. de

    2011-01-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating

  3. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  4. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  5. An area wide control of fruit flies in Mauritius

    International Nuclear Information System (INIS)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R.

    2006-01-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  6. An area wide control of fruit flies in Mauritius

    Energy Technology Data Exchange (ETDEWEB)

    Sookar, P.; Permalloo, S.; Gungah, B.; Alleck, M.; Seewooruthun, S.I.; Soonnoo, A.R., E-mail: ento@intnet.m, E-mail: moa-entomology@mail.gov.m [Ministry of Agro Industry and Fisheries Reduit, Republic of Mauritius (Mauritius)

    2006-07-01

    An area-wide National Fruit Fly Control Programme (NFFCP) was initiated in 1994, funded by the European Union until 1999 and now fully financed by the Government of Mauritius. The NFFCP targets some 75,000 backyard fruit trees owners mainly. The bait application and male annihilation techniques (BAT e MAT) are currently being applied against the fruit flies attacking fleshy fruits and are targeting selected major fruit growing areas in the north, north-east, central and western parts of the island. Successful control has been achieved using these two techniques as demonstrated by trap catches and fruit samplings. The level of fruit fly damage to fruits has been reduced. Presently, the bait-insecticide mixture is being supplied free of charge to the public. The current status of the area-wide suppression programme is such that continuous use of BAT/MAT is a never ending process and as such is not viable. In this context, a TC project on Feasibility studies for integrated use of sterile insect technique for area wide tephritid fruit fly control.Studies are also being carried out on mass rearing of the peach fruit fly for small scale trials on SIT so as to eventually integrate this control method in our area-wide control programme. (author)

  7. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  8. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  9. Wide-Range Highly-Efficient Wireless Power Receivers for Implantable Biomedical Sensors

    KAUST Repository

    Ouda, Mahmoud

    2016-01-01

    for implantable devices or IoT nodes. A custom setup is developed to test the chip in a saline solution with electrical properties similar to those of the aqueous humor of the eye. The proposed chip, in this eye-like setup, is wirelessly charged to 1V from a 5W

  10. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  11. The development of area wide traffic management scenarios

    NARCIS (Netherlands)

    Van Zuylen, H.J.; Lu, S.; Li, J.; Yusen, C.

    2014-01-01

    Traffic management in cities with congestion is a big challenge with still unused opportunities. Intersection control is a corner stone but this should be done in an area-wide context. The dominant traffic process on urban roads is the traffic flow on the intersections. Spill back is a most

  12. An Architecture for a Wide Area Distributed System

    NARCIS (Netherlands)

    Homburg, P.; Steen, M.R. van; Tanenbaum, A.S.

    1996-01-01

    Distributed systems provide sharing of resources and information over a computer network. A key design issue that makes these systems attractive is that all aspects related to distribution are transparent to users. Unfortunately, general-purpose wide area distributed systems that allow users to

  13. COMPARATIVE ANALYSIS OF LEACH AND HEEMPCP PROTOCOLS FOR WIRELESS SENSOR NETWORKS SYSTEM

    OpenAIRE

    Richa Asstt. Pro.Misha Thakur

    2018-01-01

    In this paper author aims at describing a wireless sensor network. wireless sensor network consisting of spatially distributed autonomous devices using sensor to monitor physical or environmental conditions. Wireless sensor network can be used in wide range of applications including environmental monitoring, habitat monitoring, various military applications, smart home technologiesand agriculture. Wireless sensor networks constitute one of promising application areas of the recently developed...

  14. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  15. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Science.gov (United States)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-03-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  16. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    International Nuclear Information System (INIS)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-01-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection

  17. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Energy Technology Data Exchange (ETDEWEB)

    Deen, David A.; Osinsky, Andrei; Miller, Ross [Agnitron Technology Incorporated, Eden Prairie, Minnesota 55346 (United States)

    2014-03-03

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  18. Pest management strategies: Area-wide and conventional

    International Nuclear Information System (INIS)

    Lindquist, D.A.

    2000-01-01

    Conventional Insect Control The usual approach to insect control is to treat the commodity only after a damaging population of insects has developed. In other words, the producer, home owner or casual gardener fights a defensive battle. He reacts to an insect attack. When he sees the enemy or the damage caused by the enemy, he loads up his sprayer with an insecticide and mounts a counter attack. Most insect control procedures are applied by an individual producer on his own relatively small production area. This conventional insect control approach encourages the producer to make his own decisions about whether or not any insect control is to be used, which insect control method or product to use, when to use it, how to use it, who applies it, etc. Advice to producers on insect control is usually available from government extension personnel, private insect control consultants or representatives of companies that sell insecticides or other insect control materials or methods. The conventional procedure results in great variability in the efficacy of insect control because each producer makes his own decisions. The objective of conventional insect control is to protect the commodity. This is usually accomplished by treating the commodity, be it cows or corn or rice in a warehouse. Conventional insect control requires virtually no planning to achieve results. The 'programme' is short-term, frequently measured in days until the next insecticide application is needed. It is reactive (defensive). Area-wide Insect Control Area-wide insect control is applied against an important insect pest over a relatively large area involving many individual producers of the same or similar crops. The 'area' is a combination of geography and the range of hosts of the target insect pest. The term 'area' in 'area-wide' refers to the area where the target insect population survives. The area is not limited to production of the major crop(s) to be protected. It is very likely that a large

  19. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  20. Multi Agent System Based Wide Area Protection against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Liu, Leo

    2012-01-01

    In this paper, a multi-agent system based wide area protection scheme is proposed in order to prevent long term voltage instability induced cascading events. The distributed relays and controllers work as a device agent which not only executes the normal function automatically but also can...... the effectiveness of proposed protection strategy. The simulation results indicate that the proposed multi agent control system can effectively coordinate the distributed relays and controllers to prevent the long term voltage instability induced cascading events....

  1. Wide-area situation awareness in electric power grid

    Science.gov (United States)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  2. Development of Autonomous Magnetometer Rotorcraft For Wide Area Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mark D. McKay; Matthew O. Anderson

    2011-08-01

    Large areas across the United States and internationally are potentially contaminated with unexploded ordinance (UXO), with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with (1) near 100% coverage and (2) near 100% detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 to 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys, resulting in costs of approximately $100-$150/acre. In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide highresolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. Thus there is a need for other systems, which can be used for effective data collection. An Unmanned Aerial Vehicle (UAV) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly

  3. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    Science.gov (United States)

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  4. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  5. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  6. Area-wide traffic calming for preventing traffic related injuries.

    Science.gov (United States)

    Bunn, F; Collier, T; Frost, C; Ker, K; Roberts, I; Wentz, R

    2003-01-01

    It is estimated that by 2020 road traffic crashes will have moved from ninth to third in the world disease burden ranking, as measured in disability adjusted life years, and second in developing countries. The identification of effective strategies for the prevention of traffic related injuries is of global health importance. Area-wide traffic calming schemes that discourage through traffic on residential roads is one such strategy. To evaluate the effectiveness of area-wide traffic calming in preventing traffic related crashes, injuries, and deaths. We searched the following electronic databases: Cochrane Injuries Group's Specialised Register, Cochrane Controlled Trials Register, MEDLINE, EMBASE and TRANSPORT (NTIS, TRIS, TRANSDOC). We searched the web sites of road safety organisations, handsearched conference proceedings, checked reference lists of relevant papers and contacted experts in the area. The search was not restricted by language or publication status. Randomised controlled trials, and controlled before-after studies of area-wide traffic calming schemes. Two reviewers independently extracted data on type of study, characteristics of intervention and control areas, and length of data collection periods. Before and after data were collected on the total number of road traffic crashes, all road user deaths and injuries, pedestrian-motor vehicle collisions and road user deaths. The statistical package STATA was used to calculate rate ratios for each study, which were then pooled to give an overall estimate using a random effects model. We found no randomised controlled trials, but 16 controlled before-after trials met our inclusion criteria. Seven studies were done in Germany, six in the UK, two in Australia and one in the Netherlands. There were no studies in low or middle income countries. Eight trials reported the number of road traffic crashes resulting in deaths. The pooled rate ratio was 0.63 (0.14, 2.59 95% CI). Sixteen studies reported the number

  7. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  8. Wideband metamaterial array with polarization-independent and wide incident angle for harvesting ambient electromagnetic energy and wireless power transfer

    Science.gov (United States)

    Zhong, Hui-Teng; Yang, Xue-Xia; Song, Xing-Tang; Guo, Zhen-Yue; Yu, Fan

    2017-11-01

    In this work, we introduced the design, demonstration, and discussion of a wideband metamaterial array with polarization-independent and wide-angle for harvesting ambient electromagnetic (EM) energy and wireless power transfer. The array consists of unit cells with one square ring and four metal bars. In comparison to the published metamaterial arrays for harvesting EM energy or wireless transfer, this design had the wide operation bandwidth with the HPBW (Half Power Band Width) of 110% (6.2 GHz-21.4 GHz), which overcomes the narrow-band operation induced by the resonance characteristic of the metamaterial. On the normal incidence, the simulated maximum harvesting efficiency was 96% and the HPBW was 110% for the random polarization wave. As the incident angle increases to 45°, the maximum efficiency remained higher than 88% and the HPBW remained higher than 83% for the random polarization wave. Furthermore, the experimental verification of the designed metamaterial array was conducted, and the measured results were in reasonable agreement with the simulated ones.

  9. Flexible quality of service model for wireless body area sensor networks

    OpenAIRE

    Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.

    2016-01-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the pro...

  10. Flexible quality of service model for wireless body area sensor networks\\ud

    OpenAIRE

    Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.

    2016-01-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency (RF) ultra-wideband (UWB) technology has developed substantially for physiological signal monitoring due to its advantages such as low power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems of...

  11. An energy-efficient leader election mechanism for wireless body area networks

    OpenAIRE

    Zhang , Rongrong; Moungla , Hassine; Mehaoua , Ahmed

    2014-01-01

    International audience; In Wireless Body Area Networks (WBANs), the energy consumption determines the lifetime of the entire network. As a result, how to conserve the energy to prolong the network lifetime becomes a key problem in WBANs. In this paper, to address the energy conservation problem in WBANs, we develop an Energy-Efficient Leader Election mechanism, called EELE. In EELE, each node competes for the leader following the distributed leader election algorithm in which a utility functi...

  12. Wireless multihop backhauls for rural areas: A preliminary study

    Science.gov (United States)

    Zaidi, Zainab; Lan, Kun-chan

    2017-01-01

    Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area. PMID:28403167

  13. Wireless multihop backhauls for rural areas: A preliminary study.

    Directory of Open Access Journals (Sweden)

    Zainab Zaidi

    Full Text Available Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area.

  14. Wireless multihop backhauls for rural areas: A preliminary study.

    Science.gov (United States)

    Zaidi, Zainab; Lan, Kun-Chan

    2017-01-01

    Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area.

  15. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  16. Area-wide population suppression of codling moth

    International Nuclear Information System (INIS)

    Calkins, C.O.; Knight, A.L.; Richardson, G.; Bloem, K.A.

    2000-01-01

    The area-wide pest population control concept began with E.F. Knipling (1979) in the 1970s. Control of a pest population on individual fields does little to control the overall pest population because only a portion of the population is being affected. Expanding control tactics beyond individual farms tends to suppress the population on a wider scale and frequently results in suppression of the population for more than one year. The Agriculture Research Service (ARS) believes that this concept has not been addressed with the focus and support that it deserves. The ARS Administration made a conscious decision in 1994 to create a series of area-wide programmes funded out of ARS-based funds that had previously been used for pilot tests. These programmes involve a coordinated effort among ARS and university scientists, growers, and fieldmen for agriculture supply centres and fruit packing houses. The first area-wide programme supported by ARS was the codling moth (CM), Cydia pomonella L. (Lepidoptera: Tortricidae) suppression programme. The codling moth is the key pest of pome fruit throughout the western United States (Beers et al. 1993). About half of the insecticides applied on these crops are directed toward this pest. A non-insecticidal control technique, mating disruption (MD), is available to replace the organophosphates. Removal of the hard pesticides directed against this pest would do the most to allow natural enemies to survive and reproduce in the orchards, which in turn would have the effect of reducing secondary pests. Elimination of the pesticides would also remove much of the health risks to workers and would minimise buildup of pesticide resistance. The objectives of the Codling Moth Area-wide Program are to enhance the efficacy of the non-pesticide approach, to demonstrate that mating disruption will work if conducted properly, to develop biological technology to lower costs of control that complement mating disruption, to implement effective

  17. Bayes-Based Fault Discrimination in Wide Area Backup Protection

    Directory of Open Access Journals (Sweden)

    WANG, Z.

    2012-02-01

    Full Text Available Multivariate statistical analysis is an effective tool to finish the fault location for electric power system. In Bayesian discriminant analysis as a subbranch, by the research of several populations, one can calculate the conditional probability that some samples belong to these populations, and compare the corresponding probability. The sample will be classified as population with maximum probability. In this paper, based on Bayesian discriminant analysis principle, a great number of simulation examples have confirmed that the results of Bayesian fault discriminant in wide area backup protection are accurate and reliable.

  18. Economics of area-wide sit control programs

    International Nuclear Information System (INIS)

    Enkerlin, Walther

    2003-01-01

    The economic feasibility of using the sterile insect technique (SIT) to control certain key insect pests has been demonstrated clearly. The successful implementation of a number of area-wide and large-scale SIT programs has produced substantial economic benefits for the beneficiaries of the technology. The economic advantages of this technology will become more evident as indirect benefits of SIT application are incorporated into total program benefit estimates. Awareness of the technical and economic advantages of the SIT, and market forces favoring the use of environmentally clean pest control methods, will encourage private investment in this technology. (author)

  19. Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.

    Science.gov (United States)

    Zheng, Guanglou; Fang, Gengfa; Shankaran, Rajan; Orgun, Mehmet A; Zhou, Jie; Qiao, Li; Saleem, Kashif

    2017-05-01

    Generating random binary sequences (BSes) is a fundamental requirement in cryptography. A BS is a sequence of N bits, and each bit has a value of 0 or 1. For securing sensors within wireless body area networks (WBANs), electrocardiogram (ECG)-based BS generation methods have been widely investigated in which interpulse intervals (IPIs) from each heartbeat cycle are processed to produce BSes. Using these IPI-based methods to generate a 128-bit BS in real time normally takes around half a minute. In order to improve the time efficiency of such methods, this paper presents an ECG multiple fiducial-points based binary sequence generation (MFBSG) algorithm. The technique of discrete wavelet transforms is employed to detect arrival time of these fiducial points, such as P, Q, R, S, and T peaks. Time intervals between them, including RR, RQ, RS, RP, and RT intervals, are then calculated based on this arrival time, and are used as ECG features to generate random BSes with low latency. According to our analysis on real ECG data, these ECG feature values exhibit the property of randomness and, thus, can be utilized to generate random BSes. Compared with the schemes that solely rely on IPIs to generate BSes, this MFBSG algorithm uses five feature values from one heart beat cycle, and can be up to five times faster than the solely IPI-based methods. So, it achieves a design goal of low latency. According to our analysis, the complexity of the algorithm is comparable to that of fast Fourier transforms. These randomly generated ECG BSes can be used as security keys for encryption or authentication in a WBAN system.

  20. Area efficient decimation filter based on merged delay transformation for wireless applications

    International Nuclear Information System (INIS)

    Rashid, U.; Siddiq, F.; Muhammad, T.; Jamal, H.

    2013-01-01

    Expected by 2014 is the 4G standard for cellular wireless communications, which will improve bandwidth, connectivity and roaming for mobile and stationary devices, 4G and other wireless systems are currently hot topics of research and development in the communication field. In wireless technologies like Global System for Mobile (GSM), Digital Enhanced Cordless Telecommunications (DECT) and Wi-Fi, decimation filters are essential part of transceivers being used. This paper describes a decimation filter which is efficient in terms of both the power consumption and the area used. The architecture is based upon Merged Delay Transformation (MDT). The existing Merged Delay Transformed Infinite Impulse Response (IIR) architecture is power efficient but requires larger area. The proposed and existing filters were implemented on Field-Programmable Gate Array (FPGA). The computational cost of the proposed filter is reduced to (3N/2 + 1) and M-1 times reduction in the number of multipliers in comparison to the existing FIR filter is achieved. The power consumption and speed remain nearly the same. (author)

  1. Concept definition of traffic flow wide-area surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.

    1994-07-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret large spatial projections of data originating from multiple sensor suites. The intent of the Wide-Area Surveillance (WAS) Project is to build upon this concept and define the operational specifications and characteristics of a Traffic Flow Wide-Area Surveillance (TFWAS) system in terms of traffic management and control. In doing so, the functional capabilities of a TFWAS will be mapped onto an operational profile that is consistent with the Federal Highway Administration`s Intelligent Vehicle Highway System. This document provides the underlying foundation of this work by offering a concept definition for the TFWAS system. It concentrates on answering the question: ``What is the system?`` In doing so, the report develops a hierarchy of specialized definitions.

  2. Wide-area-distributed storage system for a multimedia database

    Science.gov (United States)

    Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro

    1998-12-01

    We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.

  3. The Development of Wireless Body Area Network for Motion Sensing Application

    Science.gov (United States)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.; Ramadhany, F.; Arianto, L.; Habibie, D.

    2018-04-01

    The information era has driven the society into the digitally-controlled lifestyle. Wireless body area networks (WBAN) as the specific scope of wireless sensor networks (WSN) is consistently growing into bigger applications. Currently, people are able to monitor their medical parameters by simply using small electronics devices attached to their body and connected to the authorities. On top of that, this time, smart phones are typically equipped with sensors such as accelerometer, gyroscope, barometric pressure, heart rate monitor, etc. It means that the sensing yet the signal processing can be performed by a single device. Moreover, Android opens lot wider opportunities for new applications as the most popular open-sourced smart phone platform. This paper is intended to show the development of motion sensing application which focused on analysing data from accelerometer and gyroscope. Beside reads the sensors, this application also has the ability to convert the sensors’ numerical value into graphs.

  4. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  5. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  6. Corn rootworm area-wide management across the United States

    International Nuclear Information System (INIS)

    Chandler, Laurence D.; Coppedge, James R.; Richard Edwards, C.; Tollefson, Jon J.; Wilde, Gerald E.

    2000-01-01

    The western corn rootworm, Diabrotica virgifera virgifera LeConte, northern corn rootworm, D. barberi Smith and Lawrence, and Mexican corn rootworm, D. virgifera zeae Krysan and Smith are among the most economically and environmentally important pests of United States maize (Zea mays L.) production systems (Metcalf 1986). Annually, 8 to 10 million hectares of maize are treated with soil applied insecticides to protect the crop from larval feeding damage. Crop rotation, however, is also widely used to minimise the need for soil insecticide applications. Insecticides for adult rootworm management are also frequently used. Numerous problems are currently associated with corn rootworm management approaches. Soil insecticides are normally used to protect maize roots from larval feeding damage. However, they are ineffective in controlling the management of corn rootworm populations (Gray et al. 1992, Sutter et al. 1991). It is not uncommon for large numbers of rootworms to develop within treated fields. Thus, when maize is grown in the same field year after year (continuous cropping), soil insecticide applications must be used to protect the plant. These applications are generally made without knowledge (prophylactic) of the rootworm population levels within the field due to the difficulty of sampling for immature life stages. Western corn rootworm resistance to chlorinated hydrocarbon insecticides has been extensively documented (Ball and Weekman 1962). Recently, two distinct populations of western corn rootworms in Nebraska were found to be resistant to carbaryl and methyl parathion which are commonly used for adult control (Meinke et al. 1998). Although the occurrence of resistance has not spread outside of these areas, the potential for increased tolerance of western corn rootworm populations to carbamate and organophosphate insecticides across the region does exist. In response to many of the management problems discussed above, scientists with the USDA Agricultural

  7. A Polygon Model for Wireless Sensor Network Deployment with Directional Sensing Areas

    Science.gov (United States)

    Wu, Chun-Hsien; Chung, Yeh-Ching

    2009-01-01

    The modeling of the sensing area of a sensor node is essential for the deployment algorithm of wireless sensor networks (WSNs). In this paper, a polygon model is proposed for the sensor node with directional sensing area. In addition, a WSN deployment algorithm is presented with topology control and scoring mechanisms to maintain network connectivity and improve sensing coverage rate. To evaluate the proposed polygon model and WSN deployment algorithm, a simulation is conducted. The simulation results show that the proposed polygon model outperforms the existed disk model and circular sector model in terms of the maximum sensing coverage rate. PMID:22303159

  8. Sharing waste management data over a wide area computer network

    International Nuclear Information System (INIS)

    Menke, W.; Friberg, P.

    1992-01-01

    In this paper the authors envision a time when waste management professionals from any institution will be able to access high quality data, regardless of where this data may actually be archived. They will not have to know anything about where the data actually resides or what format it is stored in. They will only have to specify the type of data and the workstation software will handle the rest of the details of finding them and accessing them. A method - now in use at the Lamont-Doherty Geological Observatory of Columbia University and several other institutions - of achieving this vision is described in this paper. Institutions make views of their databases publicly available to users of the wide-area network (e.g. Internet), using database serving software that runs on one of their computers. This software completely automates the process of finding out what kind of data are available and of retrieving them

  9. First operation of the wide-area remote experiment system

    International Nuclear Information System (INIS)

    Furukawa, Y.; Hasegawa, K.; Ueno, G.

    2012-01-01

    The Wide-area Remote Experiment System (WRES) at Spring-8 has been successfully developed. The system communicates with remote users on the basis of SSL/TLS with bi-directional authentication to avoid interference from unauthorized access to the system. The system has a message-filtering system to allow remote users access only to the corresponding beamline equipment and safety interlock system. This is to protect persons inside the experimental station from injury from any accidental motion of heavy equipment. The system also has a video streaming system to monitor samples or experimental equipment. We have tested the system from the point of view of safety, stability, reliability etc. and successfully performed the first experiment from a remote site, i.e., RIKEN's Wako campus, which is 480 km away from Spring-8, at the end of October 2010. (authors)

  10. Wide area methane emissions mapping with airborne IPDA lidar

    Science.gov (United States)

    Bartholomew, Jarett; Lyman, Philip; Weimer, Carl; Tandy, William

    2017-08-01

    Methane emissions from natural gas production, storage, and transportation are potential sources of greenhouse gas emissions. Methane leaks also constitute revenue loss potential from operations. Since 2013, Ball Aerospace has been developing advanced airborne sensors using integrated path differential absorption (IPDA) LIDAR instrumentation to identify methane, propane, and longer-chain alkanes in the lowest region of the atmosphere. Additional funding has come from the U.S. Department of Transportation, Pipeline and Hazardous Materials Administration (PHMSA) to upgrade instrumentation to a broader swath coverage of up to 400 meters while maintaining high spatial sampling resolution and geolocation accuracy. Wide area coverage allows efficient mapping of emissions from gathering and distribution networks, processing facilities, landfills, natural seeps, and other distributed methane sources. This paper summarizes the benefits of advanced instrumentation for aerial methane emission mapping, describes the operating characteristics and design of this upgraded IPDA instrumentation, and reviews technical challenges encountered during development and deployment.

  11. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  12. Autonomous management of a recursive area hierarchy for large scale wireless sensor networks using multiple parents

    Energy Technology Data Exchange (ETDEWEB)

    Cree, Johnathan Vee [Washington State Univ., Pullman, WA (United States); Delgado-Frias, Jose [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-01

    Large scale wireless sensor networks have been proposed for applications ranging from anomaly detection in an environment to vehicle tracking. Many of these applications require the networks to be distributed across a large geographic area while supporting three to five year network lifetimes. In order to support these requirements large scale wireless sensor networks of duty-cycled devices need a method of efficient and effective autonomous configuration/maintenance. This method should gracefully handle the synchronization tasks duty-cycled networks. Further, an effective configuration solution needs to recognize that in-network data aggregation and analysis presents significant benefits to wireless sensor network and should configure the network in a way such that said higher level functions benefit from the logically imposed structure. NOA, the proposed configuration and maintenance protocol, provides a multi-parent hierarchical logical structure for the network that reduces the synchronization workload. It also provides higher level functions with significant inherent benefits such as but not limited to: removing network divisions that are created by single-parent hierarchies, guarantees for when data will be compared in the hierarchy, and redundancies for communication as well as in-network data aggregation/analysis/storage.

  13. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    Science.gov (United States)

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  15. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  16. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  17. Wide-area monitoring to detect undeclared nuclear facilities

    International Nuclear Information System (INIS)

    Wogman, N.

    1994-09-01

    The International Atomic Energy Agency (IAEA) is committed to strengthening and streamlining the overall effectiveness of the IAEA safeguards system. The IAEA is investigating the use of environmental monitoring techniques to strengthen its capability to detect undeclared nuclear activities. The IAEA's Program 93+2 Initiative has been established to develop, test, and assess strengthening techniques and measures. Some of the techniques have been validated and are being implemented during routine safeguards inspections. The effectiveness of other techniques is being studied as a part of extensive field trials conducted at nuclear facilities of various Member States during 1993 and 1994. Proposals based on the results of these investigations and recommendations for new safeguards activities are expected to be presented to the March 1995 Board of Governors Meeting. The techniques in use or under study during IAEA field trials address various types of environmental monitoring applications as outlined under Program 93+2's Task 3, Environmental Monitoring Techniques for Safeguards Applications, namely, the use of short-range monitoring during inspections and visits to investigate sites of possible undeclared activities. With the exception of wide-area water sampling in Iraq, the use of long-range monitoring, in the absence of any indication of undeclared nuclear activities, remains largely unexamined by the IAEA. The efficacy of long-range monitoring depends on the availability of mobile signature isotopes or compounds and on the ability to distinguish the nuclear signatures from background signals and attributing them to a source. The scope of this paper is to provide technical information to the International Atomic Energy Agency (IAEA) on possible wide-area survey techniques for the detection of undeclared nuclear activities. The primary focus is the detection of effluents from reprocessing activities

  18. Development of autonomous magnetometer rotorcraft for wide area assessment

    Energy Technology Data Exchange (ETDEWEB)

    Roelof Versteeg; Matt Anderson; Les Beard; Eric Corban; Darryl Curley; Jeff Gamey; Ross Johnson; Dwight Junkin; Mark McKay; Jared Salzmann; Mikhail Tchernychev; Suraj Unnikrishnan; Scott Vinson

    2010-04-01

    Large areas across the United States are potentially contaminated with UXO, with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with 1) near 100 % coverage and 2) near 100 % detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 – 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys (resulting in costs of approximately $100-$150/acre). In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide high resolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. There is thus a need for other systems which can be used for effective data collection. An UAV (Unmanned Aerial Vehicle) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly characterization (through the use of

  19. Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems

    Directory of Open Access Journals (Sweden)

    Romano Fantacci

    2016-05-01

    Full Text Available A smart city is an environment where a pervasive, multi-service network is employed to provide citizens improved living conditions as well as better public safety and security. Advanced communication technologies are essential to achieve this goal. In particular, an efficient and reliable communication network plays a crucial role in providing continue, ubiquitous, and reliable interconnections among users, smart devices, and applications. As a consequence, wireless networking appears as the principal enabling communication technology despite the necessity to face severe challenges to satisfy the needs arising from a smart environment, such as explosive data volume, heterogeneous data traffic, and support of quality of service constraints. An interesting approach for meeting the growing data demand due to smart city applications is to adopt suitable methodologies to improve the usage of all potential spectrum resources. Towards this goal, a very promising solution is represented by the Cognitive Radio technology that enables context-aware capability in order to pursue an efficient use of the available communication resources according to the surrounding environment conditions. In this paper we provide a review of the characteristics, challenges, and solutions of a smart city communication architecture, based on the Cognitive Radio technology, by focusing on two new network paradigms—namely, Heterogeneous Network and Machines-to-Machines communications—that are of special interest to efficiently support smart city applications and services.

  20. Performability indicators for the traffic analysis of wide area networks

    International Nuclear Information System (INIS)

    Tsopelas, Panagiotis; Platis, Agapios

    2003-01-01

    In connecting computing networks, reliability term is strongly related to the availability of connections of Wide Area networks (WANs) or Local Area networks (LANs). In this paper we will examine the network connections activity of a Greek University in order to provide two sources of information: The Quantity of Information Not Delivered (QIND) and the Information Flow Interruption (IFI). These indicators will provide us with the inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available (traffic), which is lost due to failures or upgrades inside this network. The reliability analysis is obtained by collecting the network failures data (duration and frequency) and traffic (total and average) for a specified period of 1 year. It is assumed that the numerical analysis is based on the fact that the lifetime follows and exponential distribution (here as we are working on discrete time the distribution must be the geometric distribution). Hence a Markov chain model seems suitable for modelling the functioning of this system. An algorithm concentrates the results in a transition probability matrix and calculates the reward functions for the QIND/IFI indicators with the use of the power method. Finally, the application part provides an example of how final results can be used to evaluate the observed network

  1. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  2. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  3. Trade issues and area-wide pest management

    International Nuclear Information System (INIS)

    Griffin, Robert L.

    2000-01-01

    Food security and economic security are unarguably desirable objectives for all nations - indeed for the world. Equally important is the sustainability of designs that achieve these objectives without disadvantaging others or damaging the environment. Considering area-wide pest management in the context of these interrelated global policy forces is essential to fully understand its role in both the protection of plant resources and in facilitation of trade. The case for food security begins with the realisation that there are currently about 800 million people in the world who are suffering from malnutrition due to lack of food. The World Food Summit, convened in November 1996, urgently called for coordinated world-wide action to ensure 'food for all'. A key strategy for realising this goal is reducing losses due to plant pests. In this light, area-wide pest management can be viewed as a valuable addition to the toolbox of pest management strategies. It can also be one of the most sustainable and cost-effective options to consider for pest management. However, just as the problem of world hunger is not solved by a single farmer, area-wide pest management cannot be successful at the individual level. It requires commitment and cooperation to make it feasible - the same type of commitment and cooperation that was expressed at the World Food Summit. Where economic security is concerned, one need not look far to see a world of growing economic integration and widening circles of development. As the World Trade Organisation celebrates the 50th anniversary of the rules-based trading system which began with the GATT after World War II, it is clear that globalisation and the liberalisation of trade have become permanent fixtures in international policy formulation and are integral to the economic security of all nations. Now, more than ever before, the world's prosperity rests on maintaining an open international economy based on commonly agreed rules. The significance of

  4. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    OpenAIRE

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient’s life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body fu...

  5. On Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL

    2018-01-01

    Dedicated wide-area network connections are employed in big data and high-performance computing scenarios, since the absence of cross-traffic promises to make it easier to analyze and optimize data transfers over them. However, nonlinear transport dynamics and end-system complexity due to multi-core hosts and distributed file systems make these tasks surprisingly challenging. We present an overview of methods to analyze memory and disk file transfers using extensive measurements over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory transfers, we derive performance profiles of TCP and UDT throughput as a function of RTT, which show concave regions in contrast to entirely convex regions predicted by previous models. These highly desirable concave regions can be expanded by utilizing large buffers and more parallel flows. We also present Poincar´e maps and Lyapunov exponents of TCP and UDT throughputtraces that indicate complex throughput dynamics. For disk file transfers, we show that throughput can be optimized using a combination of parallel I/O and network threads under direct I/O mode. Our initial throughput measurements of Lustre filesystems mounted over long-haul connections using LNet routers show convex profiles indicative of I/O limits.

  6. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  7. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  8. Development of wide area environment accelerator operation and diagnostics method

    Directory of Open Access Journals (Sweden)

    Akito Uchiyama

    2015-08-01

    Full Text Available Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs, the use of standard protocols such as the hypertext transfer protocol (HTTP is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  9. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  10. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    Science.gov (United States)

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  11. Development of a wearable wireless body area network for health monitoring of the elderly and disabled

    Science.gov (United States)

    Rushambwa, Munyaradzi C.; Gezimati, Mavis; Jeeva, J. B.

    2017-11-01

    Novel advancements in systems miniaturization, electronics in health care and communication technologies are enabling the integration of both patients and doctors involvement in health care system. A Wearable Wireless Body Area Network (WWBAN) provides continuous, unobtrusive ambulatory, ubiquitous health monitoring, and provide real time patient’s status to the physician without any constraint on their normal daily life activities. In this project we developed a wearable wireless body area network system that continuously monitor the health of the elderly and the disabled and provide them with independent, safe and secure living. The WWBAN system monitors the following parameters; blood oxygen saturation using a pulse oximeter sensor (SpO2), heart rate (HR) pulse sensor, Temperature, hydration, glucose level and fall detection. When the wearable system is put on, the sensor values are processed and analysed. If any of the monitored parameter values falls below or exceeds the normal range, there is trigger of remote alert by which an SMS is send to a doctor or physician via GSM module and network. The developed system offers flexibility and mobility to the user; it is a real time system and has significance in revolutionizing health care system by enabling non-invasive, inexpensive, continuous health monitoring.

  12. A New Technique of Removing Blind Spots to Optimize Wireless Coverage in Indoor Area

    Directory of Open Access Journals (Sweden)

    A. W. Reza

    2013-01-01

    Full Text Available Blind spots (or bad sampling points in indoor areas are the positions where no signal exists (or the signal is too weak and the existence of a receiver within the blind spot decelerates the performance of the communication system. Therefore, it is one of the fundamental requirements to eliminate the blind spots from the indoor area and obtain the maximum coverage while designing the wireless networks. In this regard, this paper combines ray-tracing (RT, genetic algorithm (GA, depth first search (DFS, and branch-and-bound method as a new technique that guarantees the removal of blind spots and subsequently determines the optimal wireless coverage using minimum number of transmitters. The proposed system outperforms the existing techniques in terms of algorithmic complexity and demonstrates that the computation time can be reduced as high as 99% and 75%, respectively, as compared to existing algorithms. Moreover, in terms of experimental analysis, the coverage prediction successfully reaches 99% and, thus, the proposed coverage model effectively guarantees the removal of blind spots.

  13. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  14. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    Science.gov (United States)

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  15. Trapping guidelines for area-wide fruit fly programmes

    International Nuclear Information System (INIS)

    2003-11-01

    Different traps and lures have been developed and used over decades to survey fruit fly populations. The first attractant for male fruit flies was methyl eugenol (ME) (for Bactrocera zonata, Howlett, 1912) followed by kerosene for Mediterranean fruit fly, Ceratitis capitata, (medfly), Severin and Severin, 1913. In 1956, Angelica seed oil was used to trap medfly (Steiner et al, 1957). Beroza et al. (1961) discovered trimedlure (TML) to be effective for the same purpose. Beroza and Green, 1963, demonstrated cuelure to be an effective attractant for Bactrocera cucurbitae. Food baits based on protein solutions, fermenting sugar solutions, fruit juices, and vinegar have been used since 1918 for the capture of females of several species. The McPhail trap was the first device to be used with protein baits (McPhail, 1929). Steiner traps were developed in 1957 (Steiner et al., 1957) and Jackson traps in 1971 for TML (Harris et al., 1971). These traps are currently used in various countries for fruit fly surveys in support of control activities and eradication campaigns. The combination of a McPhail trap with a protein attractant, Jackson trap with TML, and the Steiner trap with ME or cuelure (CUE), has remained unchanged for several decades. Global trends in increasing food quality, revenue sources, and fruit and vegetable trade, has resulted in an increased worldwide movement of fruit fly species and requires refinement of survey systems. After years of validating trapping technology through coordinated research programmes (CRP's) and extensive technical assistance to member countries, the Joint Division FAO/IAEA proposes the use of proven technologies in improving trap sensitivity in area-wide fruit fly control programmes (IAEA 1996 and IAEA 1998). These proven technologies include the use of synthetic food lures such as female attractants that can be used for several species of Anastrepha, Bactrocera and Ceratitis. Other citations of information on these developments are

  16. Trapping guidelines for area-wide fruit fly programmes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    Different traps and lures have been developed and used over decades to survey fruit fly populations. The first attractant for male fruit flies was methyl eugenol (ME) (for Bactrocera zonata, Howlett, 1912) followed by kerosene for Mediterranean fruit fly, Ceratitis capitata, (medfly), Severin and Severin, 1913. In 1956, Angelica seed oil was used to trap medfly (Steiner et al, 1957). Beroza et al. (1961) discovered trimedlure (TML) to be effective for the same purpose. Beroza and Green, 1963, demonstrated cuelure to be an effective attractant for Bactrocera cucurbitae. Food baits based on protein solutions, fermenting sugar solutions, fruit juices, and vinegar have been used since 1918 for the capture of females of several species. The McPhail trap was the first device to be used with protein baits (McPhail, 1929). Steiner traps were developed in 1957 (Steiner et al., 1957) and Jackson traps in 1971 for TML (Harris et al., 1971). These traps are currently used in various countries for fruit fly surveys in support of control activities and eradication campaigns. The combination of a McPhail trap with a protein attractant, Jackson trap with TML, and the Steiner trap with ME or cuelure (CUE), has remained unchanged for several decades. Global trends in increasing food quality, revenue sources, and fruit and vegetable trade, has resulted in an increased worldwide movement of fruit fly species and requires refinement of survey systems. After years of validating trapping technology through coordinated research programmes (CRP's) and extensive technical assistance to member countries, the Joint Division FAO/IAEA proposes the use of proven technologies in improving trap sensitivity in area-wide fruit fly control programmes (IAEA 1996 and IAEA 1998). These proven technologies include the use of synthetic food lures such as female attractants that can be used for several species of Anastrepha, Bactrocera and Ceratitis. Other citations of information on these developments are

  17. Flexible quality of service model for wireless body area sensor networks.

    Science.gov (United States)

    Liao, Yangzhe; Leeson, Mark S; Higgins, Matthew D

    2016-03-01

    Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the prospect of collecting human vital signs, early detection of abnormal medical conditions, real-time healthcare data transmission and remote telemedicine support. However, due to the technical constraints of sensor batteries, the supply of power is a major bottleneck for healthcare system design. Moreover, medium access control (MAC) needs to support reliable transmission links that allow sensors to transmit data safely and stably. In this Letter, the authors provide a flexible quality of service model for ad hoc networks that can support fast data transmission, adaptive schedule MAC control, and energy efficient ubiquitous WBASN networks. Results show that the proposed multi-hop communication ad hoc network model can balance information packet collisions and power consumption. Additionally, wireless communications link in WBASNs can effectively overcome multi-user interference and offer high transmission data rates for healthcare systems.

  18. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2016-05-01

    Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.

  19. On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays

    Directory of Open Access Journals (Sweden)

    Guo Wenxuan

    2009-01-01

    Full Text Available Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic placement of relay nodes (RNs in a disaster area wireless network. It is based on our prior work of mobility model that characterizes the spatial movement of the first responders as mobile nodes (MNs during their operations. We first investigate the COverage-oriented Relay Placement (CORP problem that is to maximize the total number of MNs connected with the relays. Considering the network throughput, we then study the CApacity-oriented Relay Placement (CARP problem that is to maximize the aggregated data rate of all MNs. For both coverage and capacity studies, we provide each the optimal and the greedy algorithms with computational complexity analysis. Furthermore, simulation results are presented to compare the performance between the greedy and the optimal solutions for the CORP and CARP problems, respectively. It is shown that the greedy algorithms can achieve near optimal performance but at significantly lower computational complexity.

  20. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying...... forgetting factor is applied to identify online the reduced-order linearlized model which contains dominant inter-area low frequency oscillations. Based on this linearlized model, the generalized predictive control scheme considering control output constraints is employed to obtain the optimal control signal...... conditions and different disturbances, but also has better robustness against to the time delay existing in the remote signals. The comparison studies with the conventional lead-lag WADC are also provided....

  1. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  2. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  3. Wide-area, real-time monitoring and visualization system

    Science.gov (United States)

    Budhraja, Vikram S.; Dyer, James D.; Martinez Morales, Carlos A.

    2013-03-19

    A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion corresponding to one of a plurality of control areas. The real-time performance monitoring system includes a monitor computer for monitoring at least one of reliability metrics, generation metrics, transmission metrics, suppliers metrics, grid infrastructure security metrics, and markets metrics for the electric power grid. The data for metrics being monitored by the monitor computer are stored in a data base, and a visualization of the metrics is displayed on at least one display computer having a monitor. The at least one display computer in one said control area enables an operator to monitor the grid portion corresponding to a different said control area.

  4. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  5. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  6. Nonpainful wide-area compression inhibits experimental pain.

    Science.gov (United States)

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  7. Summary of the Seattle Urban Area Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Kirvel, R

    2010-09-13

    A terrorist attack involving a release of biological warfare agent in the Seattle urban area would require decision-makers to make a host of important, and sometimes untested, choices concerning how best to respond and recover. This technical supplement supports the Puget Sound Regional Biological Attack Recovery Plan Annex to the Regional Catastrophic Plan, which structures the region’s response and recovery approach, by providing technical details on how to conduct a biological remediation. More specifically, the technical supplement identifies the principal issues that must be addressed following a wide-area release of aerosolized Bacillus anthracis (B. anthracis) spores; explains the resources that are available to address the release; sets forth strategies to reduce the time required for consequence management; and focuses on remediation options, procedures, and tools that can be implemented today should such an incident occur. The content is intended to be used with the Interim Consequence Management Guidance for a Wide-Area Biological Attack (LLNL 2009). A second and related purpose of this technical supplement is to serve as a detailed guide for other geographical regions interested in formulating their own consequence management plans. This technical supplement is funded by, and was developed as part of, the Interagency Biological Restoration Demonstration (IBRD) program—a collaborative effort among Department of Homeland Security, Department of Defense, and numerous other Federal, state, and local agencies—to improve the nation’s ability to respond to and recover from a wide-area biological incident. Content of the technical supplement follows the six-phase diagram for responding to and recovering from a biological contamination incident (see Figure 1 on the next page), which represents a consensus scheme developed after multi-agency review and approval. Whereas the focus of the document is on remediation/cleanup activities, the topics of response

  8. Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes

    Directory of Open Access Journals (Sweden)

    Theofanis P. Lambrou

    2009-01-01

    Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.

  9. Wide-area SWIR arrays and active illuminators

    Science.gov (United States)

    MacDougal, Michael; Hood, Andrew; Geske, Jon; Wang, Chad; Renner, Daniel; Follman, David; Heu, Paula

    2012-01-01

    We describe the factors that go into the component choices for a short wavelength (SWIR) imager, which include the SWIR sensor, the lens, and the illuminator. We have shown the factors for reducing dark current, and shown that we can achieve well below 1.5 nA/cm2 for 15 μm devices at 7°C. We have mated our InGaAs detector arrays to 640x512 readout integrated integrated circuits (ROICs) to make focal plane arrays (FPAs). In addition, we have fabricated high definition 1920x1080 FPAs for wide field of view imaging. The resulting FPAs are capable of imaging photon fluxes with wavelengths between 1 and 1.6 microns at low light levels. The dark current associated with these FPAs is extremely low, exhibiting a mean dark current density of 0.26 nA/cm2 at 0°C. FLIR has also developed a high definition, 1920x1080, 15 um pitch SWIR sensor. In addition, FLIR has developed laser arrays that provide flat illumination in scenes that are normally light-starved. The illuminators have 40% wall-plug efficiency and provide low-speckle illumination, provide artifact-free imagery versus conventional laser illuminators.

  10. A Statewide Private Microwave Wide Area Network for Real-time Natural Hazard Monitoring

    Science.gov (United States)

    Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.

    2013-12-01

    The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and

  11. Wide area stability analysis and control of interconnected power systems with HVDC and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Li, Yong

    2012-11-01

    In order to damp low-frequency oscillations and improve the overall stability of large-scale interconnected power systems, this book investigates the wide-area stability analysis and control methods from different perspectives. The flexible and fast control capability of high-voltage (FACTS) is investigated in detail to implement a wide-area measurement based damping control. A sequential and global mixed optimization method is proposed to simultaneously optimize local and wide area damping controllers. A wide-area robust coordination method is presented to coordinate multiple wide-area damping controllers (WADC). A delay-dependent robust design method is also proposed to handle time-varying delays commonly existing in wide-area signal communication. A closed-loop hardware experiment is used to validate the damping performance. The research activities of this book include power system stability analysis and control, wide-area damping control as well as HVDC and FACTS technologies.

  12. Summary of the 2012 Wide Area Recovery and Resiliency Program (WARRP) Waste Management Workshop

    Science.gov (United States)

    Workshop advanced the planning of federal, state and local officials in the area of waste management following a chemical, biological or radiological wide-area incident in the Denver, Colorado urban area.

  13. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  14. Throughput assurance of wireless body area networks coexistence based on stochastic geometry.

    Directory of Open Access Journals (Sweden)

    Ruixia Liu

    Full Text Available Wireless body area networks (WBANs are expected to influence the traditional medical model by assisting caretakers with health telemonitoring. Within WBANs, the transmit power of the nodes should be as small as possible owing to their limited energy capacity but should be sufficiently large to guarantee the quality of the signal at the receiving nodes. When multiple WBANs coexist in a small area, the communication reliability and overall throughput can be seriously affected due to resource competition and interference. We show that the total network throughput largely depends on the WBANs distribution density (λp, transmit power of their nodes (Pt, and their carrier-sensing threshold (γ. Using stochastic geometry, a joint carrier-sensing threshold and power control strategy is proposed to meet the demand of coexisting WBANs based on the IEEE 802.15.4 standard. Given different network distributions and carrier-sensing thresholds, the proposed strategy derives a minimum transmit power according to varying surrounding environment. We obtain expressions for transmission success probability and throughput adopting this strategy. Using numerical examples, we show that joint carrier-sensing thresholds and transmit power strategy can effectively improve the overall system throughput and reduce interference. Additionally, this paper studies the effects of a guard zone on the throughput using a Matern hard-core point process (HCPP type II model. Theoretical analysis and simulation results show that the HCPP model can increase the success probability and throughput of networks.

  15. Numerical Investigation of a Chip Printed Antenna Performances for Wireless Implantable Body Area Network Applications

    Science.gov (United States)

    Ramli, N. H.; Jaafar, H.; Lee, Y. S.

    2018-03-01

    Recently, wireless implantable body area network (WiBAN) system become an active area of research due to their various applications such as healthcare, support systems for specialized occupations and personal communications. Biomedical sensors networks mounted in the human body have drawn greater attention for health care monitoring systems. The implantable chip printed antenna for WiBAN applications is designed and the antenna performances is investigated in term of gain, efficiency, return loss, operating bandwidth and radiation pattern at different environments. This paper is presents the performances of implantable chip printed antenna in selected part of human body (hand, chest, leg, heart and skull). The numerical investigation is done by using human voxel model in built in the CST Microwave Studio Software. Results proved that the chip printed antenna is suitable to implant in the human hand model. The human hand model has less complex structure as it consists of skin, fat, muscle, blood and bone. Moreover, the antenna is implanted under the skin. Therefore the signal propagation path length to the base station at free space environment is considerably short. The antenna’s gain, efficiency and Specific Absorption Rate (SAR) are - 13.62dBi, 1.50 % and 0.12 W/kg respectively; which confirms the safety of the antenna usage. The results of the investigations can be used as guidance while designing chip implantable antenna in future.

  16. A Unified Model for BDS Wide Area and Local Area Augmentation Positioning Based on Raw Observations

    Directory of Open Access Journals (Sweden)

    Rui Tu

    2017-03-01

    Full Text Available In this study, a unified model for BeiDou Navigation Satellite System (BDS wide area and local area augmentation positioning based on raw observations has been proposed. Applying this model, both the Real-Time Kinematic (RTK and Precise Point Positioning (PPP service can be realized by performing different corrections at the user end. This algorithm was assessed and validated with the BDS data collected at four regional stations from Day of Year (DOY 080 to 083 of 2016. When the users are located within the local reference network, the fast and high precision RTK service can be achieved using the regional observation corrections, revealing a convergence time of about several seconds and a precision of about 2–3 cm. For the users out of the regional reference network, the global broadcast State-Space Represented (SSR corrections can be utilized to realize the global PPP service which shows a convergence time of about 25 min for achieving an accuracy of 10 cm. With this unified model, it can not only integrate the Network RTK (NRTK and PPP into a seamless positioning service, but also recover the ionosphere Vertical Total Electronic Content (VTEC and Differential Code Bias (DCB values that are useful for the ionosphere monitoring and modeling.

  17. Body area networks using IEEE 802156 implementing the ultra wide band physical layer

    CERN Document Server

    Hernandez, Marco; Mucchi, Lorenzo

    2014-01-01

    The market of wearable wireless medical sensors is experiencing a rapid growth and the associated telecommunications services for the healthcare sector are forecast to further increase in the next years. Medical body area networks (MBANs) allow the mobility of patients and medical personnel by facilitating the remote monitoring of patients suffering from chronic or risky diseases. Currently, MBANs are being introduced in unlicensed frequency bands, where the risk of mutual interference with other electronic devices radiating in the same band can be high. Thus, coexistence is an issue on which

  18. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  19. Location verification algorithm of wearable sensors for wireless body area networks.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2018-01-01

    Knowledge of the location of sensor devices is crucial for many medical applications of wireless body area networks, as wearable sensors are designed to monitor vital signs of a patient while the wearer still has the freedom of movement. However, clinicians or patients can misplace the wearable sensors, thereby causing a mismatch between their physical locations and their correct target positions. An error of more than a few centimeters raises the risk of mistreating patients. The present study aims to develop a scheme to calculate and detect the position of wearable sensors without beacon nodes. A new scheme was proposed to verify the location of wearable sensors mounted on the patient's body by inferring differences in atmospheric air pressure and received signal strength indication measurements from wearable sensors. Extensive two-sample t tests were performed to validate the proposed scheme. The proposed scheme could easily recognize a 30-cm horizontal body range and a 65-cm vertical body range to correctly perform sensor localization and limb identification. All experiments indicate that the scheme is suitable for identifying wearable sensor positions in an indoor environment.

  20. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  1. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chongqing Zhang

    2017-05-01

    Full Text Available Wireless body area networks (WBANs are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic.

  2. Gait-Cycle-Driven Transmission Power Control Scheme for a Wireless Body Area Network.

    Science.gov (United States)

    Zang, Weilin; Li, Ye

    2018-05-01

    In a wireless body area network (WBAN), walking movements can result in rapid channel fluctuations, which severely degrade the performance of transmission power control (TPC) schemes. On the other hand, these channel fluctuations are often periodic and are time-synchronized with the user's gait cycle, since they are all driven from the walking movements. In this paper, we propose a novel gait-cycle-driven transmission power control (G-TPC) for a WBAN. The proposed G-TPC scheme reinforces the existing TPC scheme by exploiting the periodic channel fluctuation in the walking scenario. In the proposed scheme, the user's gait cycle information acquired by an accelerometer is used as beacons for arranging the transmissions at the time points with the ideal channel state. The specific transmission power is then determined by using received signal strength indication (RSSI). An experiment was conducted to evaluate the energy efficiency and reliability of the proposed G-TPC based on a CC2420 platform. The results reveal that compared to the original RSSI/link-quality-indication-based TPC, G-TPC reduces energy consumption by 25% on the sensor node and reduce the packet loss rate by 65%.

  3. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  4. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen

    2016-11-01

    Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.

  5. Nash Equilibrium of an Energy Saving Strategy with Dual Rate Transmission in Wireless Regional Area Network

    Directory of Open Access Journals (Sweden)

    Zhanqiang Huo

    2017-01-01

    Full Text Available Wireless regional area network (WRAN adopts centralized network architecture and is currently one of the most typical cognitive radio networks. In order to reduce the energy consumption of the communication networks with the constraint of spectrum resource utilization, a working sleep mechanism is introduced into the base station (BS, and a novel energy saving strategy with dual rate transmission is proposed. Combining the multiple-vacation queue and priority queue, using the quasi-birth-death process and the matrix-geometric solution method, we assess the average latency and the forced termination probability of secondary user packets, as well as the energy saving ratio and the channel utilization of system. Based on the revenue-expenditure structure, a profit function is built, and then the Nash equilibrium behavior and the socially optimal behavior are investigated. With the help of the particle swarm optimization, an intelligent optimization algorithm to search the socially optimal arrival rate of secondary user packets is presented. In order to unify the arrival rates of secondary user packets with Nash equilibrium and social optimization, a reasonable pricing policy is formulated. In addition, system experiments are carried out to verify the effectiveness of the energy saving strategy and the rationality of the pricing policy.

  6. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Al Ameen, Moshaddique; Hong, Choong Seon

    2015-12-04

    The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  7. Online fault diagnostics and testing of area gamma radiation monitor using wireless network

    Science.gov (United States)

    Reddy, Padi Srinivas; Kumar, R. Amudhu Ramesh; Mathews, M. Geo; Amarendra, G.

    2017-07-01

    Periodical surveillance, checking, testing, and calibration of the installed Area Gamma Radiation Monitors (AGRM) in the nuclear plants are mandatory. The functionality of AGRM counting electronics and Geiger-Muller (GM) tube is to be monitored periodically. The present paper describes the development of online electronic calibration and testing of the GM tube from the control room. Two electronic circuits were developed, one for AGRM electronic test and another for AGRM detector test. A dedicated radiation data acquisition system was developed using an open platform communication server and data acquisition software. The Modbus RTU protocol on ZigBee based wireless communication was used for online monitoring and testing. The AGRM electronic test helps to carry out the three-point electronic calibration and verification of accuracy. The AGRM detector test is used to verify the GM threshold voltage and the plateau slope of the GM tube in-situ. The real-time trend graphs generated during these tests clearly identified the state of health of AGRM electronics and GM tube on go/no-go basis. This method reduces the radiation exposures received by the maintenance crew and facilitates quick testing with minimum downtime of the instrument.

  8. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  9. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shagufta Henna

    2017-08-01

    Full Text Available Recently, wireless body area networks (WBANs have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS by prioritizing different traffic types in WBANs. A contention access period (CAPwith high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC, achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC.

  10. The Emerging Wireless Body Area Network on Android Smartphones: A Review

    Science.gov (United States)

    Puspitaningayu, P.; Widodo, A.; Yundra, E.

    2018-01-01

    Our society now has driven us into an era where almost everything can be digitally monitored and controlled including the human body. The growth of wireless body area network (WBAN), as a specific scope of sensor networks which mounted or attached to human body also developing rapidly. It allows people to monitor their health and several daily activities. This study is intended to review the trend of WBAN especially on Android, one of the most popular smartphone platforms. A systematic literature review is concerned to the following parameters: the purpose of the device and/or application, the type of sensors, the type of Android device, and its connectivity. Most of the studies were more concern to healthcare or medical monitoring systems: blood pressure, electro cardiograph, tremor detection, etc. On the other hand, the rest of them aimed for activity tracker, environment sensing, and epidemic control. After all, those studies shown that not only Android can be a powerful platform to process data from various sensors but also smartphones can be a good alternative to develop WBANs for medical and other daily applications.

  11. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moshaddique Al Ameen

    2015-12-01

    Full Text Available The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN. A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal or event-driven (emergency. Traditional media access control (MAC protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  12. Neighbor Discovery Algorithm in Wireless Local Area Networks Using Multi-beam Directional Antennas

    Science.gov (United States)

    Wang, Jin; Peng, Wei; Liu, Song

    2017-10-01

    Neighbor discovery is an important step for Wireless Local Area Networks (WLAN) and the use of multi-beam directional antennas can greatly improve the network performance. However, most neighbor discovery algorithms in WLAN, based on multi-beam directional antennas, can only work effectively in synchronous system but not in asynchro-nous system. And collisions at AP remain a bottleneck for neighbor discovery. In this paper, we propose two asynchrono-us neighbor discovery algorithms: asynchronous hierarchical scanning (AHS) and asynchronous directional scanning (ADS) algorithm. Both of them are based on three-way handshaking mechanism. AHS and ADS reduce collisions at AP to have a good performance in a hierarchical way and directional way respectively. In the end, the performance of the AHS and ADS are tested on OMNeT++. Moreover, it is analyzed that different application scenarios and the factors how to affect the performance of these algorithms. The simulation results show that AHS is suitable for the densely populated scenes around AP while ADS is suitable for that most of the neighborhood nodes are far from AP.

  13. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  14. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  15. On the Capability of Smartphones to Perform as Communication Gateways in Medical Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    María José Morón

    2014-01-01

    Full Text Available This paper evaluates and characterizes the technical performance of medicalwireless personal area networks (WPANs that are based on smartphones. For this purpose,a prototype of a health telemonitoring system is presented. The prototype incorporates acommercial Android smartphone, which acts as a relay point, or “gateway”, between a setof wireless medical sensors and a data server. Additionally, the paper investigates if theconventional capabilities of current commercial smartphones can be affected by their useas gateways or “Holters” in health monitoring applications. Specifically, the profiling hasfocused on the CPU and power consumption of the mobile devices. These metrics havebeen measured under several test conditions modifying the smartphone model, the type ofsensors connected to the WPAN, the employed Bluetooth profile (SPP (serial port profile orHDP (health device profile, the use of other peripherals, such as a GPS receiver, the impactof the use of theWi-Fi interface or the employed method to encode and forward the data thatare collected from the sensors.

  16. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  17. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    OpenAIRE

    Xiaojun Liu; Youcheng Wang; Hub Hu

    2014-01-01

    As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area...

  18. Efficacy analysis of LDPC coded APSK modulated differential space-time-frequency coded for wireless body area network using MB-pulsed OFDM UWB technology.

    Science.gov (United States)

    Manimegalai, C T; Gauni, Sabitha; Kalimuthu, K

    2017-12-04

    Wireless body area network (WBAN) is a breakthrough technology in healthcare areas such as hospital and telemedicine. The human body has a complex mixture of different tissues. It is expected that the nature of propagation of electromagnetic signals is distinct in each of these tissues. This forms the base for the WBAN, which is different from other environments. In this paper, the knowledge of Ultra Wide Band (UWB) channel is explored in the WBAN (IEEE 802.15.6) system. The measurements of parameters in frequency range from 3.1-10.6 GHz are taken. The proposed system, transmits data up to 480 Mbps by using LDPC coded APSK Modulated Differential Space-Time-Frequency Coded MB-OFDM to increase the throughput and power efficiency.

  19. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  20. Validation of Leaf Area Index measurements based on the Wireless Sensor Network platform

    Science.gov (United States)

    Song, Q.; Li, X.; Liu, Q.

    2017-12-01

    The leaf area index (LAI) is one of the important parameters for estimating plant canopy function, which has significance for agricultural analysis such as crop yield estimation and disease evaluation. The quick and accurate access to acquire crop LAI is particularly vital. In the study, LAI measurement of corn crops is mainly through three kinds of methods: the leaf length and width method (LAILLW), the instruments indirect measurement method (LAII) and the leaf area index sensor method(LAIS). Among them, LAI value obtained from LAILLW can be regarded as approximate true value. LAI-2200,the current widespread LAI canopy analyzer,is used in LAII. LAIS based on wireless sensor network can realize the automatic acquisition of crop images,simplifying the data collection work,while the other two methods need person to carry out field measurements.Through the comparison of LAIS and other two methods, the validity and reliability of LAIS observation system is verified. It is found that LAI trend changes are similar in three methods, and the rate of change of LAI has an increase with time in the first two months of corn growth when LAIS costs less manpower, energy and time. LAI derived from LAIS is more accurate than LAII in the early growth stage,due to the small blade especially under the strong light. Besides, LAI processed from a false color image with near infrared information is much closer to the true value than true color picture after the corn growth period up to one and half months.

  1. Demonstration of Airborne Wide Area Assessment Technologies at the Toussaint River, Ohio

    National Research Council Canada - National Science Library

    Foley, Jack; Wright, David

    2007-01-01

    ...) technology, a wide area assessment technology, to assist in the characterization of the shore and shallow areas in and around the Toussaint River relative to munitions contamination from historical...

  2. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  3. 40 CFR 52.326 - Area-wide nitrogen oxides (NOX) exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Area-wide nitrogen oxides (NOX) exemptions. 52.326 Section 52.326 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.326 Area-wide nitrogen...

  4. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  5. Value-Based Caching in Information-Centric Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Fadi M. Al-Turjman

    2017-01-01

    Full Text Available We propose a resilient cache replacement approach based on a Value of sensed Information (VoI policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs. These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures. These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.

  6. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation

    Directory of Open Access Journals (Sweden)

    Maham Waheed

    2018-02-01

    Full Text Available The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs. Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor’s battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE and packet error rate (PER are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC coding the cooperative link.

  7. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation.

    Science.gov (United States)

    Waheed, Maham; Ahmad, Rizwan; Ahmed, Waqas; Drieberg, Micheal; Alam, Muhammad Mahtab

    2018-02-13

    The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs). Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor's battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE) and packet error rate (PER) are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link.

  8. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks.

    Science.gov (United States)

    Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor

    2016-02-24

    In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption.

  9. Terabit Wireless Communication Challenges

    Science.gov (United States)

    Hwu, Shian U.

    2012-01-01

    This presentation briefly discusses a research effort on Terabit Wireless communication systems for possible space applications. Recently, terahertz (THz) technology (300-3000 GHz frequency) has attracted a great deal of interest from academia and industry. This is due to a number of interesting features of THz waves, including the nearly unlimited bandwidths available, and the non-ionizing radiation nature which does not damage human tissues and DNA with minimum health threat. Also, as millimeter-wave communication systems mature, the focus of research is, naturally, moving to the THz range. Many scientists regard THz as the last great frontier of the electromagnetic spectrum, but finding new applications outside the traditional niches of radio astronomy, Earth and planetary remote sensing, and molecular spectroscopy particularly in biomedical imaging and wireless communications has been relatively slow. Radiologists find this area of study so attractive because t-rays are non-ionizing, which suggests no harm is done to tissue or DNA. They also offer the possibility of performing spectroscopic measurements over a very wide frequency range, and can even capture signatures from liquids and solids. According to Shannon theory, the broad bandwidth of the THz frequency bands can be used for terabit-per-second (Tb/s) wireless communication systems. This enables several new applications, such as cell phones with 360 degrees autostereoscopic displays, optic-fiber replacement, and wireless Tb/s file transferring. Although THz technology could satisfy the demand for an extremely high data rate, a number of technical challenges need to be overcome before its development. This presentation provides an overview the state-of-the- art in THz wireless communication and the technical challenges for an emerging application in Terabit wireless systems. The main issue for THz wave propagation is the high atmospheric attenuation, which is dominated by water vapor absorption in the THz

  10. Wireless Broadband Network on TVWS for Rural Areas: an Indian Perspective

    DEFF Research Database (Denmark)

    Deshmukh, Madhukar; Patil, Kishor P.; Frederiksen, Flemming Bjerge

    2013-01-01

    and market domains. The current global move to switch from analogue to digital TV has opened up an opportunity for the re-allocation of this valuable resource. In one way, spectrum bands once used for analogue TV broadcasting will be completely cleared, leaving a space for deploying new licensed wireless...... services, and in another way, digital television technology geographically interleaves spectrum bands to avoid interference between neighboring stations-leaving a space for deploying new unlicensed wireless services. The focus of the paper is to assess the availability of geographically interleaved...

  11. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    OpenAIRE

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  12. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  13. Continual observation on crop leaf area index using wireless sensors network

    International Nuclear Information System (INIS)

    Jiao, Sihong

    2014-01-01

    Crop structural parameter, i.e. leaf area index(LAI), is the main factor that can effect the solar energy re-assignment in the canopy. An automatic measuring system which is designed on the basis of wireless sensors network(WSN) is present in this paper. The system is comprised of two types of node. One is the measurement nodes which measured solar irradiance and were deployed beneath and above the canopy respectively, and another is a sink node which was used to collect data from the other measurement nodes. The measurement nodes also have ability to repeater data from one node to another and finally transfer signal to the sink node. Then the collected data of sink node are transferred to the data center through GPRS network. Using the field data collected by WSN, canopy structural parameters can be calculated using the direct transmittance which is the ratio of sun radiation captured by the measurement node beneath and above the canopy on different sun altitude angles. The proposed WSN measurement systems which is consisted of about 45 measurement node was deployed in the Heihe watershed to continually observe the crop canopy structural parameters from 25 June to 24 August 2012. To validate the performance of the WSN measured crop structural parameters, the LAI values were also measured by LAI2000. The field preliminary validation results show that the designed system can capture the varies of solar direct canopy transmittance on different time in a day, which is the basis to calculate the target canopy structural parameters. The validation results reveal that the measured LAI values derived from our propose measurement system have acceptable correlation coefficient(R2 from 0.27 to 0.96 and averaged value 0.42) with those derived from LAI2000. So it is a promising way in the agriculture application to utilize the proposed system and thus will be an efficient way to measure the crop structural parameters in the large spatial region and on the long time series

  14. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B

  15. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  16. Wide-Area Haptic Guidance: Taking the User by the Hand

    OpenAIRE

    Pérez Arias, Antonia; Hanebeck, Uwe D.

    2010-01-01

    In this paper, we present a novel use of haptic information in extended range telepresence, the wide-area haptic guidance. It consists of force and position signals applied to the user's hand in order to improve safety, accuracy, and speed in some telepresent tasks. Wide-area haptic guidance assists the user in reaching a desired position in a remote environment of arbitrary size without degrading the feeling of presence. Several methods for haptic guidance are analyzed. With active haptic gu...

  17. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  18. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  19. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  20. Analysis of area-wide management of insect pests based on sampling

    Science.gov (United States)

    David W. Onstad; Mark S. Sisterson

    2011-01-01

    The control of invasive species greatly depends on area-wide pest management (AWPM) in heterogeneous landscapes. Decisions about when and where to treat a population with pesticide are based on sampling pest abundance. One of the challenges of AWPM is sampling large areas with limited funds to cover the cost of sampling. Additionally, AWPM programs are often confronted...

  1. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  2. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  3. Voltage control and protection in electrical power systems from system components to wide-area control

    CERN Document Server

    Corsi, Sandro

    2015-01-01

    Based on the author’s twenty years of experience, this book shows the practicality of modern, conceptually new, wide area voltage control in transmission and distribution smart grids, in detail. Evidence is given of the great advantages of this approach, as well as what can be gained by new control functionalities which modern technologies now available can provide. The distinction between solutions of wide area voltage regulation (V-WAR) and wide area voltage protection (V-WAP) are presented, demonstrating the proper synergy between them when they operate on the same power system as well as the simplicity and effectiveness of the protection solution in this case. The author provides an overview and detailed descriptions of voltage controls, distinguishing between generalities of underdeveloped, on-field operating applications and modern and available automatic control solutions, which are as yet not sufficiently known or perceived for what they are: practical, high-performance and reliable solutions. At th...

  4. The NILE system architecture: fault-tolerant, wide-area access to computing and data resources

    International Nuclear Information System (INIS)

    Ricciardi, Aleta; Ogg, Michael; Rothfus, Eric

    1996-01-01

    NILE is a multi-disciplinary project building a distributed computing environment for HEP. It provides wide-area, fault-tolerant, integrated access to processing and data resources for collaborators of the CLEO experiment, though the goals and principles are applicable to many domains. NILE has three main objectives: a realistic distributed system architecture design, the design of a robust data model, and a Fast-Track implementation providing a prototype design environment which will also be used by CLEO physicists. This paper focuses on the software and wide-area system architecture design and the computing issues involved in making NILE services highly-available. (author)

  5. Field and long-term demonstration of a wide area quantum key distribution network.

    Science.gov (United States)

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  6. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  7. System Wide Implementation of Photonically Generated Impulse Radio Ultra-Wideband for Gigabit Fiber-Wireless Access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Gibbon, Timothy Braidwood; Rodes Lopez, Roberto

    2013-01-01

    In this paper, we comprehensively review our research work on system wide implementation of photonically generated IR-UWB signals based on relaxation oscillations of a semiconductor laser. Firstly, we present our novel approach as a flexible method for photonic generation of high speed impulse ra...

  8. Real-time Alarm Monitoring System for Detecting Driver Fatigue in Wireless Areas

    Directory of Open Access Journals (Sweden)

    Rongrong Fu

    2017-04-01

    Full Text Available The purpose of this paper was to develop a real-time alarm monitoring system that can detect the fatigue driving state through wireless communication. The drivers’ electroencephalogram (EEG signals were recorded from occipital electrodes. Seven EEG rhythms with different frequency bands as gamma, hbeta, beta, sigma, alpha, theta and delta waves were extracted. They were simultaneously assessed using relative operating characteristic (ROC curves and grey relational analysis to select one as the fatigue feature. The research results showed that the performance of theta wave was the best one. Therefore, theta wave was used as fatigue feature in the following alarm device. The real-time alarm monitoring system based on the result has been developed, once the threshold was settled by using the data of the first ten minutes driving period. The developed system can detect driver fatigue and give alarm to indicate the onset of fatigue automatically.

  9. Cooperating Mobile GIS and Wireless Sensor Networks for Managing Transportation Infrastructures in Urban areas

    Directory of Open Access Journals (Sweden)

    R. Shad

    2013-10-01

    Full Text Available Time management is a major subject which, in order to optimize trip conditions, emphasizes on interpreting processes and classifying individual's information. In this paper, with the aim of providing an optimal system for urban commuting in proper time in Mashhad, each user using SMS and introducing some of his/her mental priorities to the system, will be able to select the best option depending on the timing of movement of the available public transport system. The present study adopts a newly developed method of time management which is evaluated for urban transportation considering dynamic conditions of a spatial database. For this purpose, regarding time management, processed data such as bus lines, taxi networks, and the subway system are combined in a spatial framework of a designed Mobile GIS based on a wireless network. So, multiple potential paths which end to a desirable destination.

  10. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  11. Design of Weighted Wide Area Damping Controller (WWADC Based PSS for Damping Inter-Area Low Frequency Oscillations

    Directory of Open Access Journals (Sweden)

    Saleh M. Bamasak

    2017-09-01

    Full Text Available Wide Area Measurement System (WAMS can extend and effectively improve the power system stabilizers (PSS capability in damping the inter-area low frequency oscillations in interconnected bulk power systems. This paper proposes the implementation of Weighted Wide Area Damping Controller (WWADC in which weighted factors are introduced for each remote feedback signals. Modal analysis approach is implemented for the purpose of identifying the optimal location as well as the input signals’ optimal combination of WWADC. Based on the linearized model, Differential Evolution (DE algorithm is applied to search for optimal controller parameters and optimal weighted factors. The successful application of the proposed approach is achieved in two power networks; the two-area 4-machine system and the IEEE-39 bus 10-machine system. The analysis of the eigenvalue and non-linear time domain simulations indicate that damping the inter-area oscillations and improving the system stability irrespective of the severity and the location of the disturbances can be effectively achieved by WADC

  12. Wide area monitoring, protection and control systems the enabler for smarter grids

    CERN Document Server

    Vaccaro, Alfredo

    2016-01-01

    This book is designed to give electrical and electronic engineers involved in the design, operation and maintenance of electrical power networks, the knowledge and skills necessary to deploy synchronised measurement technology (SMT) in Wide Area Monitoring, Protection And Control (WAMPAC) applications.

  13. Area-wide integration of lepidopteran F1 sterility and augmentative biological control

    International Nuclear Information System (INIS)

    Carpenter, James E.

    2000-01-01

    Area-wide pest management (APM) and integrated pest management (IPM) originated from two different efforts to combine two or more control techniques into programmes in which each method could synergise the effectiveness of others and thus create a level of pest control that was greater than that of a single technique (Perkins 1982). Since then, the concept of APM has evolved to include many aspects of IPM and often is now referred to as area-wide IPM. Still, the element of total population management is central to this approach of insect pest management. In support of APM, Knipling (1998) stated that of the insect pests that were of major concern to agriculture before the newer classes of insecticides were available, most are still pests today, the major exceptions being the screw-worm fly and the boll weevil in the southeastern US cotton growing region. Knipling also noted that both of these pest species were subjected to area-wide suppression programmes. In response to the USDA IPM Initiative (USDA 1993, 1994) which seeks to achieve the national goal of having 75% of the crop acres under IPM by the year 2000, the Agricultural Research Service developed an Area-wide IPM Programme. This programme combines environmentally-sound pest control techniques with the advantages of APM and develops partnerships with other federal, state, local and private sector entities. Technologies such as the integration of lepidopteran F 1 sterility and augmentative biological control may be considered for future programmes

  14. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    Directory of Open Access Journals (Sweden)

    Xiaojun Liu

    2014-04-01

    Full Text Available As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area protection algorithm based on positive sequence fault components directional comparison principle is proposed. The special associated intelligent electronic devices (IEDs zones which contain buses and transmission lines are created according to the installation location of the IEDs. When a fault occurs, with the help of the fault information collecting and sharing from associated zones with the fault discrimination principle defined in this paper, the IEDs can identify the fault location and remove the fault according to the predetermined action strategy. The algorithm will not be impacted by the load changes and transition resistance and also has good adaptability in open phase running power system. It can be used as a main protection, and it also can be taken into account for the back-up protection function. The results of cases study show that, the division method of the wide-area protection system and the proposed algorithm are effective.

  15. Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  16. Wide Area Protection Scheme Preventing Cascading Events based on Improved Impedance relay

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  17. Area-wide integrated pest management of fruit flies in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Allwood, Allan; Vueti, Ema Tora

    2003-01-01

    Fruit flies (Diptera: Tephritidae) are recognised as one of the most important pests of fruits and vegetables. The importance of an Integrated Pest Management approach to fruit fly suppression or eradication has been emphasized over the past 30 years. Integrated Pest Management has, in some instance, a narrow focus on the crop or the orchard or farm, but not adopting an area-wide approach, where much of the activity may be outside the crop or production unit. All of the techniques used to manage fruit flies at the on-farm level may be used on an area-wide basis, preferably in combination to maximise the impact of each technique. There are some techniques, which are better suited to the area-wide approach, but can be used on-farm as well. Techniques include physical control (e.g., bagging), cultural control (e.g., production when fly numbers are low, resistant varieties, crop hygiene, early harvesting, growing refuge crops), biological control, behavioral control (e.g., protein bait spray application technique and male annihilation technique), sterile insect technique, and chemical control. In adopting an area-wide approach, very effective collaboration between many stakeholders is essential. (author)

  18. Connected vehicle insights : fourth generation wireless - vehicle and highway gateways to the cloud.

    Science.gov (United States)

    2011-12-01

    This paper examines next generation wide-area cellular such as fourth generation (4G) will be able to support vehicular applications, and how transportation infrastructure may mesh with wireless networks. : This report is part of the Connected Vehicl...

  19. A low-rank matrix recovery approach for energy efficient EEG acquisition for a wireless body area network.

    Science.gov (United States)

    Majumdar, Angshul; Gogna, Anupriya; Ward, Rabab

    2014-08-25

    We address the problem of acquiring and transmitting EEG signals in Wireless Body Area Networks (WBAN) in an energy efficient fashion. In WBANs, the energy is consumed by three operations: sensing (sampling), processing and transmission. Previous studies only addressed the problem of reducing the transmission energy. For the first time, in this work, we propose a technique to reduce sensing and processing energy as well: this is achieved by randomly under-sampling the EEG signal. We depart from previous Compressed Sensing based approaches and formulate signal recovery (from under-sampled measurements) as a matrix completion problem. A new algorithm to solve the matrix completion problem is derived here. We test our proposed method and find that the reconstruction accuracy of our method is significantly better than state-of-the-art techniques; and we achieve this while saving sensing, processing and transmission energy. Simple power analysis shows that our proposed methodology consumes considerably less power compared to previous CS based techniques.

  20. An Adaptive Allocation Algorithm Using Directional CSMA/CA over mmWave Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Hyunhee Park

    2012-04-01

    Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni-antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention-based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP control procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.

  1. Summary of field operations Technical Area I well PGS-1. Site-Wide Hydrogeologic Characterization Project

    International Nuclear Information System (INIS)

    Fritts, J.E.; McCord, J.P.

    1995-02-01

    The Environmental Restoration (ER) Project at Sandia National Laboratories, New Mexico is managing the project to assess and, when necessary, to remediate sites contaminated by the lab operations. Within the ER project, the site-wide hydrogeologic characterization task is responsible for the area-wide hydrogeologic investigation. The purpose of this task is to reduce the uncertainty about the rate and direction of groundwater flow beneath the area and across its boundaries. This specific report deals with the installation of PGS-1 monitoring well which provides information on the lithology and hydrology of the aquifer in the northern area of the Kirtland Air Force Base. The report provides information on the well design; surface geology; stratigraphy; structure; drilling, completion, and development techniques; and borehole geophysics information

  2. Wide Area Coordinated Control of Multi-FACTS Devices to Damp Power System Oscillations

    Directory of Open Access Journals (Sweden)

    Shiyun Xu

    2017-12-01

    Full Text Available Aiming at damping the inter-area oscillations of power systems, the present study proposes a wide-area decentralized coordinated control framework, where the upper-level controller is designed to coordinate the lower-level multiple FACTS devices. Based on the polytopic differential inclusion method, the derived controller adopts a decentralized structure and it is guaranteed to be robust to meet the demand of operation under multiple operating conditions. Since time delay of wide area signal transmission is inevitable, in what follows, the quantum evolution algorithm (QEA method is introduced to find an optimal solution of the time-delay coordinated controller. In this regard, the stability of the system with a prescribed time delay is guaranteed and the system damping ratio is increased. Effectiveness and applicability of the proposed controller design methods have been demonstrated through numerical simulations.

  3. Balancing emergency message dissemination and network lifetime in wireless body area network using ant colony optimization and Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    R. Latha

    Full Text Available Nowadays, Wireless Body Area Network (WBAN is emerging very fast and so many new methods and algorithms are coming up for finding the optimal path for disseminating emergency messages. Ant Colony Optimization (ACO is one of the cultural algorithms for solving many hard problems such as Travelling Salesman Problem (TSP. ACO is a natural behaviour of ants, which work stochastically with the help of pheromone trails deposited in the shortest route to find their food. This optimization procedure involves adapting, positive feedback and inherent parallelism. Each ant will deposit certain amount of pheromone in the tour construction it makes searching for food. This type of communication is known as stigmetric communication. In addition, if a dense WBAN environment prevails, such as hospital, i.e. in the environment of overlapping WBAN, game formulation was introduced for analyzing the mixed strategy behaviour of WBAN. In this paper, the ant colony optimization approach to the travelling salesman problem was applied to the WBAN to determine the shortest route for sending emergency message to the doctor via sensor nodes; and also a static Bayesian game formulation with mixed strategy was analysed to enhance the network lifetime. Whenever the patient needs any critical care or any other medical issue arises, emergency messages will be created by the WBAN and sent to the doctor's destination. All the modes of communication were realized in a simulation environment using OMNet++. The authors investigated a balanced model of emergency message dissemination and network lifetime in WBAN using ACO and Bayesian game formulation. Keywords: Wireless body area network, Ant colony optimization, Bayesian game model, Sensor network, Message latency, Network lifetime

  4. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  5. Some Challenges in Wireless Security

    National Research Council Canada - National Science Library

    Banerjee, Suman

    2007-01-01

    Wireless communication technologies provide users with significant flexibility and portability and hence is being widely adopted as a preferred mode of communication in many military and civilian applications...

  6. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  7. Wireless ECG and PCG Portable Telemedicine Kit for Rural Areas of Colombia

    Directory of Open Access Journals (Sweden)

    Miguel Jimeno

    2014-07-01

    Full Text Available Telemedicine is always a popular topic thanks to the constants advancements of technology. The focus on development of new devices has been mainly on decreasing size to increase portability. Our research focused on improving functionality but not giving up on portability and cost. In this paper we are presenting the first prototype device that measures 4-leads electrocardiogram (ECG and phonocardiogram (PCG signals with low cost, high portability and wireless connectivity features in mind. We designed and developed a prototype that measures ECG using a standard ECG cable; we designed and developed a digital stethoscope prototype and also the necessary hardware for both medical signals to be transmitted through Bluetooth to a computer. We present here the hardware design, a new communication protocol for transmission of both signals from the device to the computer, and the software system to enable remote consultations. We designed the prototype with the main purpose of using low cost parts without sacrificing functionality, with the purpose of using it in remote zones of the Caribbean coast of Colombia. We show open issues and prepare a field implementation of the kit in the target zone.

  8. A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Chuang Ma

    2016-01-01

    Full Text Available In wireless sensor networks (WSNs, the presence of congestion increases the ratio of packet loss and energy consumption and reduces the network throughput. Particularly, this situation will be more complex in Internet of Things (IoT environment, which is composed of thousands of heterogeneous nodes. RPL is an IPv6 routing protocol in low power and lossy networks standardized by IETF. However, the RPL can induce problems under network congestion, such as frequently parent changing and throughput degradation. In this paper, we address the congestion problem between parent nodes and child nodes in RPL-enabled networks, which typically consist of low power and resource constraint devices. To mitigate the effect of network congestion, we design a parent-change procedure by game theory strategy, by which the child nodes can change next hop neighbors toward the sink. Comparing to the ContikiRPL implementation, the simulation results show that our protocol can achieve more than two times improvement in throughput and reduce packet loss rate with less increasing of average hop count.

  9. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  10. Study of the wide area of a lake with remote sensing

    Science.gov (United States)

    Lazaridou, Maria A.; Karagianni, Aikaterini C.

    2016-08-01

    Water bodies are particularly important for environment and development issues. Their study requires multiple information. Remote sensing has been proven useful in the above study. This paper concerns the wide area of Lake Orestiada in the region of Western Macedonia in Greece. The area is of particular interest because Lake Orestiada is included in the Natura 2000 network and is surrounded by diverse landcovers as built up areas and agricultural land. Multispectral and thermal Landsat 5 satellite images of two time periods are being used. Their processing is being done by Erdas Imagine software. The general physiognomy of the area and the lake shore are examined after image enhancement techniques and image interpretation. Directions of the study concern geomorphological aspects, land covers, estimation of surface temperature as well as changes through time.

  11. MSAT wide-area fleet management: End-user requirements and applications

    Science.gov (United States)

    Pedersen, Allister

    1995-01-01

    MSAT (Mobile SATellite) Services will become a reality in North America in 1995. MSAT will provide wide-area voice, data and fax services to land, marine and aeronautical mobile users anywhere in North America including 200 nautical miles off the coasts and into the Arctic waters. MSAT will also convey GPS position information from mobiles to dispatch centers. One broad application of MSAT is Wide Area Fleet Management (WAFM). This paper defines WAFM, outlines end-user requirements and identifies potential applications of MSAT WAFM. The paper draws from information obtained in several preMSAT WAFM field trials in land, marine and aeronautical mobile environments. The paper concludes with an outline of the potential benefits of MSAT WAFM.

  12. MAP Fault Localization Based on Wide Area Synchronous Phasor Measurement Information

    Science.gov (United States)

    Zhang, Yagang; Wang, Zengping

    2015-02-01

    In the research of complicated electrical engineering, the emergence of phasor measurement units (PMU) is a landmark event. The establishment and application of wide area measurement system (WAMS) in power system has made widespread and profound influence on the safe and stable operation of complicated power system. In this paper, taking full advantage of wide area synchronous phasor measurement information provided by PMUs, we have carried out precise fault localization based on the principles of maximum posteriori probability (MAP). Large numbers of simulation experiments have confirmed that the results of MAP fault localization are accurate and reliable. Even if there are interferences from white Gaussian stochastic noise, the results from MAP classification are also identical to the actual real situation.

  13. Designing for Wide-Area Situation Awareness in Future Power Grid Operations

    Science.gov (United States)

    Tran, Fiona F.

    Power grid operation uncertainty and complexity continue to increase with the rise of electricity market deregulation, renewable generation, and interconnectedness between multiple jurisdictions. Human operators need appropriate wide-area visualizations to help them monitor system status to ensure reliable operation of the interconnected power grid. We observed transmission operations at a control centre, conducted critical incident interviews, and led focus group sessions with operators. The results informed a Work Domain Analysis of power grid operations, which in turn informed an Ecological Interface Design concept for wide-area monitoring. I validated design concepts through tabletop discussions and a usability evaluation with operators, earning a mean System Usability Scale score of 77 out of 90. The design concepts aim to support an operator's complete and accurate understanding of the power grid state, which operators increasingly require due to the critical nature of power grid infrastructure and growing sources of system uncertainty.

  14. Wide-Area Robust Decentralized Coordinated Control of HVDC Power System Based on Polytopic System Theory

    Directory of Open Access Journals (Sweden)

    Shiyun Xu

    2015-01-01

    Full Text Available The present study proposes a hierarchical wide-area decentralized coordinated control framework for HVDC power system that is robust to multiple operating conditions. The upper level wide-area coordinated controller is designed in the form of dynamic output feedback control that coordinates the lower level HVDC supplementary controller, PSS, and SVC. In order to enhance the robustness of the designed controller under various operating conditions, the polytopic model is introduced such that the closed-loop control system can be operated under strong damping mode in virtue of the stability criterion based on damping ratio. Simulation results demonstrate that the proposed controller design algorithm is capable of enhancing the system damping over four different conditions.

  15. Bio-Inspired Distributed Transmission Power Control Considering QoS Fairness in Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Lee, Chan-Jae; Jung, Ji-Young; Lee, Jung-Ryun

    2017-10-14

    Recently, the development of wireless body area sensor network (WBASN) has accelerated due to the rapid development of wireless technology. In the WBASN environment, many WBASNs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Although nodes in a WBASN typically operate at a low power level, to avoid adversely affecting the human body, high transmission rates may be required to support some applications. In addition to this, since many varieties of applications exist in the WBASN environment, each prospective user may have different quality of service (QoS) requirements. Hence, the following issues should be considered in the WBASN environment: (1) interference between adjacent WBASNs, which influences the performance of a specific system, and (2) the degree of satisfaction on the QoS of each user, i.e., the required QoS such as user throughput should be considered to ensure that all users in the network are provided with a fair QoS satisfaction. Thus, in this paper, we propose a transmission power adjustment algorithm that addresses interference problems and guarantees QoS fairness between users. First, we use a new utility function to measure the degree of the satisfaction on the QoS for each user. Then, the transmission power of each sensor node is calculated using the Cucker-Smale model, and the QoS satisfaction of each user is synchronized dispersively. The results of simulations show that the proposed algorithm performs better than existing algorithms, with respect to QoS fairness and energy efficiency.

  16. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  17. Wide-area service water information management system; Koiki suido joho kanri system

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A wide-area service water system is required to be more resistant to emergency situations, e.g., drought and hazards, and meet consumers' diversifying needs in each area, while stably supplying water at ordinary times by utilizing purification plants located in places within its system and piping networks in the water area. Fuji Electric is providing information management systems for wide-area service water systems, developed based on the company's abundant system know-hows accumulated for a long time and latest techniques. They are characterized by (1) Web monitoring, aided by an intranet system, (2) high-speed data transmission by a digital transmission system, (3) open network environments, and (4) emergency calling of the staff, and management of stock materials. The system allows to monitor operating conditions within the area on real time, needless to say, and business administration with civil minimum taken into consideration, e.g., stabilizing water quality by coordinating the purification plants within the system. (translated by NEDO)

  18. Camera Networks The Acquisition and Analysis of Videos over Wide Areas

    CERN Document Server

    Roy-Chowdhury, Amit K

    2012-01-01

    As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide

  19. Comparative analysis of the application of different Low Power Wide Area Network technologies in power grid

    Science.gov (United States)

    Wang, Hao; Sui, Hong; Liao, Xing; Li, Junhao

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but the application principle of different LPWAN technologies in power grid is still not clear. This paper gives a comparative analysis of two mainstream LPWAN technologies including NB-IoT and LoRa, and gives an application suggestion of these two LPWAN technologies, which can guide the planning and construction of LPWAN in power grid.

  20. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  1. High-Speed Optical Wide-Area Data-Communication Network

    Science.gov (United States)

    Monacos, Steve P.

    1994-01-01

    Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.

  2. Multiagents-based wide area protection with best-effort adaptive strategy

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Yongli; Wang, Dewen [North China Electric Power University, Baoding (China); Song, Shaoqun [Fuzhou Electric Power Industry Bureau, Fujian Province (China)

    2009-02-15

    Abstract - Multi-trips of circuit breakers often occur within a short period in a severe blackout, and the tripping usually relates to relays' mal-operations. In fact, when two ore more electric primary devices are isolated by circuit breakers, the settings of most relays to protect their power system are getting infeasible and uncoordinated. Adaptive settings are needed to prevent them from wrong operation. This paper presents an adaptive protection scheme based on wide area information with best-effort protection strategy, and the outline of multiagents and WAN Based Adaptive Protection System (MAWAPS). In the scheme, the best-effort adaptive strategy is used to guarantee the adaptive settings to operate safely and effectively in most situations. The IP/SDH-based wide area network (WAN) is used to realize real-time wide area information exchange in the proposed protection scheme. Adaptive setting algorithms for the second stage zero-sequence current and phase overcurrent relays are proposed, which can provide larger line coverage than traditional relays. Moreover, multiagent techniques and IEC 61850 are employed to realize the fast communication between different agents, and MMS plays a prominent role in real-time remote communication. A simulating system has been developed according to the above ideas and approaches, and the experimental results show that the proposed adaptive protection scheme is feasible from the view of protective performance including the executing time. (author)

  3. Area-wide pest management of fruit flies in Hawaiian fruits and vegetables

    International Nuclear Information System (INIS)

    Vargas, Roger I.; Jang, Eric B.; Klungness, L. Michael

    2003-01-01

    Four economically important fruit flies have been accidentally introduced into Hawaii: melon fly, Mediterranean fruit fly, oriental fruit fly, and the so-called Malaysian (solanaceous) fruit fly. Over 400 different host fruits are attacked. These fruit flies inhibit development of a diversified tropical fruit and vegetable industry, require that commercial fruits undergo quarantine treatment prior to export, and in Hawaii provide a breeding reservoir for their introduction into the continental United States. These exotic pests a serious threat of establishment into new areas with movement of people and commodities throughout the U.S. and the world. For example, if the Mediterranean fruit fly became established in California, projected losses would exceed $1 billion per year due to trade embargoes, loss of jobs, increased pesticide use, and direct crop loss. Present fruit fly control measures in Hawaii relay heavily on the application of organophosphate and carbamate insecticides to crops. Overuse of these insecticides has been implicated with secondary pest outbreaks, negative effects on beneficial insects, environmental contamination and adverse effects on human health. In 1999 a 5 year Area-wide Pest Management (AWPM) program was funded (for FY2000) for management of fruit flies in Hawaii. The goal of the Fruit Fly AWPM program is to develop and integrate biologically based pest management approaches that will result in area-wide suppression and control of fruit flies throughout selected agricultural areas of Hawaii. The IPM program will integrate two or more technologies into a comprehensive package that is economically viable, environmentally acceptable and sustainable. The program will result in a reduction in the use of organophosphate insecticides, and further growth and development of diversified agriculture in Hawaii. The technologies include: 1) field sanitation, 2) protein bait sprays and/or traps, 3) male annihilation with male lures and attractants, 4

  4. Secure Multi-Gigabit Ultra-Wide Band Communications for Personal Area Networks

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Puerta Ramírez, Rafael; Tafur Monroy, Idelfonso

    2016-01-01

    scenarios where the user may be located in public spaces. We propose to use Ultra-Wideband communications, which can be seamlessly transported over fiber or wireless, and show different transmission experiments ranging from 2 Gbit/s to 35 Gbit/s. To achieve these record bit rates, the multi-band approach...

  5. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  6. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Raber, Ellen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kirvel, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Don [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Love, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dombroski, Matthew [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McGrann, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Richards, John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Melius, Carl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bunt, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hibbard, Wilthea [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Greenwalt, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Miles, Robin [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dillon, Michael [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mancieri, Sav [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Harris, Steve [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Michalik, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wheeler, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hoppes, Bill [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Tucker, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krauter, Paula [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knowlton, Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yang, Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Franco, Dave [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Einfeld, Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brockman, John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Betty, Rita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urban area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision

  7. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  8. Area-wide integrated pest management and the sterile insect technique

    International Nuclear Information System (INIS)

    Klassen, W.

    2005-01-01

    Area-wide integrated pest management (AW-IPM) focuses on the preventive management of pest populations throughout the ecosystem. It seeks to treat all habitats of the pest population so that none produces migrants to re-establish significant infestations in areas of concern. In contrast, the conventional strategy focuses narrowly on defending the valued entity (crop, livestock, people, buildings, etc.) from direct attack by pests. AW-IPM requires multiyear planning, and an organization dedicated exclusively to its implementation, whereas conventional pest management involves minimal forward planning, tends to be reactive, and is implemented independently by individual producers, businesses, or households. AW-IPM tends to utilize advanced technologies, whereas the conventional strategy tends to rely on traditional tactics and tools. The sterile insect technique (SIT) is a species-specific form of birth control imposed on the pest population. It is a powerful tool for 'mopping up' sparse pest populations, and is most efficient when applied as a tactic in a system deployed on an area-wide basis. On environmental, economic and biological grounds, the case for the SIT is compelling. (author)

  9. Emerging Technologies and Techniques for Wide Area Radiological Survey and Remediation

    Energy Technology Data Exchange (ETDEWEB)

    Sutton, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zhao, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-03-24

    Technologies to survey and decontaminate wide-area contamination and process the subsequent radioactive waste have been developed and implemented following the Chernobyl nuclear power plant release and the breach of a radiological source resulting in contamination in Goiania, Brazil. These civilian examples of radioactive material releases provided some of the first examples of urban radiological remediation. Many emerging technologies have recently been developed and demonstrated in Japan following the release of radioactive cesium isotopes (Cs-134 and Cs-137) from the Fukushima Dai-ichi nuclear power plant in 2011. Information on technologies reported by several Japanese government agencies, such as the Japan Atomic Energy Agency (JAEA), the Ministry of the Environment (MOE) and the National Institute for Environmental Science (NIES), together with academic institutions and industry are summarized and compared to recently developed, deployed and available technologies in the United States. The technologies and techniques presented in this report may be deployed in response to a wide area contamination event in the United States. In some cases, additional research and testing is needed to adequately validate the technology effectiveness over wide areas. Survey techniques can be deployed on the ground or from the air, allowing a range of coverage rates and sensitivities. Survey technologies also include those useful in measuring decontamination progress and mapping contamination. Decontamination technologies and techniques range from non-destructive (e.g., high pressure washing) and minimally destructive (plowing), to fully destructive (surface removal or demolition). Waste minimization techniques can greatly impact the long-term environmental consequences and cost following remediation efforts. Recommendations on technical improvements to address technology gaps are presented together with observations on remediation in Japan.

  10. On the design of a Radio Numerology for 5G Wide Area

    DEFF Research Database (Denmark)

    Berardinelli, Gilberto; Pedersen, Klaus Ingemann; Frederiksen, Frank

    2015-01-01

    A 5th Generation (5G) radio access technology is expected to cope with the relentless increase of the data traffic demand and is meant to accommodate a plethora of services with different requirements. In this paper, we elaborate on the design of the radio numerology for a 5G wide area system...... operating at carrier frequencies below 6 GHz. The main requirements are identified, and their inevitable conflicts are addressed. The proposed numerology options enable low latency with tolerable overhead, while maintaining a common clock with the Long Term Evolution (LTE) radio technology and robustness...

  11. Leaf Area Index (LAI Estimation of Boreal Forest Using Wide Optics Airborne Winter Photos

    Directory of Open Access Journals (Sweden)

    Pauline Stenberg

    2009-12-01

    Full Text Available A new simple airborne method based on wide optics camera is developed for leaf area index (LAI estimation in coniferous forests. The measurements are carried out in winter, when the forest floor is completely snow covered and thus acts as a light background for the hemispherical analysis of the images. The photos are taken automatically and stored on a laptop during the flights. The R2 value of the linear regression of the airborne and ground based LAI measurements was 0.89.

  12. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  13. Development of wide-area radiation monitor using an optical fiber

    International Nuclear Information System (INIS)

    Kawata, Naoki; Kato, Masatoshi; Baba, Mamoru; Yamadera, Akira; Miura, Takako

    2002-01-01

    We have developed a method for radiation distribution measurement by combining an optical fiber of wave-length shift type with a plastic scintillator, and studied its properties to apply as a wide-area radiation monitor. The detector employs two photomultipliers in both ends of the fiber and locate the radiation position by using the difference of light arrival time from scintillators. We tested the detector with gamma-rays and neutrons concerning with the position-response and pulse-height response of the detector. From the experiment, we confirmed the proper operation of the detector and position response with spatial resolution of 30-60 cm

  14. Wide area 2D/3D imaging development, analysis and applications

    CERN Document Server

    Langmann, Benjamin

    2014-01-01

    Imaging technology is an important research area and it is widely utilized in a growing number of disciplines ranging from gaming, robotics and automation to medicine. In the last decade 3D imaging became popular mainly driven by the introduction of novel 3D cameras and measuring devices. These cameras are usually limited to indoor scenes with relatively low distances. Benjamin Langmann introduces medium and long-range 2D/3D cameras to overcome these limitations. He reports measurement results for these devices and studies their characteristic behavior. In order to facilitate the application o

  15. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference

  16. Decentralized Gauss-Newton method for nonlinear least squares on wide area network

    Science.gov (United States)

    Liu, Lanchao; Ling, Qing; Han, Zhu

    2014-10-01

    This paper presents a decentralized approach of Gauss-Newton (GN) method for nonlinear least squares (NLLS) on wide area network (WAN). In a multi-agent system, a centralized GN for NLLS requires the global GN Hessian matrix available at a central computing unit, which may incur large communication overhead. In the proposed decentralized alternative, each agent only needs local GN Hessian matrix to update iterates with the cooperation of neighbors. The detail formulation of decentralized NLLS on WAN is given, and the iteration at each agent is defined. The convergence property of the decentralized approach is analyzed, and numerical results validate the effectiveness of the proposed algorithm.

  17. An implementation and test platform for wide area stability assessment methods

    DEFF Research Database (Denmark)

    Wittrock, Martin Lindholm; Jóhannsson, Hjörtur

    2013-01-01

    Units (PMU) can be very time consuming, especially if the testing procedure is not carried out in a systematic and automatic manner. The test platform overcomes this problem by automatically importing system model parameters, topology and simulation output from a time domain simulation of an instability...... scenario and automatically generating synthetic PMU snapshots of the system conditions. To demonstrate the platform’s potential for supporting research and development of wide area algorithms, a method to detect voltage instability is implemented and tested, giving results consistent with results from...

  18. Development of wide area reaction system for Reel-to-Reel TFA-MOD process

    International Nuclear Information System (INIS)

    Nomoto, Sukeharu; Aoki, Yuji; Teranishi, Ryo; Sato, Akihiro; Izumi, Teruo; Shiohara, Yuh

    2006-01-01

    The previously developed numerical simulation method for the TFA-MOD process, which calculated the YBCO growth kinetics, gas element diffusion and gas flow, was applied to study the suitable gas flow mode for a multi-turning Reel-to-Reel tape conveyance system of a long YBCO coated conductors. The high YBCO production rate with uniform J c distribution among tape lines is desired in the system. It was found by the numerical simulation for the vertical gas flow onto the tape surface to realize the above demands even in a wider reaction area. We developed a new wide area reaction tube for the Reel-to-Reel TFA-MOD process according to the numerically designed gas flow configuration. The demand for the new tube was confirmed to be satisfied by experiments

  19. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  20. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  1. An Interference-Aware Traffic-Priority-Based Link Scheduling Algorithm for Interference Mitigation in Multiple Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Thien T. T. Le

    2016-12-01

    Full Text Available Currently, wireless body area networks (WBANs are effectively used for health monitoring services. However, in cases where WBANs are densely deployed, interference among WBANs can cause serious degradation of network performance and reliability. Inter-WBAN interference can be reduced by scheduling the communication links of interfering WBANs. In this paper, we propose an interference-aware traffic-priority-based link scheduling (ITLS algorithm to overcome inter-WBAN interference in densely deployed WBANs. First, we model a network with multiple WBANs as an interference graph where node-level interference and traffic priority are taken into account. Second, we formulate link scheduling for multiple WBANs as an optimization model where the objective is to maximize the throughput of the entire network while ensuring the traffic priority of sensor nodes. Finally, we propose the ITLS algorithm for multiple WBANs on the basis of the optimization model. High spatial reuse is also achieved in the proposed ITLS algorithm. The proposed ITLS achieves high spatial reuse while considering traffic priority, packet length, and the number of interfered sensor nodes. Our simulation results show that the proposed ITLS significantly increases spatial reuse and network throughput with lower delay by mitigating inter-WBAN interference.

  2. Performance of asynchronous transfer mode (ATM) local area and wide area networks for medical imaging transmission in clinical environment.

    Science.gov (United States)

    Huang, H K; Wong, A W; Zhu, X

    1997-01-01

    Asynchronous transfer mode (ATM) technology emerges as a leading candidate for medical image transmission in both local area network (LAN) and wide area network (WAN) applications. This paper describes the performance of an ATM LAN and WAN network at the University of California, San Francisco. The measurements were obtained using an intensive care unit (ICU) server connecting to four image workstations (WS) at four different locations of a hospital-integrated picture archiving and communication system (HI-PACS) in a daily regular clinical environment. Four types of performance were evaluated: magnetic disk-to-disk, disk-to-redundant array of inexpensive disks (RAID), RAID-to-memory, and memory-to-memory. Results demonstrate that the transmission rate between two workstations can reach 5-6 Mbytes/s from RAID-to-memory, and 8-10 Mbytes/s from memory-to-memory. When the server has to send images to all four workstations simultaneously, the transmission rate to each WS is about 4 Mbytes/s. Both situations are adequate for radiologic image communications for picture archiving and communication systems (PACS) and teleradiology applications.

  3. Probing hot-electron effects in wide area plasmonic surfaces using X-ray photoelectron spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Ayas, Sencer; Cupallari, Andi; Dana, Aykutlu, E-mail: aykutlu@unam.bilkent.edu.tr [UNAM Institute of Materials Science and Nanotechnology, Bilkent University, 06800 Ankara (Turkey)

    2014-12-01

    Plasmon enhanced hot carrier formation in metallic nanostructures increasingly attracts attention due to potential applications in photodetection, photocatalysis, and solar energy conversion. Here, hot-electron effects in nanoscale metal-insulator-metal (MIM) structures are investigated using a non-contact X-ray photoelectron spectroscopy based technique using continuous wave X-ray and laser excitations. The effects are observed through shifts of the binding energy of the top metal layer upon excitation with lasers of 445, 532, and 650 nm wavelength. The shifts are polarization dependent for plasmonic MIM grating structures fabricated by electron beam lithography. Wide area plasmonic MIM surfaces fabricated using a lithography free route by the dewetting of evaporated Ag on HfO{sub 2} exhibit polarization independent optical absorption and surface photovoltage. Using a simple model and making several assumptions about the magnitude of the photoemission current, the responsivity and external quantum efficiency of wide area plasmonic MIM surfaces are estimated as 500 nA/W and 11 × 10{sup −6} for 445 nm illumination.

  4. Tsetse flies: their biology and control using area-wide integrated pest management approaches.

    Science.gov (United States)

    Vreysen, Marc J B; Seck, Momar Talla; Sall, Baba; Bouyer, Jérémy

    2013-03-01

    Tsetse flies are the cyclical vectors of trypanosomes, the causative agents of 'sleeping sickness' or human African trypanosomosis (HAT) in humans and 'nagana' or African animal trypanosomosis (AAT) in livestock in Sub-saharan Africa. Many consider HAT as one of the major neglected tropical diseases and AAT as the single greatest health constraint to increased livestock production. This review provides some background information on the taxonomy of tsetse flies, their unique way of reproduction (adenotrophic viviparity) making the adult stage the only one easily accessible for control, and how their ecological affinities, their distribution and population dynamics influence and dictate control efforts. The paper likewise reviews four control tactics (sequential aerosol technique, stationary attractive devices, live bait technique and the sterile insect technique) that are currently accepted as friendly to the environment, and describes their limitations and advantages and how they can best be put to practise in an IPM context. The paper discusses the different strategies for tsetse control i.e. localised versus area-wide and focusses thereafter on the principles of area-wide integrated pest management (AW-IPM) and the phased-conditional approach with the tsetse project in Senegal as a recent example. We argue that sustainable tsetse-free zones can be created on Africa mainland provided certain managerial and technical prerequisites are in place. Copyright © 2012 International Atomic Energy Agency. Published by Elsevier Inc. All rights reserved.

  5. Wide area data replication in an ITER-relevant data environment

    International Nuclear Information System (INIS)

    Centioli, C.; Iannone, F.; Panella, M.; Vitale, V.; Bracco, G.; Guadagni, R.; Migliori, S.; Steffe, M.; Eccher, S.; Maslennikov, A.; Mililotti, M.; Molowny, M.; Palumbo, G.; Carboni, M.

    2005-01-01

    The next generation of tokamak experiments will require a new way of approaching data sharing issues among fusion organizations. In the fusion community, many researchers at different worldwide sites will analyse data produced by International Thermonuclear Experimental Reactor (ITER), wherever it will be built. In this context, an efficient availability of the data in the sites where the computational resources are located becomes a major architectural issue for the deployment of ITER computational infrastructure. The approach described in this paper goes beyond the usual site-centric model mainly devoted to granting access exclusively to experimental data stored at the device sites. To this aim, we propose a new data replication architecture relying on a wide area network, based on a Master/Slave model and on synchronization techniques producing mirrored data sites. In this architecture, data replication will affect large databases (TB) as well as large UNIX-like file systems, using open source-based software components, namely MySQL, as database management system, and RSYNC and BBFTP for data transfer. A test-bed has been set up to evaluate the performance of the software components underlying the proposed architecture. The test-bed hardware layout deploys a cluster of four Dual-Xeon Supermicro each with a raid array of 1 TB. High performance network line (1 Gbit over 400 km) provides the infrastructure to test the components on a wide area network. The results obtained will be thoroughly discussed

  6. Farmer education and organization in the Hawaii area-wide fruit fly pest management program

    International Nuclear Information System (INIS)

    Mau, Ronald F.L.; Sugano, J.S.; Jang, Eric

    2003-01-01

    A critical component of successful area wide pest management (AWPM) programs are organized, coordinated and comprehensive outreach educational programs. The Hawaii area wide fruit fly pest management (HAW-FLYPM) program's educational program, a part of a USDA AWPM program in Hawaii, utilized the 'logic model' approach to organize, plan, execute and evaluate farmer and community educational programs statewide. The logic model approach was an outcome-driven rather than activity based method that employed a linear sequence that developed relationships between program inputs, outputs and outcomes. This model was utilized extensively to transfer sustainable, science-based technologies to suppress tephritid fruit fly pests. HAW-FLYPM's educational program targeted growers and community door yard growers, three teaching curricula aimed at elementary through high school students, and a statewide awareness program for the pubic at large. Additional key components of the HAW-FLYPM education program was the development of implementation schedules used to track program progress, a comprehensive media matrix developed to ensure educational materials met the needs of target audience groups, and a sustainability calculator to assess the likelihood of program sustainability after the initial five year funding cycle. The model served as a 'blue print' for ensuring program elements were planned, delivered and executed on a timely basis. Utilization of the logic model to organize efforts and manage diverse, multi agency programs such as the HAW-FLYPM program has shown to be a successful method of program advancement and outcome achievement. (author)

  7. KOLAM: a cross-platform architecture for scalable visualization and tracking in wide-area imagery

    Science.gov (United States)

    Fraser, Joshua; Haridas, Anoop; Seetharaman, Guna; Rao, Raghuveer M.; Palaniappan, Kannappan

    2013-05-01

    KOLAM is an open, cross-platform, interoperable, scalable and extensible framework supporting a novel multi- scale spatiotemporal dual-cache data structure for big data visualization and visual analytics. This paper focuses on the use of KOLAM for target tracking in high-resolution, high throughput wide format video also known as wide-area motion imagery (WAMI). It was originally developed for the interactive visualization of extremely large geospatial imagery of high spatial and spectral resolution. KOLAM is platform, operating system and (graphics) hardware independent, and supports embedded datasets scalable from hundreds of gigabytes to feasibly petabytes in size on clusters, workstations, desktops and mobile computers. In addition to rapid roam, zoom and hyper- jump spatial operations, a large number of simultaneously viewable embedded pyramid layers (also referred to as multiscale or sparse imagery), interactive colormap and histogram enhancement, spherical projection and terrain maps are supported. The KOLAM software architecture was extended to support airborne wide-area motion imagery by organizing spatiotemporal tiles in very large format video frames using a temporal cache of tiled pyramid cached data structures. The current version supports WAMI animation, fast intelligent inspection, trajectory visualization and target tracking (digital tagging); the latter by interfacing with external automatic tracking software. One of the critical needs for working with WAMI is a supervised tracking and visualization tool that allows analysts to digitally tag multiple targets, quickly review and correct tracking results and apply geospatial visual analytic tools on the generated trajectories. One-click manual tracking combined with multiple automated tracking algorithms are available to assist the analyst and increase human effectiveness.

  8. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  9. A Wireless Sensor Network Based Personnel Positioning Scheme in Coal Mines with Blind Areas

    Science.gov (United States)

    Liu, Zhigao; Li, Chunwen; Wu, Danchen; Dai, Wenhan; Geng, Shaobo; Ding, Qingqing

    2010-01-01

    This paper proposes a novel personnel positioning scheme for a tunnel network with blind areas, which compared with most existing schemes offers both low-cost and high-precision. Based on the data models of tunnel networks, measurement networks and mobile miners, the global positioning method is divided into four steps: (1) calculate the real time personnel location in local areas using a location engine, and send it to the upper computer through the gateway; (2) correct any localization errors resulting from the underground tunnel environmental interference; (3) determine the global three-dimensional position by coordinate transformation; (4) estimate the personnel locations in the blind areas. A prototype system constructed to verify the positioning performance shows that the proposed positioning system has good reliability, scalability, and positioning performance. In particular, the static localization error of the positioning system is less than 2.4 m in the underground tunnel environment and the moving estimation error is below 4.5 m in the corridor environment. The system was operated continuously over three months without any failures. PMID:22163446

  10. A wireless sensor network based personnel positioning scheme in coal mines with blind areas.

    Science.gov (United States)

    Liu, Zhigao; Li, Chunwen; Wu, Danchen; Dai, Wenhan; Geng, Shaobo; Ding, Qingqing

    2010-01-01

    This paper proposes a novel personnel positioning scheme for a tunnel network with blind areas, which compared with most existing schemes offers both low-cost and high-precision. Based on the data models of tunnel networks, measurement networks and mobile miners, the global positioning method is divided into four steps: (1) calculate the real time personnel location in local areas using a location engine, and send it to the upper computer through the gateway; (2) correct any localization errors resulting from the underground tunnel environmental interference; (3) determine the global three-dimensional position by coordinate transformation; (4) estimate the personnel locations in the blind areas. A prototype system constructed to verify the positioning performance shows that the proposed positioning system has good reliability, scalability, and positioning performance. In particular, the static localization error of the positioning system is less than 2.4 m in the underground tunnel environment and the moving estimation error is below 4.5 m in the corridor environment. The system was operated continuously over three months without any failures.

  11. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  12. Simulating Brown hare (Lepus europaeus Pallas dispersion: a tool for wildlife management of wide areas

    Directory of Open Access Journals (Sweden)

    Andrea Amici

    2010-01-01

    Full Text Available The second half of the 20th century was characterised by intense processes of urbanisation, industrialisation and agricultural mechanisation, leading to a fragmentation of the agricultural and forest landscape. This, in turn, reduced the bio-permeability of the territory and affected the dispersion of many wild species. Brown hare (Lepus europeus dispersion is dramatically affected by habitat fragmentation, presence of predators, intense tillage and elevated hunting pressure. Consequently, the only stable populations of hare are often in no-hunting areas where wildlife management is efficient. It is necessary, therefore, to identify not only additional areas suitable for reproduction, but also the most suitable dispersion pathways for hares, in order to optimise management. In the present study, by means of a Geographic Information System (GIS, a deterministic hare suitability model was developed on the basis of a multicriterial approach and fuzzy logic. Subsequently, a friction surface was derived from the suitability map in order to describe the land bio-permeability. Finally, on the basis of species potential, the spread of hares from stable population areas (source areas to the remaining territory was simulated. The area of study was the province of Viterbo (central Italy. The suitability map showed good discrimination ability (ROC=0.705. The hare dispersion simulation map allowed the potential spreading of this species throughout the provincial territory to be analysed. Isolated or less connected zones were highlighted, allowing the distribution of habitat enhancements, and/or the institution of new no-hunting areas devoted to the reproduction and consequent spread of hares throughout the territory, to be localised. The presented flexible and reiterable methodology could prove useful for wildlife management and hunting planning over a wide area. It would thus provide an important contribution to reducing the importance of animal

  13. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  14. Multiagent System-Based Wide-Area Protection and Control Scheme against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2015-01-01

    In this paper, a multi agent system (MAS) based wide area protection and control scheme is proposed to deal with the long term voltage instability induced cascading trips. Based on sensitivity analysis between the relay operation margin and power system state variables, an optimal emergency control...... strategy is defined to adjust the emergency states timely and prevent the unexpected relay trips. In order to supervise the control process and further minimize the load loss, an agent based process control is adopted to monitor the states of distributed controllers and adjust the emergency control...... strategy. A hybrid simulation platform based on LabVIEW and real time digital simulator (RTDS) is set up to simulate a blackout case in the power system of Eastern Denmark and to demonstrate the effectiveness of the proposed MAS based protection strategy....

  15. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-01-01

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters. PMID:26690439

  16. Management of area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Dyck, V.A.; Vreysen, M.J.B.; Reyes Flores, J.; Regidor Fernandez, E.E.; Teruya, T.; Barnes, B.; Gomez Riera, P.; Lindquist, D.; Loosjes, M.

    2005-01-01

    Effective management of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT) is key to success. Programme planning includes collection of baseline data and a feasibility assessment. The optimal management structure is where the programme can be implemented effectively and flexibly, independent of government politics, bureaucracy, and even corruption that impede timely goal achievement. Ideally, programmes include both public and private management, and require strong and steady financial support. Governments and donors are the most common sources of funds, but a mixture of public, community, and private funds is now the trend. Interrupted cash flow severely restrains programme performance. Physical support of programme operations must be reliable, and led by a maintenance professional. It is essential to have full-time, well-paid, and motivated staff led by a programme manger with technical and management experience. Programme failure is usually due to poor management and inadequate public support, and not to poor technology. (author)

  17. Secure wide area network access to CMS analysis data using the Lustre filesystem

    International Nuclear Information System (INIS)

    Bourilkov, D; Avery, P; Cheng, M; Fu, Y; Kim, B; Palencia, J; Budden, R; Benninger, K; Rodriquez, J L; Dilascio, J; Dykstra, D; Seenu, N

    2012-01-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  18. Prospects for the introduction of Wide Area Monitoring Using Environmental Sampling

    International Nuclear Information System (INIS)

    Wogman, N.A.

    2013-01-01

    Nuclear proliferation signatures released to the environment must be collected and distinguished from primordial and man-made backgrounds in soils, sediments, air, and surface and underground water. The delay time between the nuclear proliferation emissions and the date of the Wide-Area Environmental Sampling (WAES) analysis will determine which radionuclides would be analyzed based upon their half-lives. Various sampling and analysis technologies have been considered here for application to a WAES. Sampling procedures and equipment discussed are aimed at aquatic, airborne particulate, gas, vegetation, sediment and/or soil, and fauna media. Specific procedures must be selected based upon the application scenario; for example, sampling in the northern latitudes under freezing conditions, sampling at the equator under tropical rain-forest conditions, sampling in the mid-latitudes under desert conditions, and sampling in the marine environment require different equipment and procedures. The paper is followed by the slides of the presentation

  19. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference

  20. Novel approach for all-optical packet switching in wide-area networks

    Science.gov (United States)

    Chlamtac, Imrich; Fumagalli, Andrea F.; Wedzinga, Gosse

    1998-09-01

    All-optical Wavelength Division Multiplexing (WDM) networks are believed to be a fundamental component in future high speed backbones. However, while wavelength routing made circuit switching in WDM feasible the reality of extant optical technology does not yet provide the necessary devices to achieve individual optical packet switching. This paper proposes to achieve all-optical packet switching in WDM Wide Area Networks (WANs) via a novel technique, called slot routing. Using slot routing, entire slots, each carrying multiple packets on distinct wavelengths, are switched transparently and individually. As a result packets can be optically transmitted and switched in the network using available fast and wavelength non-sensitive devices. The proposed routing technique leads to an optical packet switching solution, that is simple, practical, and unique as it makes it possible to build a WDM all-optical WAN with optical devices based on proven technologies.

  1. Event Based Simulator for Parallel Computing over the Wide Area Network for Real Time Visualization

    Science.gov (United States)

    Sundararajan, Elankovan; Harwood, Aaron; Kotagiri, Ramamohanarao; Satria Prabuwono, Anton

    As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However, not all applications can be executed over the WAN due to communication overhead that can drastically slowdown the computation. In this paper, we introduce an event based simulator to investigate the performance of parallel algorithms executed over the WAN. The event based simulator known as SIMPAR (SIMulator for PARallel computation), simulates the actual computations and communications involved in parallel computation over the WAN using time stamps. Visualization of real time applications require steady stream of processed data flow for visualization purposes. Hence, SIMPAR may prove to be a valuable tool to investigate types of applications and computing resource requirements to provide uninterrupted flow of processed data for real time visualization purposes. The results obtained from the simulation show concurrence with the expected performance using the L-BSP model.

  2. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  3. Midterm Stability Evaluation of Wide-area Power System by using Synchronized Phasor Measurements

    Science.gov (United States)

    Ota, Yutaka; Ukai, Hiroyuki; Nakamura, Koichi; Fujita, Hideki

    In recent years, the PMU (Phasor Measurement Unit) receives a great deal of attention as a synchronized measurement system of power systems. Synchronized phasor angles obtained by the PMU provide the effective information for evaluating the stability of a bulk power system. The aspect of instability phenomena during midterm tends to be more complicated, and the stability analysis using the synchronized phasor measurements is significant in order to keep a complicated power system stable. This paper proposes a midterm stability evaluation method of the wide-area power system by using the synchronized phasor measurements. By clustering and aggregating the power system to some coherent groups, the step-out is effectively predicted on the basis of the two-machine equivalent power system model. The midterm stability of a longitudinal power system model of Japanese 60Hz systems constructed by the PSA, which is a hybrid-type power system simulator, is practically evaluated using the proposed method.

  4. Reflectance of Biological Turbid Tissues under Wide Area Illumination: Single Backward Scattering Approach

    Directory of Open Access Journals (Sweden)

    Guennadi Saiko

    2014-01-01

    Full Text Available Various scenarios of light propagation paths in turbid media (single backward scattering, multiple backward scattering, banana shape are discussed and their contributions to reflectance spectra are estimated. It has been found that a single backward or multiple forward scattering quasi-1D paths can be the major contributors to reflected spectra in wide area illumination scenario. Such a single backward scattering (SBS approximation allows developing of an analytical approach which can take into account refractive index mismatched boundary conditions and multilayer geometry and can be used for real-time spectral processing. The SBS approach can be potentially applied for the distances between the transport and reduced scattering domains. Its validation versus the Kubelka-Munk model, path integrals, and diffusion approximation of the radiation transport theory is discussed.

  5. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    Science.gov (United States)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  6. Strategic options in using sterile insects for area-wide integrated pest management

    International Nuclear Information System (INIS)

    Hendrichs, J.; Vreysen, M.J.B.; Enkerlin, W.R.; Cayol, J.P.

    2005-01-01

    The four strategic options, 'suppression', 'eradication', 'containment' and 'prevention', in which the sterile insect technique (SIT) can be deployed as part of area-wide integrated pest management (AW-IPM) interventions, are defined and described in relation to the contexts in which they are applied against exotic or naturally occurring major insect pests. Advantages and disadvantages of these strategic options are analysed, and examples of successful programmes provided. Considerations of pest status, biology and distribution affecting decision-making in relation to strategy selection are reviewed and discussed in terms of feasibility assessment, and programme planning and implementation. Unrealistic expectations are often associated with applying the SIT, resulting in high political costs to change a strategy during implementation. The choice of strategy needs to be assessed carefully, and considerable baseline data obtained to prepare for the selected strategy, before embarking on an AW-IPM programme with an SIT component. (author)

  7. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones.

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-12-10

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  8. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Directory of Open Access Journals (Sweden)

    Jing Chen

    2015-12-01

    Full Text Available Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  9. TWENTIES Project. Wind power for wide-area control of the grid

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Juan Carlos; Combarros, Clara; Veguillas, Roberto; Hermosa, Mikel Joseba [Iberdrola Renovables, Madrid (Spain); Rubio, David [Iberdrola Ingenieria y Construccion (Spain); Egido, Ignacio [Comillas Univ. (ES). Inst. de Investigacion Tecnologica (IIT)

    2011-07-01

    Europe faces a great challenge with the 2020 scenario in which the renewable energy installed capacity in Europe should increase from its present value of approximately 80 GW to 230 GW in 2020. The future high penetration levels of wind and other renewable energies in the power system require decision makers and stakeholders of the electrical sector to work together to develop new ancillary services and to make the necessary changes to the grid infrastructure in Europe. This background is in line with the SYSERWIND demonstration lead by Iberdrola Renovables and included in the TWENTIES project, with three more partners taking part in this package: Red Electrica de Espana (REE), IIT and Gamesa Eolica. This paper introduces a first phase of preliminary work to define, install and test a Secondary Frequency Control and a Voltage Management System in a wide area, along a transport line. (orig.)

  10. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives

    International Nuclear Information System (INIS)

    Kaminski, Michael D.; Lee, Sang Don; Magnuson, Matthew

    2016-01-01

    Highlights: • We review wide area, urban decontamination techniques for rapid response. • We examine historical data and its application to radiological terrorism scenario. • Data is insufficient to ensure a detailed, organized mitigation response. • Primary deficit is lessons-learned and relations to extrapolate a limited data set. • Research is needed to model a mitigation response and help guide data gathering. - Abstract: Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials – specifically hard, porous, external surfaces – is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each

  11. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Kaminski, Michael D., E-mail: Kaminski@anl.gov [Nuclear Decontamination and Separations, Nuclear Engineering Division, Argonne National Laboratory (United States); Lee, Sang Don; Magnuson, Matthew [US Environmental Protection Agency, Office of Research and Development, National Homeland Security Research Center (United States)

    2016-03-15

    Highlights: • We review wide area, urban decontamination techniques for rapid response. • We examine historical data and its application to radiological terrorism scenario. • Data is insufficient to ensure a detailed, organized mitigation response. • Primary deficit is lessons-learned and relations to extrapolate a limited data set. • Research is needed to model a mitigation response and help guide data gathering. - Abstract: Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials – specifically hard, porous, external surfaces – is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each

  12. Grid-optimized Web 3D applications on wide area network

    Science.gov (United States)

    Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

    2008-08-01

    Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

  13. Impact of the error sensing probability in wide coverage areas of clustered-based wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Edgar Romo-Montiel

    2016-01-01

    Full Text Available Las redes inalámbricas de sensores están compuestas por un gran número de nodos autónomos que vigilan algún parámetro del ambiente de interés, como puede ser la temperatura, la humedad o incluso objetivos móviles. Este trabajo se enfoca en la detección de móviles en áreas amplias como puede ser la vigilancia de animales en un bosque o la detección de vehículos en misiones de seguridad. Específicamente, se propone, analiza y estudia un protocolo de agrupación de bajo consumo de energía. Para ello, se presentan dos esquemas de comunicaciones basados en el bien conocido protocolo LEACH. El desempeño del sistema se estudia por medio de un modelo matemático que describe el comportamiento de la red bajo los parámetros más relevantes, como son: radio de cobertura, radio de transmisión y número de nodos en la red. Adicionalmente, se estudia la probabilidad de transmisión en la fase de formación de grupos bajo consideraciones realistas de un canal inalámbrico, en donde la detección de la señal tiene errores debido a la interferencia y ruido en el canal de acceso

  14. Cost-benefit analysis model: A tool for area-wide fruit fly management. Procedures manual

    International Nuclear Information System (INIS)

    Enkerlin, W.; Mumford, J.; Leach, A.

    2007-03-01

    The Generic Fruit Fly Cost-Benefit Analysis Model assists in economic decision making associated with area-wide fruit fly control options. The FRUIT FLY COST-BENEFIT ANALYSIS PROGRAM (available on 1 CD-ROM from the Joint FAO/IAEA Programme of Nuclear Techniques in Food and Agriculture) is an Excel 2000 Windows based program, for which all standard Windows and Excel conventions apply. The Model is user friendly and thus largely self-explanatory. Nevertheless, it includes a procedures manual that has been prepared to guide the user, and thus should be used together with the software. Please note that the table presenting the pest management options in the Introductory Page of the model is controlled by spin buttons and click boxes. These controls are linked to macros that hide non relevant tables and boxes. N.B. it is important that the medium level of security is selected from the Tools menu of Excel, to do this go to Tools|Macros|Security| and select Medium. When the file is opened a form will appear containing three buttons, click on the middle button, 'Enable Macros', so that the macros may be used. Ideally the model should be used as a support tool by working groups aiming at assessing the economic returns of different fruit fly control options (suppression, eradication, containment and prevention). The working group should include professionals in agriculture with experience in area-wide implementation of integrated pest management programmes, an economist or at least someone with basic knowledge in economics, and if relevant, an entomologist with some background in the application of the sterile insect technique (SIT)

  15. Data transmission techniques for short-range optical fiber and wireless communication links

    DEFF Research Database (Denmark)

    Pham, Tien Thang

    The research work described in this thesis is devoted to experimental investigation of techniques for cost-effective high-speed optical communications supporting both wired and wireless services. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high......-speed optical/wireless integration and advanced modulation formats for intensity modulation with direct detection (IM/DD) optical systems. Regarding optical/wireless integration, this thesis focuses on integration of broadband ultra-wide band (UWB) and 60-GHz band wireless systems into optical fiber access...... networks to distribute wireless services in personal area networks (PANs). Photonic technologies to generate and distribute gigabit UWB and 60-GHz-band signals are proposed and demonstrated. Two novel methods are proposed and demonstrated to optically generate Federal Communications Commission (FCC...

  16. Ground target geolocation based on digital elevation model for airborne wide-area reconnaissance system

    Science.gov (United States)

    Qiao, Chuan; Ding, Yalin; Xu, Yongsen; Xiu, Jihong

    2018-01-01

    To obtain the geographical position of the ground target accurately, a geolocation algorithm based on the digital elevation model (DEM) is developed for an airborne wide-area reconnaissance system. According to the platform position and attitude information measured by the airborne position and orientation system and the gimbal angles information from the encoder, the line-of-sight pointing vector in the Earth-centered Earth-fixed coordinate frame is solved by the homogeneous coordinate transformation. The target longitude and latitude can be solved with the elliptical Earth model and the global DEM. The influences of the systematic error and measurement error on ground target geolocation calculation accuracy are analyzed by the Monte Carlo method. The simulation results show that this algorithm can improve the geolocation accuracy of ground target in rough terrain area obviously. The geolocation accuracy of moving ground target can be improved by moving average filtering (MAF). The validity of the geolocation algorithm is verified by the flight test in which the plane flies at a geodetic height of 15,000 m and the outer gimbal angle is <47°. The geolocation root mean square error of the target trajectory is <45 and <7 m after MAF.

  17. Enabling technologies to improve area-wide integrated pest management programmes for the control of screwworms.

    Science.gov (United States)

    Robinson, A S; Vreysen, M J B; Hendrichs, J; Feldmann, U

    2009-06-01

    The economic devastation caused in the past by the New World screwworm fly Cochliomyia hominivorax (Coquerel) (Diptera: Calliphoridae) to the livestock industry in the U.S.A., Mexico and the rest of Central America was staggering. The eradication of this major livestock pest from North and Central America using the sterile insect technique (SIT) as part of an area-wide integrated pest management (AW-IPM) programme was a phenomenal technical and managerial accomplishment with enormous economic implications. The area is maintained screwworm-free by the weekly release of 40 million sterile flies in the Darien Gap in Panama, which prevents migration from screwworm-infested areas in Columbia. However, the species is still a major pest in many areas of the Caribbean and South America and there is considerable interest in extending the eradication programme to these countries. Understanding New World screwworm fly populations in the Caribbean and South America, which represent a continuous threat to the screwworm-free areas of Central America and the U.S.A., is a prerequisite to any future eradication campaigns. The Old World screwworm fly Chrysomya bezziana Villeneuve (Diptera: Calliphoridae) has a very wide distribution ranging from Southern Africa to Papua New Guinea and, although its economic importance is assumed to be less than that of its New World counterpart, it is a serious pest in extensive livestock production and a constant threat to pest-free areas such as Australia. In the 1980s repeated introductions and an expansion of Old World screwworm populations were reported in the Middle East; in the 1990s it invaded Iraq and since late 2007 it has been reported in Yemen, where a severe outbreak of myiasis occurred in 2008. Small-scale field trials have shown the potential of integrating the SIT in the control of this pest and various international organizations are considering using the release of sterile insects as part of an AW-IPM approach on a much wider scale

  18. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  19. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  20. Leaf Area Index Estimation Using Chinese GF-1 Wide Field View Data in an Agriculture Region.

    Science.gov (United States)

    Wei, Xiangqin; Gu, Xingfa; Meng, Qingyan; Yu, Tao; Zhou, Xiang; Wei, Zheng; Jia, Kun; Wang, Chunmei

    2017-07-08

    Leaf area index (LAI) is an important vegetation parameter that characterizes leaf density and canopy structure, and plays an important role in global change study, land surface process simulation and agriculture monitoring. The wide field view (WFV) sensor on board the Chinese GF-1 satellite can acquire multi-spectral data with decametric spatial resolution, high temporal resolution and wide coverage, which are valuable data sources for dynamic monitoring of LAI. Therefore, an automatic LAI estimation algorithm for GF-1 WFV data was developed based on the radiative transfer model and LAI estimation accuracy of the developed algorithm was assessed in an agriculture region with maize as the dominated crop type. The radiative transfer model was firstly used to simulate the physical relationship between canopy reflectance and LAI under different soil and vegetation conditions, and then the training sample dataset was formed. Then, neural networks (NNs) were used to develop the LAI estimation algorithm using the training sample dataset. Green, red and near-infrared band reflectances of GF-1 WFV data were used as the input variables of the NNs, as well as the corresponding LAI was the output variable. The validation results using field LAI measurements in the agriculture region indicated that the LAI estimation algorithm could achieve satisfactory results (such as R² = 0.818, RMSE = 0.50). In addition, the developed LAI estimation algorithm had potential to operationally generate LAI datasets using GF-1 WFV land surface reflectance data, which could provide high spatial and temporal resolution LAI data for agriculture, ecosystem and environmental management researches.

  1. Transient stability enhancement of modern power grid using predictive Wide-Area Monitoring and Control

    Science.gov (United States)

    Yousefian, Reza

    This dissertation presents a real-time Wide-Area Control (WAC) designed based on artificial intelligence for large scale modern power systems transient stability enhancement. The WAC using the measurements available from Phasor Measurement Units (PMUs) at generator buses, monitors the global oscillations in the system and optimally augments the local excitation system of the synchronous generators. The complexity of the power system stability problem along with uncertainties and nonlinearities makes the conventional modeling non-practical or inaccurate. In this work Reinforcement Learning (RL) algorithm on the benchmark of Neural Networks (NNs) is used to map the nonlinearities of the system in real-time. This method different from both the centralized and the decentralized control schemes, employs a number of semi-autonomous agents to collaborate with each other to perform optimal control theory well-suited for WAC applications. Also, to handle the delays in Wide-Area Monitoring (WAM) and adapt the RL toward the robust control design, Temporal Difference (TD) is proposed as a solver for RL problem or optimal cost function. However, the main drawback of such WAC design is that it is challenging to determine if an offline trained network is valid to assess the stability of the power system once the system is evolved to a different operating state or network topology. In order to address the generality issue of NNs, a value priority scheme is proposed in this work to design a hybrid linear and nonlinear controllers. The algorithm so-called supervised RL is based on mixture of experts, where it is initialized by linear controller and as the performance and identification of the RL controller improves in real-time switches to the other controller. This work also focuses on transient stability and develops Lyapunov energy functions for synchronous generators to monitor the stability stress of the system. Using such energies as a cost function guarantees the convergence

  2. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  3. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  4. Finding Waves: Techniques for a Successful Wireless Site Survey

    Science.gov (United States)

    Shanafelt, Michael

    2004-01-01

    Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…

  5. Performance analysis of data retrieval in wireless sensor networks

    NARCIS (Netherlands)

    Mitici, M.A.

    2015-01-01

    Wireless sensor networks are currently revolutionizing the way we live, work, and interact with the surrounding environment. Due to their ease of deployment, cost effectiveness and versatile functionality, sensors are employed in a wide range of areas such as environmental monitoring, surveillance

  6. Wide area measurement system for smart grid applications involving hybrid energy sources

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mahmoud M.; Moussa, Heba B.; Mohammed, Osama A. [Florida International University, Energy Systems Research Laboratory, Department of Electrical and Computer Engineering, Miami, FL (United States)

    2012-03-15

    This paper presents a model and experimental verification for a complete scenario of a proposed wide area measurement system (WAMS) based on synchronized phasor measurement units (PMUs). The proposed system is feasible for hybrid smart ac/dc power networks; such as grid-connected PV-power plants. The purpose is to increase the overall system reliability for all power stages via significant dependence on WAMS as distributed intelligence agents with improved monitoring, protection, and control capabilities of the power networks. The developed system is simulated in the Matlab/Simulink environment. The system was tested under two different cases; normal operation and fault state. Furthermore, the proposed WAMS was experimentally validated with results obtained from a reduced scale setup which built and tested in the laboratory based on the Hardware-in-the-loop concept. It was verified that the power system status can be easily monitored and controlled in real time by using the measured bus data in real time. This improves the overall system reliability and avoids cascaded blackout during fault occurrence. The simulation and experimental results confirm the validity of the proposed WAMS technology for smart grid applications. (orig.)

  7. Sterile insect technique. Principles and practice in area-wide integrated pest management

    International Nuclear Information System (INIS)

    Dyck, V.A.; Hendrichs, J.; Robinson, A.S.

    2005-01-01

    For several major insect pests, the environment-friendly sterile insect technique (SIT) is being applied as a component of area-wide integrated pest management (AW-IPM) programmes. This technology, using radiation to sterilize insects, was first developed in the USA, and is currently applied on six continents. For four decades it has been a major subject for research and development in the Joint FAO/IAEA Programme on Nuclear Techniques in Food and Agriculture, involving both research and the transfer of this technology to Member States so that they can benefit from improved plant, animal and human health, cleaner environments, increased production of plants and animals in agricultural systems, and accelerated economic development. The socio-economic impacts of AW-IPM programmes that integrate the SIT have confirmed the usefulness of this technology. Numerous publications related to the integration of the SIT in pest management programmes, arising from research, coordinated research projects, field projects, symposia, meetings, and training activities have already provided much information to researchers, pest-control practitioners, programme managers, plant protection and animal health officers, and policy makers. However, by bringing together and presenting in a generic fashion the principles, practice, and global application of the SIT, this book will be a major reference source for all current and future users of the technology. The book will also serve as a textbook for academic courses on integrated pest management. Fifty subject experts from 19 countries contributed to the chapters, which were all peer reviewed before final editing

  8. Monitoring sterile and wild insects in area-wide integrated pest management programmes

    International Nuclear Information System (INIS)

    Vreysen, M.J.B.

    2005-01-01

    Insect pest control programmes, which integrate the release of sterile insects, can be efficient only if the released insects have an optimal biological quality. Frequent monitoring of the quality of reared insects after being released in the field is an important but often neglected component of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT). Parameters of sterile insects, which should be monitored regularly, are sexual competitiveness of the released insects, and related components, e.g. survival, mobility, dispersal characteristics, and spatial occupation of the habitat. A well-balanced monitoring programme will, at any given time, provide essential feedback on the progress being made. This information is prerequisite to efficient implementation of the release and cost-efficient use of sterile insects. The type of monitoring to be done will be determined largely by the particular biology of the target insect species. The most important parameter in relation to the release of sterile insects is the rate of sterility induced in the wild insect pest population; it will provide the best evidence that any observed changes, e.g. in the density of the target insect, are caused by the release of sterile insects. (author)

  9. Analysis of RDSS positioning accuracy based on RNSS wide area differential technique

    Science.gov (United States)

    Xing, Nan; Su, RanRan; Zhou, JianHua; Hu, XiaoGong; Gong, XiuQiang; Liu, Li; He, Feng; Guo, Rui; Ren, Hui; Hu, GuangMing; Zhang, Lei

    2013-10-01

    The BeiDou Navigation Satellite System (BDS) provides Radio Navigation Service System (RNSS) as well as Radio Determination Service System (RDSS). RDSS users can obtain positioning by responding the Master Control Center (MCC) inquiries to signal transmitted via GEO satellite transponder. The positioning result can be calculated with elevation constraint by MCC. The primary error sources affecting the RDSS positioning accuracy are the RDSS signal transceiver delay, atmospheric trans-mission delay and GEO satellite position error. During GEO orbit maneuver, poor orbit forecast accuracy significantly impacts RDSS services. A real-time 3-D orbital correction method based on wide-area differential technique is raised to correct the orbital error. Results from the observation shows that the method can successfully improve positioning precision during orbital maneuver, independent from the RDSS reference station. This improvement can reach 50% in maximum. Accurate calibration of the RDSS signal transceiver delay precision and digital elevation map may have a critical role in high precise RDSS positioning services.

  10. Genetic methods for area-wide management of Lepidopterous pests with emphasis on F1 sterility

    International Nuclear Information System (INIS)

    Ocampo, V.R.

    1996-01-01

    Enormous losses in the production and marketing of food and fiber are caused by larvae of Lepidoptera. Currently, large quantities of insecticides are used to combat these pests. Insecticide resistance, increasing concern over pesticide pollution, and the desire to effectively manage lepidopteran pests on an area-wide basis have motivated scientists to identify and develop new pest management tactics that are compatible with current IPM. Genetic methods have emerged as a promising control strategy for lepidopteran pests. Genetic control as a practical means of pest management was first successfully implemented by Knipling and colleagues in the USA during the 1960's with the sterile insect technique (SIT) program for the screwworm fly. SIT is not a readily adapted for use against Lepidoptera as against Diptera. Radiation-induced inherited sterility (or F 1 sterility) is generally considered the most promising genetic methods for large-scale suppression of lepidopteran populations. This papers discusses four genetic control methods that have been developed and the progress that has been made in integrating sterility with other IPM tactics. (author)

  11. Wide Area Network Access to CMS Data Using the Lustre Filesystem

    CERN Document Server

    Rodríguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P

    2009-01-01

    In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...

  12. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  13. Experiments and Analyses of Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Sen, Satyabrata [ORNL; Hanley, Jesse A. [ORNL; Foster, Ian [University of Chicago; Kettimuthu, R. [Argonne National Laboratory (ANL); Wu, Qishi [University of Memphis; Yun, Daqing [Harrisburg University; Towsley, Don [University of Massachusetts, Amherst; Vardoyan, Gayane [University of Massachusetts, Amherst

    2017-08-01

    Dedicated wide-area network connections are increasingly employed in high-performance computing and big data scenarios. One might expect the performance and dynamics of data transfers over such connections to be easy to analyze due to the lack of competing traffic. However, non-linear transport dynamics and end-system complexities (e.g., multi-core hosts and distributed filesystems) can in fact make analysis surprisingly challenging. We present extensive measurements of memory-to-memory and disk-to-disk file transfers over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory-to-memory transfers, profiles of both TCP and UDT throughput as a function of RTT show concave and convex regions; large buffer sizes and more parallel flows lead to wider concave regions, which are highly desirable. TCP and UDT both also display complex throughput dynamics, as indicated by their Poincare maps and Lyapunov exponents. For disk-to-disk transfers, we determine that high throughput can be achieved via a combination of parallel I/O threads, parallel network threads, and direct I/O mode. Our measurements also show that Lustre filesystems can be mounted over long-haul connections using LNet routers, although challenges remain in jointly optimizing file I/O and transport method parameters to achieve peak throughput.

  14. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  15. Frequency Monitoring and Control during Power System Restoration Based on Wide Area Measurement System

    Directory of Open Access Journals (Sweden)

    Saber Nourizadeh

    2011-01-01

    Full Text Available Frequency control during power system restoration has not been strongly addressed. Operators are often concerned with the offline sizing of load and generation steps, but, nowadays, the introduction of Wide Area Measurement System (WAMS makes it possible to monitor the stability of power system online. The constraints of WAMS operation result in some changes in power system frequency control. This paper proposes a novel methodology for frequency control and monitoring during the early steps of power system restoration based on WAMS. Detailed load modeling is achieved based on the static load modeling approach. Power generators' modeling is also accomplished utilizing the single machine equivalent of the power system based on PMU measurements. Simulation results of the presented methodology on the 39 bus New England power system clearly show the effectiveness and applicability of the proposed method. The simulation results show that the presented approach has a completely acceptable precision and an outstanding speed with less than 0.05% error. The outstanding speed of the presented approach along with the result precision will result in a great promotion in power system restoration methodologies.

  16. Radiation distribution measurement using plastic scintillating optical fibers for survey of radioactive contamination in wide area

    International Nuclear Information System (INIS)

    Ito, Chikara; Ito, Keisuke; Ishikawa, Takashi; Yoshida, Akihiro; Sanada, Yukihisa; Torii, Tatsuo; Nohtomi, Akihiro; Wakabayashi, Genichiro; Miyazaki, Nobuyuki

    2013-01-01

    It is important to examine distribution of environmental contamination due to the accident of Fukushima Daiichi Nuclear Power Station and to confirm the effect of decontamination works. We have applied radiation distribution measurement using plastic scintillating optical fibers (PSFs) in the survey of contamination in wide area including residential, farmland, forests, etc. In the measurements system, two scintillation lights that emitted at an incidence of a radiation transmit to photomultiplier tubes at the both end of PSFs. The position where scintillation light emitted is obtained from the detection time difference of each photomultiplier tube. The distribution of light emission quantity indicates the distribution of radiation incident in a PSF which is corresponds to the distribution of dose-rate. The radiation detection system using the PSFs has been applied to the radiation distribution measurement on grounds, trees, etc. The results show a good agreement with point data measured by survey meters using sodium iodide scintillators. As the PSFs which have water resistance, they have been successfully applied to the radiation distribution measurement in the river. We have also succeeded in measuring two-dimensional distribution of radiation by measuring the count rate while moving to the fiber at a constant speed. (author)

  17. Time-Dependent Statistical Analysis of Wide-Area Time-Synchronized Data

    Directory of Open Access Journals (Sweden)

    A. R. Messina

    2010-01-01

    Full Text Available Characterization of spatial and temporal changes in the dynamic patterns of a nonstationary process is a problem of great theoretical and practical importance. On-line monitoring of large-scale power systems by means of time-synchronized Phasor Measurement Units (PMUs provides the opportunity to analyze and characterize inter-system oscillations. Wide-area measurement sets, however, are often relatively large, and may contain phenomena with differing temporal scales. Extracting from these measurements the relevant dynamics is a difficult problem. As the number of observations of real events continues to increase, statistical techniques are needed to help identify relevant temporal dynamics from noise or random effects in measured data. In this paper, a statistically based, data-driven framework that integrates the use of wavelet-based EOF analysis and a sliding window-based method is proposed to identify and extract, in near-real-time, dynamically independent spatiotemporal patterns from time synchronized data. The method deals with the information in space and time simultaneously, and allows direct tracking and characterization of the nonstationary time-frequency dynamics of oscillatory processes. The efficiency and accuracy of the developed procedures for extracting localized information of power system behavior from time-synchronized phasor measurements of a real event in Mexico is assessed.

  18. From rainfall to slope instability: an automatic GIS procedure for susceptibility analyses over wide areas

    Directory of Open Access Journals (Sweden)

    Bianca Federici

    2015-07-01

    Full Text Available The paper proposes an automatic procedure in geographic information system (GIS for the analysis and prediction of landslides due to rainfall events over wide areas. It runs, for each unit cell, a hydrological balance based on the Curve Number method (USDA-SCS 1985–1986, computing the evolution of groundwater as a result of precipitation and then checks the overcoming, or not, of limit equilibrium conditions of the land in the domain of interest. The mathematical model was implemented in the free and open source GIS GRASS. For any sequence of consecutive days of rain, according to the conditions of soil moisture prior to the time history under study, the hydro-geotechnical model allows (1 the determination of the oscillations of the phreatic table, (2 the part of saturated soil and (3 the slope stability analysis, by taking into proper account the pore pressures buildup. The results of this procedure are returned in raster format, allowing an easy and intuitive interpretation of the land mass sensitivity to meteoric actions. The suggested procedure was applied on an extensive kinematic phenomenon surrounding the city of Santo Stefano d’Aveto (Liguria, Italy. The realized maps of landslide susceptibility are in excellent agreement with what is evident on site.

  19. Comparison of adaptive critic-based and classical wide-area controllers for power systems.

    Science.gov (United States)

    Ray, Swakshar; Venayagamoorthy, Ganesh Kumar; Chaudhuri, Balarko; Majumder, Rajat

    2008-08-01

    An adaptive critic design (ACD)-based damping controller is developed for a thyristor-controlled series capacitor (TCSC) installed in a power system with multiple poorly damped interarea modes. The performance of this ACD computational intelligence-based method is compared with two classical techniques, which are observer-based state-feedback (SF) control and linear matrix inequality LMI-H(infinity) robust control. Remote measurements are used as feedback signals to the wide-area damping controller for modulating the compensation of the TCSC. The classical methods use a linearized model of the system whereas the ACD method is purely measurement-based, leading to a nonlinear controller with fixed parameters. A comparative analysis of the controllers' performances is carried out under different disturbance scenarios. The ACD-based design has shown promising performance with very little knowledge of the system compared to classical model-based controllers. This paper also discusses the advantages and disadvantages of ACDs, SF, and LMI-H(infinity).

  20. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives.

    Science.gov (United States)

    Kaminski, Michael D; Lee, Sang Don; Magnuson, Matthew

    2016-03-15

    Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials - specifically hard, porous, external surfaces - is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each technique permit only very preliminary estimates of decontamination factors for various building materials and methods and extrapolation of those values for use in environments outside the EU and UK. This data shortage prevents us from developing an effective and detailed mitigation response plan and remediation effort. Perhaps most importantly, while the data available does include valuable information on the practical aspects of performing

  1. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    Science.gov (United States)

    2015-06-01

    CONFABULATION BASED REAL-TIME ANOMALY DETECTION FOR WIDE-AREA SURVEILLANCE USING HETEROGENEOUS HIGH PERFORMANCE COMPUTING ARCHITECTURE SYRACUSE...DETECTION FOR WIDE-AREA SURVEILLANCE USING HETEROGENEOUS HIGH PERFORMANCE COMPUTING ARCHITECTURE 5a. CONTRACT NUMBER FA8750-12-1-0251 5b. GRANT...processors including graphic processor units (GPUs) and Intel Xeon Phi processors. Experimental results showed significant speedups, which can enable

  2. Power system low frequency oscillation mode estimation using wide area measurement systems

    Directory of Open Access Journals (Sweden)

    Papia Ray

    2017-04-01

    Full Text Available Oscillations in power systems are triggered by a wide variety of events. The system damps most of the oscillations, but a few undamped oscillations may remain which may lead to system collapse. Therefore low frequency oscillations inspection is necessary in the context of recent power system operation and control. Ringdown portion of the signal provides rich information of the low frequency oscillatory modes which has been taken into analysis. This paper provides a practical case study in which seven signal processing based techniques i.e. Prony Analysis (PA, Fast Fourier Transform (FFT, S-Transform (ST, Wigner-Ville Distribution (WVD, Estimation of Signal Parameters by Rotational Invariance Technique (ESPRIT, Hilbert-Huang Transform (HHT and Matrix Pencil Method (MPM were presented for estimating the low frequency modes in a given ringdown signal. Preprocessing of the signal is done by detrending. The application of the signal processing techniques is illustrated using actual wide area measurement systems (WAMS data collected from four different Phasor Measurement Unit (PMU i.e. Dadri, Vindyachal, Kanpur and Moga which are located near the recent disturbance event at the Northern Grid of India. Simulation results show that the seven signal processing technique (FFT, PA, ST, WVD, ESPRIT, HHT and MPM estimates two common oscillatory frequency modes (0.2, 0.5 from the raw signal. Thus, these seven techniques provide satisfactory performance in determining small frequency modes of the signal without losing its valuable property. Also a comparative study of the seven signal processing techniques has been carried out in order to find the best one. It was found that FFT and ESPRIT gives exact frequency modes as compared to other techniques, so they are recommended for estimation of low frequency modes. Further investigations were also carried out to estimate low frequency oscillatory mode with another case study of Eastern Interconnect Phasor Project

  3. Accelerometer-based wireless body area network to estimate intensity of therapy in post-acute rehabilitation

    Directory of Open Access Journals (Sweden)

    Hamel Mathieu

    2008-09-01

    Full Text Available Abstract Background It has been suggested that there is a dose-response relationship between the amount of therapy and functional recovery in post-acute rehabilitation care. To this day, only the total time of therapy has been investigated as a potential determinant of this dose-response relationship because of methodological and measurement challenges. The primary objective of this study was to compare time and motion measures during real life physical therapy with estimates of active time (i.e. the time during which a patient is active physically obtained with a wireless body area network (WBAN of 3D accelerometer modules positioned at the hip, wrist and ankle. The secondary objective was to assess the differences in estimates of active time when using a single accelerometer module positioned at the hip. Methods Five patients (77.4 ± 5.2 y with 4 different admission diagnoses (stroke, lower limb fracture, amputation and immobilization syndrome were recruited in a post-acute rehabilitation center and observed during their physical therapy sessions throughout their stay. Active time was recorded by a trained observer using a continuous time and motion analysis program running on a Tablet-PC. Two WBAN configurations were used: 1 three accelerometer modules located at the hip, wrist and ankle (M3 and 2 one accelerometer located at the hip (M1. Acceleration signals from the WBANs were synchronized with the observations. Estimates of active time were computed based on the temporal density of the acceleration signals. Results A total of 62 physical therapy sessions were observed. Strong associations were found between WBANs estimates of active time and time and motion measures of active time. For the combined sessions, the intraclass correlation coefficient (ICC was 0.93 (P ≤ 0.001 for M3 and 0.79 (P ≤ 0.001 for M1. The mean percentage of differences between observation measures and estimates from the WBAN of active time was -8.7% ± 2.0% using

  4. EMULACIÓN DE ESCENARIOS VIRTUALES, EN UNA SDWLAN (SOFTWARE DEFINED WIRELESS LOCAL AREA NETWORK, DE UN CAMPUS UNIVERSITARIO

    Directory of Open Access Journals (Sweden)

    Gerlyn Duarte

    2015-07-01

    Full Text Available Las redes definidas por software (SDN = Software Defined Network es una arquitectura de red emergente que se destaca como una tecnología capaz de ofrecer un control más flexible y dinámico a la hora de gestionar el diseño y funciones de la red, donde se separan los planos de control y enrutamiento. Esto permite la centralización de los controles de la red basada en software. Se puede decir que es posible tener flexibilidad y rapidez al momento de configurar, implementar y administrar diferentes protocolos personalizados para los requerimientos de distintas redes. Actualmente, en una red convencional, cada conmutador y/o enrutador tienen software propietario que le dice qué hacer. SDN se centra principalmente en la parte cableada de la red de datos. Sin embargo, todas las ventajas de las SDN sólo se obtienen si se logra abarcar la totalidad de la infraestructura, desde el centro de datos al extremo de la red, permitiendo extender todos los beneficios de SDN hasta la red inalámbrica, para conseguir a su vez una red inalámbrica de área local definida por software (SDWLAN = Software Define Wireless Local Area Network. Es por ello que en el presente trabajo, se emuló parte de una SDWLAN de un campus universitario para observar la factibilidad de implementar SDN en la misma. Para la emulación se utilizó una variante del emulador Mininet que permite trabajar con redes inalámbricas. De igual forma, se efectuaron mediciones del ancho de banda de las SDWLAN emuladas, así como la interconectividad entre ellas. Se evidenció la facilidad y el rendimiento de trabajar con las herramientas de emulación de SDWLAN empleadas, permitiendo de igual forma la estructuración de distintas topologías de SDWLAN. Se comprobó que el emulador, el cual está aún en la fase beta, permite interactuar y ejecutar cualquier proceso como si se ejecutara directamente en un equipo con GNU/Linux de forma eficaz.

  5. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  6. Using wide area differential GPS to improve total system error for precision flight operations

    Science.gov (United States)

    Alter, Keith Warren

    Total System Error (TSE) refers to an aircraft's total deviation from the desired flight path. TSE can be divided into Navigational System Error (NSE), the error attributable to the aircraft's navigation system, and Flight Technical Error (FTE), the error attributable to pilot or autopilot control. Improvement in either NSE or FTE reduces TSE and leads to the capability to fly more precise flight trajectories. The Federal Aviation Administration's Wide Area Augmentation System (WAAS) became operational for non-safety critical applications in 2000 and will become operational for safety critical applications in 2002. This navigation service will provide precise 3-D positioning (demonstrated to better than 5 meters horizontal and vertical accuracy) for civil aircraft in the United States. Perhaps more importantly, this navigation system, which provides continuous operation across large regions, enables new flight instrumentation concepts which allow pilots to fly aircraft significantly more precisely, both for straight and curved flight paths. This research investigates the capabilities of some of these new concepts, including the Highway-In-The Sky (HITS) display, which not only improves FTE but also reduces pilot workload when compared to conventional flight instrumentation. Augmentation to the HITS display, including perspective terrain and terrain alerting, improves pilot situational awareness. Flight test results from demonstrations in Juneau, AK, and Lake Tahoe, CA, provide evidence of the overall feasibility of integrated, low-cost flight navigation systems based on these concepts. These systems, requiring no more computational power than current-generation low-end desktop computers, have immediate applicability to general aviation flight from Cessnas to business jets and can support safer and ultimately more economical flight operations. Commercial airlines may also, over time, benefit from these new technologies.

  7. LPWAN – Low-power Wide-area Network. Communication for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Vladislav Viktorovich Sheshalevich

    2017-07-01

    Full Text Available Recent advances in the field of cheaper sensors and various devices to control the parameters of industrial and household equipment has led to the emergence of new communication technologies, the so-called Internet of things, "machine-to-machine" or M2M technologies. The main feature of these technologies is a network communication of the physical objects without direct human intervention. The specifics of using the Low-power Wide-area Network (LPWAN network for these new communication technologies are considered. The LPWAN technologies have significant prospects for development adding to already traditional technologies such as Wi-Fi and cellular. This very term describes an approach, the communication technologies, characterized by the principles of reducing the connection speed in order to achieve wider range and lower power consumption of end nodes. Based on this concept different companies have built the specific competing systems of communication, such as Sigfox (first LPWAN technology, LoRa (derived from Long Range Ingenu RPMA, Weightless-P, “Strizh” telematics (the Russian analog of Sigfox and others. Each of the systems applies different methods to increase the range of coverage, to lower energy consumption and to use different possibilities for scalability. The principles of functioning of these communication systems are analyzed below. The major attention is paid to describing the very popular LPWAN-technology LoRa as one of the most open technology for practical applications. It is based on the same name radio modulation using its own unique method to broaden a spectrum. The topology and the main components of this network, including the sensor (end device with a radio module, the LoRa gateway and its network architecture are described in detail. Examples are given of the LoRa systems emerging on the domestic market of the Internet of things.

  8. Cost-benefit analysis of an area-wide pest management program to control Asian tiger mosquito in New Jersey

    Science.gov (United States)

    Area-wide pest management (AWPM) is recommended to control urban mosquitoes, such as Aedes albopictus (Asian tiger mosquito), which limit outdoor activities. We conducted a cost-benefit analysis for an AWPM in Mercer and Monmouth counties, New Jersey, as part of a controlled design with matched area...

  9. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  10. Potential for area-wide control or eradication of tsetse flies in Africa

    International Nuclear Information System (INIS)

    Kabayo, J.P.; Feldmann, U.

    2000-01-01

    Tsetse flies (Glossina) are found in Africa over an area, estimated by various authors, of 7-11 million sq. km. The northern limit of this area corresponds closely to the southern edges of the Sahara and Somali Deserts, running along 14 deg. N and extending across the continent from Senegal in the west to Somalia in the east. The southern limit of tsetse distribution corresponds closely to the northern edges of the Kalahari and Namibian Deserts in the west and runs generally at 20-30 deg. S to the east of the continent (Ford and Katondo 1977). This tsetse fly belt covers the following 38 countries (listed below) in which the tsetse flies spread African trypanosomosis, a severe disease that affects man and his domestic livestock, and is among the factors responsible for limiting the pace and extent of development in those countries. The disease is of a major economic importance. Throughout the affected countries within the fly belt, areas that are heavily infested by the tsetse fly are virtually devoid of cattle and other species of domestic livestock. Distribution of livestock in all countries on the African continent where densely infested foci exist is almost exactly the reverse of the distribution of the fly (Finelle 1974, Brunhes et al. 1994). Attempts to control African trypanosomosis date back to the beginning of this century. Several different methods of control, some aimed at the disease-causing organism and other aimed at the vector, were employed (Nagel 1995, Jordan 1986). Until after the Second World War, when insecticides became available for use in tsetse control campaigns, the most widely used control measure against tsetse flies was habitat destruction (involving felling trees and bush-clearing), the elimination of host animals (involving killing of wild game) and, to a certain extent, the use of various trapping devices to catch the flies. The tsetse control campaigns mounted in the 40s, 50s and 60s were invariably extensive 'roll up the country

  11. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  12. DISTANT EARLY WARNING SYSTEM for Tsunamis - A wide-area and multi-hazard approach

    Science.gov (United States)

    Hammitzsch, Martin; Lendholt, Matthias; Wächter, Joachim

    2010-05-01

    system and to extend the CCUI with hazard specific functionality. The presentation covers the DEWS project, the system architecture and the CCUI in conjunction with details of information logistics. The DEWS Wide Area Centre connecting national centres to allow the international communication and warning exchange is presented also. REFERENCES: [1] DEWS, www.dews-online.org [2] OGC, www.opengeospatial.org [3] SWE, www.opengeospatial.org/projects/groups/sensorweb [4] Eclipse RCP, www.eclipse.org/home/categories/rcp.php [5] uDig, udig.refractions.net [6] WMS, www.opengeospatial.org/standards/wms [7] WFS, www.opengeospatial.org/standards/wfs [8] WPS, www.opengeospatial.org/standards/wps [9] OASIS, www.oasis-open.org [10] CAP, www.oasis-open.org/specs/#capv1.1 [11] EDXL-DE, www.oasis-open.org/specs/#edxlde-v1.0 [12] SOAP, www.w3.org/TR/soap [13] GITEWS (German Indonesian Tsunami Early Warning System) is a project of the German Federal Government to aid the recon¬struction of the tsunami-prone Indian Ocean region, www.gitews.org [14] The Tsunami Service Bus is the GITEWS sensor system integration platform offering standardised services for the detection and monitoring of tsunamis

  13. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  14. Wide area change detection with satellite imagery for locating underground nuclear testing

    International Nuclear Information System (INIS)

    Canty, M.J.; Jasani, B.; Schlittenhardt, J.

    2001-01-01

    nicest aspects of the MAD method: It sorts different categories of change into different image components. Another very important characteristic of the MAD transformation is that it is invariant to linear transformations of the data. This means that if for example the sensors used for the two images have different gains, or if atmospheric haze attenuates the reflectance measurement in one of the images but not in the other, the results of the analysis will be unaffected. A Bayesian model of the probability distribution of the MAD components intensities is applied to determine automatically the decision thresholds for change and no change. The prerequisite image-to-image registration is carried out automatically with the help contour and comer matching to determine ground control points, followed by nearest-neighbor resampling. The inclusion of higher resolution panchromatic information into the procedure without loss of spectral discrimination is accomplished via wavelet fusion with the multispectral channels. A computer program CDSAT (Change Detection with SATellite imagery), which implements a user-friendly graphical environment for performing the various steps involved, is described briefly. The technique has been applied successfully to detect the exact position of an underground nuclear test in Rajasthan in 1998. In the present paper we discuss further results for tests carried out in Lop Nor, China in the 1990's and at the Nevada test site in the 1980's. Historical LANDSAT TM satellite images are used for change detection. Results are correlated with seismic and ground truth data and conclusions are drawn regarding the applicability of wide area change detection to complement seismic verification of the Comprehensive Test Ban Treaty

  15. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  16. Tsunami risk assessment for facility group over a wide area using inundation assessment method considering energy conservation law

    International Nuclear Information System (INIS)

    Fukutani, Yo; Imamura, Fumihiko; Tokunaga, Takeshi; Sato, Ichiro

    2015-01-01

    We propose a quantitative evaluation method of overall tsunami risk that the entire facility group over a wide area holds. We considerably reduced the calculation cost for tsunami inundation depth by adopting the evaluation method using energy conservation law as compared with the evaluation method using non-linear long wave equation. For financial institutions such as banks and insurance companies with contractors over a wide area and business companies with multiple their assets and facilities in various places, the proposed evaluation method in this study could be a useful approach to implement their risk-based management decisions for tsunami risk. (author)

  17. Wide Area Assessment (WAA) for Marine Munitions and Explosives of Concern

    Science.gov (United States)

    2011-08-01

    system errors or “noise” within the water column, such as air bubbles, suspended particles and fish, or bottom multiples, were filtered from the final...seven sensor 4m wide true 3-D gradiometer, utilizing Overhauser magnetometers. The Overhauser sensor has been demonstrated to be effective for the...5-20  Figure 5-10.  Screen Shot of SB Data

  18. Recent invasion of world-wide wheat growing areas by two aggressive strains of Puccinia striiformis

    DEFF Research Database (Denmark)

    Walter, Stephanie; Ali, Sajid; Justesen, Annemarie Fejer

    2012-01-01

    The ever more frequent and severe large-scale epidemics of wheat yellow/stripe rust disease (caused by Puccinia striiformis) pose a severe threat to the world’s wheat production (Hovmøller et al. 2010). The onset of a new series of world-wide wheat yellow rust epidemics in 2000 has been linked...

  19. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  20. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  2. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  3. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  4. On the Development of Methodology for Planning and Cost-Modeling of a Wide Area Network

    OpenAIRE

    Ahmedi, Basri; Mitrevski, Pece

    2014-01-01

    The most important stages in designing a computer network in a wider geographical area include: definition of requirements, topological description, identification and calculation of relevant parameters (i.e. traffic matrix), determining the shortest path between nodes, quantification of the effect of various levels of technical and technological development of urban areas involved, the cost of technology, and the cost of services. These parameters differ for WAN networks in different regions...

  5. A basic R and D for an analysis framework distributed on wide area network

    International Nuclear Information System (INIS)

    Ishino, M.; Kawabata, S.; Kawamoto, T.; Kobayashi, T.; Manabe, A.; Mashimo, T.; Matsumoto, H.; Morita, Y.; Sakamoto, H.; Sasaki, T.; Sato, H.; Tanaka, J.; Ueda, I.; Watase, Y.

    2004-01-01

    Present status is reported on several R and D issues related to world-wide analysis for forthcoming high-energy collider experiments. This study includes (1) high-density computer farm with effective configuration and management capability (2) high throughput data storage mechanisms covering disk arrays and hierarchical storage architecture, and (3) high-performance massive data transfer techniques on large latency WAN. Understanding these basic technologies is necessary for the deployment of developing data grid computing

  6. Activity and function recognition for moving and static objects in urban environments from wide-area persistent surveillance inputs

    Science.gov (United States)

    Levchuk, Georgiy; Bobick, Aaron; Jones, Eric

    2010-04-01

    In this paper, we describe results from experimental analysis of a model designed to recognize activities and functions of moving and static objects from low-resolution wide-area video inputs. Our model is based on representing the activities and functions using three variables: (i) time; (ii) space; and (iii) structures. The activity and function recognition is achieved by imposing lexical, syntactic, and semantic constraints on the lower-level event sequences. In the reported research, we have evaluated the utility and sensitivity of several algorithms derived from natural language processing and pattern recognition domains. We achieved high recognition accuracy for a wide range of activity and function types in the experiments using Electro-Optical (EO) imagery collected by Wide Area Airborne Surveillance (WAAS) platform.

  7. Economic evaluation of an area-wide integrated pest management program to control the Asian tiger mosquito in New Jersey

    Science.gov (United States)

    Aedes albopictus is the most invasive mosquito in the world, an important disease vector, and a biting nuisance that limits outdoor activities. Area-wide integrated pest management (AW-IPM) is the recommended control strategy. We conducted an economic evaluation of the AW-IPM project in Mercer and ...

  8. Economic evaluation of area-wide pest management program to control asian tiger mosquito in New Jersey

    Science.gov (United States)

    Area-wide pest management (AWPM) is recommended to control urban mosquitoes, such as Aedes albopictus, which limit outdoor activities. While several evaluations of effectiveness exist, information on costs is lacking. Economic evaluation of such a program is important to help inform policy makers an...

  9. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  10. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2015-06-01

    Full Text Available In this paper, we address the thermal rise and Quality-of-Service (QoS provisioning issue for an intra-body Wireless Body Area Network (WBAN having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s, and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  11. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-06-15

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.

  12. New implementation of a shear-force microscope suitable to study topographical features over wide areas

    International Nuclear Information System (INIS)

    Ustione, A.; Cricenti, A.; Piacentini, M.; Felici, A. C.

    2006-01-01

    A new implementation of a shear-force microscope is described that uses a shear-force detection system to perform topographical imaging of large areas (∼1x1 mm 2 ). This implementation finds very interesting application in the study of archeological or artistic samples. Three dc motors are used to move a sample during a scan, allowing the probe tip to follow the surface and to face height differences of several tens of micrometers. This large-area topographical imaging mode exploits new subroutines that were added to the existing homemade software; these subroutines were created in Microsoft VISUAL BASIC 6.0 programming language. With this new feature our shear-force microscope can be used to study topographical details over large areas of archaeological samples in a nondestructive way. We show results detecting worn reliefs over a coin

  13. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  14. Wide-area phase-contrast X-ray imaging using large X-ray interferometers

    Energy Technology Data Exchange (ETDEWEB)

    Momose, Atsushi E-mail: momose@exp.t.u-tokyo.ac.jp; Takeda, Tohoru; Yoneyama, Akio; Koyama, Ichiro; Itai, Yuji

    2001-07-21

    Large X-ray interferometers are developed for phase-contrast X-ray imaging aiming at medical applications. A monolithic X-ray interferometer and a separate one are studied, and currently a 25 mmx20 mm view area can be generated. This paper describes the strategy of our research program and some recent developments.

  15. Wide-area phase-contrast X-ray imaging using large X-ray interferometers

    Science.gov (United States)

    Momose, Atsushi; Takeda, Tohoru; Yoneyama, Akio; Koyama, Ichiro; Itai, Yuji

    2001-07-01

    Large X-ray interferometers are developed for phase-contrast X-ray imaging aiming at medical applications. A monolithic X-ray interferometer and a separate one are studied, and currently a 25 mm×20 mm view area can be generated. This paper describes the strategy of our research program and some recent developments.

  16. Area burned in alpine treeline ecotones reflects region-wide trends

    Science.gov (United States)

    C. Alina Cansler; Donald McKenzie; Charles B. Halpern

    2016-01-01

    The direct effects of climate change on alpine treeline ecotones – the transition zones between subalpine forest and non-forested alpine vegetation – have been studied extensively, but climate-induced changes in disturbance regimes have received less attention. To determine if recent increases in area burned extend to these higher-elevation landscapes, we analysed...

  17. The South African fruit fly action plan: area-wide suppression and exotic species surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Brian N., E-mail: barnesb@arc.agric.z [ARC Infruitec-Nietvoorbij Institute for Fruit, Vine and Wine, Stellenbosch (South Africa); Venter, Jan-Hendrik, E-mail: janhendrikv@nda.agric.z [Directorate Plant Health, Pretoria (South Africa)

    2006-07-01

    Two species of tephritid fruit flies of economic importance, Mediterranean fruit fly (Medfly, Ceratitis capitata [Wiedemann]) and Natal fruit fly (C. rosa Karsch) cause economic losses in the South African deciduous fruit industry of approximately US$3 million per annum. A third species, marula fruit fly, C. cosyra (Walker), causes damage to citrus and sub-tropical fruits in the north-eastern part of the country. In 1999 a sterile insect technique (SIT) programme against Medfly was initiated over 10,000 ha of table grapes with a goal of cost-effective, ecologically compatible suppression of Medfly. The SIT programme was extended to two other fruit production areas in 2004. Although results in all three SIT areas have been mixed, populations of wild Medflies, as well as associated pesticide usage and control costs, have been reduced since the start of sterile fly releases. Reasons for the partial degree of success and the relatively slow expansion of Medfly SIT to other areas include economic, operational and cultural factors, as well as certain fruit production practices. Before fruit fly-free areas can be created, deficiencies in the ability to mass-rear Natal fruit fly need to be overcome so that an SIT programme against this species can be initiated. Any fruit fly suppression or eradication campaign will be severely compromised by any introductions into South Africa of exotic fruit fly species. The risk of such introductions is increasing as trade with and travel to the country increases. A Plant Health Early Warning Systems Division has been initiated to formulate fruit fly detection and action plans. Melon fly (Bactrocera cucurbitae [Coquillett]), Asian fruit fly (B. invadens Drew, Tsurutu and White) and peach fruit fly (B. zonata [Saunders]), which are all well established in parts of Africa and/or Indian Ocean islands, have been identified as presenting the highest risk for entering and becoming established in South Africa. An exotic fruit fly surveillance

  18. The South African fruit fly action plan: area-wide suppression and exotic species surveillance

    International Nuclear Information System (INIS)

    Barnes, Brian N.; Venter, Jan-Hendrik

    2006-01-01

    Two species of tephritid fruit flies of economic importance, Mediterranean fruit fly (Medfly, Ceratitis capitata [Wiedemann]) and Natal fruit fly (C. rosa Karsch) cause economic losses in the South African deciduous fruit industry of approximately US$3 million per annum. A third species, marula fruit fly, C. cosyra (Walker), causes damage to citrus and sub-tropical fruits in the north-eastern part of the country. In 1999 a sterile insect technique (SIT) programme against Medfly was initiated over 10,000 ha of table grapes with a goal of cost-effective, ecologically compatible suppression of Medfly. The SIT programme was extended to two other fruit production areas in 2004. Although results in all three SIT areas have been mixed, populations of wild Medflies, as well as associated pesticide usage and control costs, have been reduced since the start of sterile fly releases. Reasons for the partial degree of success and the relatively slow expansion of Medfly SIT to other areas include economic, operational and cultural factors, as well as certain fruit production practices. Before fruit fly-free areas can be created, deficiencies in the ability to mass-rear Natal fruit fly need to be overcome so that an SIT programme against this species can be initiated. Any fruit fly suppression or eradication campaign will be severely compromised by any introductions into South Africa of exotic fruit fly species. The risk of such introductions is increasing as trade with and travel to the country increases. A Plant Health Early Warning Systems Division has been initiated to formulate fruit fly detection and action plans. Melon fly (Bactrocera cucurbitae [Coquillett]), Asian fruit fly (B. invadens Drew, Tsurutu and White) and peach fruit fly (B. zonata [Saunders]), which are all well established in parts of Africa and/or Indian Ocean islands, have been identified as presenting the highest risk for entering and becoming established in South Africa. An exotic fruit fly surveillance

  19. Wireless Technologies in Support of ISS Experimentation and Operations

    Science.gov (United States)

    Wagner, Raymond; Fink, Patrick

    2012-01-01

    Presentation reviews: (1) Wireless Communications (a) Internal (b) External (2) RFID (Radio Frequency Identification) (a) Existing and R&D (3) Wireless Sensor Networks (a) Existing and R&D (4) Ultra-Wide Band (UWB) (a) R&D

  20. Projected impacts of climate change on a continent-wide protected area network

    DEFF Research Database (Denmark)

    Hole, David G; Willis, Stephen G; Pain, Deborah J

    2009-01-01

    Despite widespread concern, the continuing effectiveness of networks of protected areas under projected 21st century climate change is uncertain. Shifts in species' distributions could mean these resources will cease to afford protection to those species for which they were originally established...... species). Persistence of suitable climate space across the network as a whole, however, is notably high, with 88-92% of priority species retaining suitable climate space in >or= 1 IBA(s) in which they are currently found. Only 7-8 priority species lose climatic representation from the network. Hence......, despite the likelihood of significant community disruption, we demonstrate that rigorously defined networks of protected areas can play a key role in mitigating the worst impacts of climate change on biodiversity....

  1. Application opportunities in wireless communications. Final report

    International Nuclear Information System (INIS)

    Abbott, R.E.; Blevins, R.P.; Olmstead, C.

    1998-07-01

    This report presents the results of examinations of wireless technologies and applications that may offer potential to utilities. Five different wireless technology areas are reviewed. Three areas--Communication Networks, Monitored Security Services, and Home Automation--potentially represent new business ventures for utilities. Two areas--Automatic Vehicle Location and Automated Field-Force Management--represent wireless applications with potential for reduced operating costs and improved customer relations

  2. TeleMed: Wide-area, secure, collaborative object computing with Java and CORBA for healthcare

    Energy Technology Data Exchange (ETDEWEB)

    Forslund, D.W.; George, J.E.; Gavrilov, E.M.

    1998-12-31

    Distributed computing is becoming commonplace in a variety of industries with healthcare being a particularly important one for society. The authors describe the development and deployment of TeleMed in a few healthcare domains. TeleMed is a 100% Java distributed application build on CORBA and OMG standards enabling the collaboration on the treatment of chronically ill patients in a secure manner over the Internet. These standards enable other systems to work interoperably with TeleMed and provide transparent access to high performance distributed computing to the healthcare domain. The goal of wide scale integration of electronic medical records is a grand-challenge scale problem of global proportions with far-reaching social benefits.

  3. Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms

    OpenAIRE

    Zhang, James; Vukotic, Ilija; Gardner, Robert

    2018-01-01

    Anomaly detection is the practice of identifying items or events that do not conform to an expected behavior or do not correlate with other items in a dataset. It has previously been applied to areas such as intrusion detection, system health monitoring, and fraud detection in credit card transactions. In this paper, we describe a new method for detecting anomalous behavior over network performance data, gathered by perfSONAR, using two machine learning algorithms: Boosted Decision Trees (BDT...

  4. Wide area tracking method for augmented reality supporting nuclear power plant maintenance work

    International Nuclear Information System (INIS)

    Ishii, Hirotake; Yan, Weida; Yang, Shou-feng; Shimoda, Hiroshi; Izumi, Masanori

    2010-01-01

    A new fiducial marker for augmented reality was designed along with a method that recognizes the markers captured by a camera and calculates the relative position and orientation between the markers and the camera. These markers can be used at both long and short distances without increasing their number in the environment. Results of the experimental evaluation show that the new marker can be used in a larger area than legacy markers such as square markers and circular markers. (author)

  5. Development of wide area tracking method for augmented reality using multi-range fiducials

    International Nuclear Information System (INIS)

    Ishii, Hirotake; Fujino, Hidenori; Yan, Weida; Yang, Shoufeng; Shimoda, Hiroshi; Izumi, Masanori

    2009-01-01

    A new fiducial marker for augmented reality was designed along with a method that recognizes the markers captured by a camera and calculates the relative position and orientation between the markers and the camera. These markers can be used at both long and short distances without increasing the number of markers pasted in the environment. Results of the experimental evaluation show that the new marker can be used in a larger area than circular markers and more stably than square markers. (author)

  6. Wide Area Recovery and Resiliency Program (WARRP) Interim Clearance Strategy for Environments Contaminated with Hazardous Chemicals

    Science.gov (United States)

    2012-07-01

    imperative that the community address the range of values, and have agreement, before a disaster strikes. Pre-event clearance level concurrence is...on the cleanup of specific sites: those containing only cesium-137 (Goiania) and those containing 137Cs and other radionuclides ( Chernobyl ...targets and consider initiatives to enhance the quality of life of the residents of the contaminated areas. Recovery experience from the Chernobyl

  7. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  8. Many play concepts seen over wide area in Erris, Slyne troughs off Ireland

    International Nuclear Information System (INIS)

    Murphy, N.J.; Croker, P.F.

    1992-01-01

    This paper reports that the Erris and Slyne troughs are underexplored Mesozoic sedimentary basins off Ireland's northwest coast. The Irish Minister for Energy announced on Apr. 19, 1991, a frontier acreage licensing round of 128 blocks covering 29,000 sq km in these basins and the adjacent Rockall trough. Closing date for the round is June 30, 1993, set to allow two seasons for the acquisition of new geophysical and geological data over the area. Ireland has recently announced a new petroleum taxation regime. Revised licensing terms, which will acknowledge the specific circumstances of frontier acreage, will be announced

  9. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  10. Wireless Communications in Smart Grid

    Science.gov (United States)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  11. Performance of a large-area GEM detector read out with wide radial zigzag strips

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Aiwu, E-mail: azhang@fit.edu; Bhopatkar, Vallary; Hansen, Eric; Hohlmann, Marcus; Khanal, Shreeya; Phipps, Michael; Starling, Elizabeth; Twigger, Jessie; Walton, Kimberly

    2016-03-01

    A 1-meter-long trapezoidal Triple-GEM detector with wide readout strips was tested in hadron beams at the Fermilab Test Beam Facility in October 2013. The readout strips have a special zigzag geometry and run radially with an azimuthal pitch of 1.37 mrad to measure the azimuthal ϕ-coordinate of incident particles. The zigzag geometry of the readout reduces the required number of electronic channels by a factor of three compared to conventional straight readout strips while preserving good angular resolution. The average crosstalk between zigzag strips is measured to be an acceptable 5.5%. The detection efficiency of the detector is (98.4±0.2)%. When the non-linearity of the zigzag-strip response is corrected with track information, the angular resolution is measured to be (193±3) μrad, which corresponds to 14% of the angular strip pitch. Multiple Coulomb scattering effects are fully taken into account in the data analysis with the help of a stand-alone Geant4 simulation that estimates interpolated track errors.

  12. Building the Wireless Campus

    Science.gov (United States)

    Gerraughty, James F.; Shanafelt, Michael E.

    2005-01-01

    This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…

  13. Partnership Opportunities with AFRC for Wireless Systems Flight Testing

    Science.gov (United States)

    Hang, Richard

    2015-01-01

    The presentation will overview the flight test capabilities at NASA Armstrong Flight Research Center (AFRC), to open up partnership collaboration opportunities for Wireless Community to conduct flight testing of aerospace wireless technologies. Also, it will brief the current activities on wireless sensor system at AFRC through SBIR (Small Business Innovation Research) proposals, and it will show the current areas of interest on wireless technologies that AFRC would like collaborate with Wireless Community to further and testing.

  14. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  15. Wide-area mapping of small-scale features in agricultural landscapes using airborne remote sensing.

    Science.gov (United States)

    O'Connell, Jerome; Bradter, Ute; Benton, Tim G

    2015-11-01

    Natural and semi-natural habitats in agricultural landscapes are likely to come under increasing pressure with the global population set to exceed 9 billion by 2050. These non-cropped habitats are primarily made up of trees, hedgerows and grassy margins and their amount, quality and spatial configuration can have strong implications for the delivery and sustainability of various ecosystem services. In this study high spatial resolution (0.5 m) colour infrared aerial photography (CIR) was used in object based image analysis for the classification of non-cropped habitat in a 10,029 ha area of southeast England. Three classification scenarios were devised using 4 and 9 class scenarios. The machine learning algorithm Random Forest (RF) was used to reduce the number of variables used for each classification scenario by 25.5 % ± 2.7%. Proportion of votes from the 4 class hierarchy was made available to the 9 class scenarios and where the highest ranked variables in all cases. This approach allowed for misclassified parent objects to be correctly classified at a lower level. A single object hierarchy with 4 class proportion of votes produced the best result (kappa 0.909). Validation of the optimum training sample size in RF showed no significant difference between mean internal out-of-bag error and external validation. As an example of the utility of this data, we assessed habitat suitability for a declining farmland bird, the yellowhammer ( Emberiza citronella ), which requires hedgerows associated with grassy margins. We found that ∼22% of hedgerows were within 200 m of margins with an area >183.31 m 2 . The results from this analysis can form a key information source at the environmental and policy level in landscape optimisation for food production and ecosystem service sustainability.

  16. Wide-area mapping of small-scale features in agricultural landscapes using airborne remote sensing

    Science.gov (United States)

    O'Connell, Jerome; Bradter, Ute; Benton, Tim G.

    2015-11-01

    Natural and semi-natural habitats in agricultural landscapes are likely to come under increasing pressure with the global population set to exceed 9 billion by 2050. These non-cropped habitats are primarily made up of trees, hedgerows and grassy margins and their amount, quality and spatial configuration can have strong implications for the delivery and sustainability of various ecosystem services. In this study high spatial resolution (0.5 m) colour infrared aerial photography (CIR) was used in object based image analysis for the classification of non-cropped habitat in a 10,029 ha area of southeast England. Three classification scenarios were devised using 4 and 9 class scenarios. The machine learning algorithm Random Forest (RF) was used to reduce the number of variables used for each classification scenario by 25.5 % ± 2.7%. Proportion of votes from the 4 class hierarchy was made available to the 9 class scenarios and where the highest ranked variables in all cases. This approach allowed for misclassified parent objects to be correctly classified at a lower level. A single object hierarchy with 4 class proportion of votes produced the best result (kappa 0.909). Validation of the optimum training sample size in RF showed no significant difference between mean internal out-of-bag error and external validation. As an example of the utility of this data, we assessed habitat suitability for a declining farmland bird, the yellowhammer (Emberiza citronella), which requires hedgerows associated with grassy margins. We found that ˜22% of hedgerows were within 200 m of margins with an area >183.31 m2. The results from this analysis can form a key information source at the environmental and policy level in landscape optimisation for food production and ecosystem service sustainability.

  17. Will available bit rate (ABR) services give us the capability to offer virtual LANs over wide-area ATM networks?

    Science.gov (United States)

    Ferrandiz, Ana; Scallan, Gavin

    1995-10-01

    The available bit rate (ABR) service allows connections to exceed their negotiated data rates during the life of the connections when excess capacity is available in the network. These connections are subject to flow control from the network in the event of network congestion. The ability to dynamically adjust the data rate of the connection can provide improved utilization of the network and be a valuable service to end users. ABR type service is therefore appropriate for the transmission of bursty LAN traffic over a wide area network in a manner that is more efficient and cost effective than allocating bandwdith at the peak cell rate. This paper describes the ABR service and discusses if it is realistic to operate a LAN like service over a wide area using ABR.

  18. A Mixed WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2018-02-01

    Full Text Available To address the issue that the phasor measurement units (PMUs of wide area measurement system (WAMS are not sufficient for static state estimation in most existing power systems, this paper proposes a mixed power system weighted least squares (WLS state estimation method integrating a wide-area measurement system and supervisory control and data acquisition (SCADA technology. The hybrid calculation model is established by incorporating phasor measurements (including the node voltage phasors and branch current phasors and the results of the traditional state estimator in a post-processing estimator. The performance assessment is discussed through setting up mathematical models of the distribution network. Based on PMU placement optimization and bias analysis, the effectiveness of the proposed method was proved to be accurate and reliable by simulations of different cases. Furthermore, emulating calculation shows this method greatly improves the accuracy and stability of the state estimation solution, compared with the traditional WLS state estimation.

  19. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Directory of Open Access Journals (Sweden)

    Zhe Zhang

    2014-01-01

    Full Text Available In order to solve the problems of the existing wide-area backup protection (WABP algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance.

  20. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Science.gov (United States)

    Zhang, Zhe; Kong, Xiangping; Yin, Xianggen; Yang, Zengli; Wang, Lijun

    2014-01-01

    In order to solve the problems of the existing wide-area backup protection (WABP) algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S) evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance. PMID:25050399

  1. Seamless interworking architecture for WBAN in heterogeneous wireless networks with QoS guarantees.

    Science.gov (United States)

    Khan, Pervez; Ullah, Niamat; Ullah, Sana; Kwak, Kyung Sup

    2011-10-01

    The IEEE 802.15.6 standard is a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. Providing high mobility with guaranteed Quality of Service (QoS) to a WBAN user in heterogeneous wireless networks is a challenging task. A WBAN uses a Personal Digital Assistant (PDA) to gather data from body sensors and forwards it to a remote server through wide range wireless networks. In this paper, we present a coexistence study of WBAN with Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWANs). The main issue is interworking of WBAN in heterogenous wireless networks including seamless handover, QoS, emergency services, cooperation and security. We propose a Seamless Interworking Architecture (SIA) for WBAN in heterogenous wireless networks based on a cost function. The cost function is based on power consumption and data throughput costs. Our simulation results show that the proposed scheme outperforms typical approaches in terms of throughput, delay and packet loss rate.

  2. Point-Source and Area-Wide Field Studies of Pyriproxyfen Autodissemination Against Urban Container-Inhabiting Mosquitoes

    Science.gov (United States)

    2014-04-05

    in 50 L trash cans. Oak leaves of Quercus alba (L.) and Q. rubra (L.) were used because this infusion elicits oviposition responses from container...105 ha in area (Fig. 2), whereas, the control site was in Union Beach , NJ (40.2650 lat., - 74.71026 long.) and spanned 181 ha. Both the treatment and...people/km2) than Union Beach (1384.7 people/km2). We initially intended to assess pyriproxyfen-based area-wide autodissemination by treating 25% of an

  3. Truck-mounted Area-wide Application of Pyriproxyfen Targeting Aedes aegypti and Aedes albopictus in Northeast Florida

    Science.gov (United States)

    2014-12-01

    TRUCK-MOUNTED AREA-WIDE APPLICATION OF PYRIPROXYFEN TARGETING AEDES AEGYPTI AND AEDES ALBOPICTUS IN NORTHEAST FLORIDA1 CARL W. DOUD,2,3 ANTHONY M...truck-mounted ultra-low volume applications of pyriproxyfen against Aedes aegypti larvae in artificial water containers and wild adult Ae. albopictus...larval control, Aedes aegypti, Aedes albopictus INTRODUCTION Aedes albopictus (Skuse) (Asian tiger mosquito) and Ae. aegypti (L.) (yellow fever

  4. Broadcast of four HD videos with LED ceiling lighting: optical-wireless MAC

    Science.gov (United States)

    Bouchet, Olivier; Porcon, Pascal; Gueutier, Eric

    2011-09-01

    The European project "hOME Gigabit Access Network" (OMEGA) targeted various wireless and wired solutions for 1 Gbit/s connectivity in Home Area Networks (HANs). One objective was to evaluate the suitability of optical wireless technologies in two spectral regions: visible light (visible-light communications - VLC) and near infrared (infrared communications - IRC). Several demonstrators have been built, all of them largely relying on overthe- shelf components. The demonstrators included a "wide-area" VLC broadcast link based on LED ceiling lighting and a laser-based high-data-rate "wide-area" IRC prototype. In this paper we discuss an adapted optical-wireless media-access-control (OWMAC) sublayer, which was developed and implemented during the project. It is suitable for both IRC and VLC. The VLC prototype is based on DMT signal processing and provides broadcasting at { 100 Mbit/s over an area of approximately 5 m2. The IRC prototype provides {300 Mbit/s half-duplex communication over an area of approximately 30 m2. The IRC mesh network, composed of one base station and two terminals, is based on OOK modulation, multi-sector transceivers, and an ultra-fast sector switch. After a brief discussion about the design of the optical-wireless data link layer and the optical-wireless switch (OWS) card, we address the card development and implementation. We also present applications for the VLC and IRC prototypes and measurement results regarding the MAC layer.

  5. Area-wide approaches to insect pest management: history and lessons

    International Nuclear Information System (INIS)

    Klassen, Waldemar

    2000-01-01

    World agriculture is now entering a very trying era because currently our numbers are expanding by more than 90 million additional people per year. Demographers project that our growth will not drop below 90 million people per year until about 2020 (United Nations 1993, Nygaard 1998). The challenge is to increase food production every three or four years sufficiently to feed an additional population equivalent to that of Western Europe or North America. The land available for agriculture on a per capita basis is becoming progressively more limited so than in 2010, on average, 1 hectare in developing countries will have to feed 5 people, and in South Asia, 1 hectare will have to feed 8 people (Alexandratos 1995, Klassen 1995). On an average, 66 percent of the additional food must come from increased yields, and in South Asia, fully 80 percent must come from increased yields. The balance will come from expanding the area cultivated and use of intensified cropping systems. However, this is not a simple matter since pest populations tend to be favoured by yield-boosting measures. Since population growth rates recede as people overcome poverty, and since increasing food production is the principal means of overcoming poverty in many countries, it is imperative that in the decades immediately ahead major improvements be made in reducing losses to pests and in other yield enhancing measures

  6. Distributed power-line outage detection based on wide area measurement system.

    Science.gov (United States)

    Zhao, Liang; Song, Wen-Zhan

    2014-07-21

    In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i) high computational complexity; and (ii) relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM) for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  7. The design of delay-dependent wide-area DOFC with prescribed degree of stability α for damping inter-area low-frequency oscillations in power system.

    Science.gov (United States)

    Sun, Miaoping; Nian, Xiaohong; Dai, Liqiong; Guo, Hua

    2017-05-01

    In this paper, the delay-dependent wide-area dynamic output feedback controller (DOFC) with prescribed degree of stability is proposed for interconnected power system to damp inter-area low-frequency oscillations. Here, the prescribed degree of stability α is used to maintain all the poles on the left of s=-α in the s-plane. Firstly, residue approach is adopted to select input-output control signals and the schur balanced truncation model reduction method is utilized to obtain the reduced power system model. Secondly, based on Lyapunov stability theory and transformation operation in complex plane, the sufficient condition of asymptotic stability for closed-loop power system with prescribed degree of stability α is derived. Then, a novel method based on linear matrix inequalities (LMIs) is presented to obtain the parameters of DOFC and calculate delay margin of the closed-loop system considering the prescribed degree of stability α. Finally, case studies are carried out on the two-area four-machine system, which is controlled by classical wide-area power system stabilizer (WAPSS) in reported reference and our proposed DOFC respectively. The effectiveness and advantages of the proposed method are verified by the simulation results under different operating conditions. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  8. Clinical potential of implantable wireless sensors for orthopedic treatments.

    Science.gov (United States)

    Karipott, Salil Sidharthan; Nelson, Bradley D; Guldberg, Robert E; Ong, Keat Ghee

    2018-04-01

    Implantable wireless sensors have been used for real-time monitoring of chemicals and physical conditions of bones, tendons and muscles to diagnose and study orthopedic diseases and injuries. Due to the importance of these sensors in orthopedic care, a critical review, which not only analyzes the underlying technologies but also their clinical implementations and challenges, will provide a landscape view on their current state and their future clinical role. Areas covered: By conducting an extensive literature search and following the leaders of orthopedic implantable wireless sensors, this review covers the battery-powered and battery-free wireless implantable sensor technologies, and describes their implementation for hips, knees, spine, and shoulder stress/strain monitoring. Their advantages, limitations, and clinical challenges are also described. Expert commentary: Currently, implantable wireless sensors are mostly limited for scientific investigations and demonstrative experiments. Although rapid advancement in sensors and wireless technologies will push the reliability and practicality of these sensors for clinical realization, regulatory constraints and financial viability in medical device industry may curtail their continuous adoption for clinical orthopedic applications. In the next five years, these sensors are expected to gain increased interest from researchers, but wide clinical adoption is still unlikely.

  9. Area-wide control of Chagas disease vectors in Latin America

    International Nuclear Information System (INIS)

    Schofield, C.J.

    2000-01-01

    Argentina, Brazil and Venezuela. Without exception, the results followed a similar course, with a rapid decline in house infestation rates and a reduction in the incidence of human infection. Generally however, it was impossible to consolidate the initial successes due to changes in intervention policy and a corresponding lack of programme continuity. Although domestic populations of Triatomine bugs can be cleared from individual houses, or from particular localities, the houses remain vulnerable to re-infestation by bugs brought in from untreated regions. In Brazil, the national programme to eliminate the primary vector, Triatoma infestans (Klug), was launched in 1983. It was highly successful, but - as with previous local campaigns - there were problems of sustainability and re-infestation of many of the treated localities (Dias 1987). To address this problem, governments of the six southern cone countries (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) in 1991 set up a joint initiative to control Chagas disease through the elimination of all domestic and peridomestic populations of the triatomine vectors (Kingman 1991). With the addition of Peru to this programme in 1996, the initiative now covers the entire geographic distribution of the primary vector, T. infestans. The Southern Cone Initiative was planned as a 10-year programme to eliminate all domestic and peridomestic populations of T. infestans, with concurrent suppression of other vector species of local importance. Now just past its mid-point, the programme has already met with considerable success with Chagas disease transmission interrupted over vast areas of Argentina, Chile, Uruguay, central Brazil, eastern Paraguay and southern Bolivia (Schmunis et al. 1996, WHO 1996, 1997a, 1998). Other domestic vectors in the region - such as Triatoma brasiliensis Neiva in northeast Brazil - are also being controlled and the World Health Organisation (WHO) now predicts complete interruption of Chagas disease

  10. Wide-Area Landslide Deformation Mapping with Multi-Path ALOS PALSAR Data Stacks: A Case Study of Three Gorges Area, China

    Directory of Open Access Journals (Sweden)

    Xuguo Shi

    2016-02-01

    Full Text Available In recent years, satellite synthetic aperture radar interferometry (InSAR has been adopted as a spaceborne geodetic tool to successfully measure surface deformation of a few well-known landslides in the Three Gorges area. In consideration of the fact that most events of slope failure happened at places other than those famous landslides since the reservoir impoundment in 2003, focusing on a limited number of slopes is insufficient to meet the requirements of regional-scale landslide disaster prevention and early warning. As a result, it has become a vital task to evaluate the overall stability of slopes across the vast area of Three Gorges using wide-coverage InSAR datasets. In this study, we explored the approach of carrying out joint analysis of multi-path InSAR data stacks for wide-area landslide deformation mapping. As an example, three ALOS (Advanced Land Observing Satellite PALSAR (Phased Array type L-band Synthetic Aperture Radar data stacks of neighboring ascending paths covering the area along the Yangtze River from Fengjie to Zigui were analyzed. A key problem to be solved is the separation of the tropospheric signal from the interferometric phase, for which we employed a hybrid description model of the atmospheric phase screen (APS to improve APS estimation from time series interferograms. The estimated atmospheric phase was largely correlated with the seasonal rainfall in the temporal dimension. The experimental results show that about 30 slopes covering total areas of 48 km2 were identified to be landslides in active deformation and should be kept under routine surveillance. Analyses of time series displacement measurements revealed that most landslides in the mountainous area far away from Yangtze River suffered from linear deformation, whereas landslides located on the river bank were destabilized predominantly by the influences of reservoir water level fluctuation and rainfall.

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into  the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances

  12. PDCI Wide-Area Damping Control: PSLF Simulations of the 2016 Open and Closed Loop Test Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wilches Bernal, Felipe [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pierre, Brian Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Elliott, Ryan Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Byrne, Raymond H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Neely, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Trudnowski, Daniel J. [Montana Tech of the Univ. of Montana, Butte, MT (United States); Donnelly, Matthew K. [Montana Tech of the Univ. of Montana, Butte, MT (United States)

    2017-03-01

    To demonstrate and validate the performance of the wide-are a damping control system, the project plans to conduct closed-loop tests on the PDCI in summer/fall 2016. A test plan details the open and closed loop tests to be conducted on the P DCI using the wide-area damping control system. To ensure the appropriate level of preparedness, simulations were performed in order to predict and evaluate any possible unsafe operations before hardware experiments are attempted. This report contains the result s from these simulations using the power system dynamics software PSLF (Power System Load Flow, trademark of GE). The simulations use the WECC (Western Electricity Coordinating Council) 2016 light summer and heavy summer base cases.

  13. A method exploiting direct communication between phasor measurement units for power system wide-area protection and control algorithms.

    Science.gov (United States)

    Almas, Muhammad Shoaib; Vanfretti, Luigi

    2017-01-01

    Synchrophasor measurements from Phasor Measurement Units (PMUs) are the primary sensors used to deploy Wide-Area Monitoring, Protection and Control (WAMPAC) systems. PMUs stream out synchrophasor measurements through the IEEE C37.118.2 protocol using TCP/IP or UDP/IP. The proposed method establishes a direct communication between two PMUs, thus eliminating the requirement of an intermediate phasor data concentrator, data mediator and/or protocol parser and thereby ensuring minimum communication latency without considering communication link delays. This method allows utilizing synchrophasor measurements internally in a PMU to deploy custom protection and control algorithms. These algorithms are deployed using protection logic equations which are supported by all the PMU vendors. Moreover, this method reduces overall equipment cost as the algorithms execute internally in a PMU and therefore does not require any additional controller for their deployment. The proposed method can be utilized for fast prototyping of wide-area measurements based protection and control applications. The proposed method is tested by coupling commercial PMUs as Hardware-in-the-Loop (HIL) with Opal-RT's eMEGAsim Real-Time Simulator (RTS). As illustrative example, anti-islanding protection application is deployed using proposed method and its performance is assessed. The essential points in the method are: •Bypassing intermediate phasor data concentrator or protocol parsers as the synchrophasors are communicated directly between the PMUs (minimizes communication delays).•Wide Area Protection and Control Algorithm is deployed using logic equations in the client PMU, therefore eliminating the requirement for an external hardware controller (cost curtailment)•Effortless means to exploit PMU measurements in an environment familiar to protection engineers.

  14. Wide Area Measurement Based Security Assessment & Monitoring of Modern Power System: A Danish Power System Case Study

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2013-01-01

    Power System security has become a major concern across the global power system community. This paper presents wide area measurement system (WAMS) based security assessment and monitoring of modern power system. A new three dimensional security index (TDSI) has been proposed for online security...... monitoring of modern power system with large scale renewable energy penetration. Phasor measurement unit (PMU) based WAMS has been implemented in western Danish Power System to realize online security monitoring and assessment in power system control center. The proposed security monitoring system has been...

  15. 3D inkjet printed disposable environmental monitoring wireless sensor node

    KAUST Repository

    Farooqui, Muhammad Fahad; Shamim, Atif

    2017-01-01

    We propose a disposable, miniaturized, moveable, fully integrated 3D inkjet-printed wireless sensor node for large area environmental monitoring applications. As a proof of concept, we show the wireless sensing of temperature, humidity and H2S

  16. A Location-Based Duplex Scheme for Cost Effective Rural Broadband Connectivity Using IEEE 802.22 Cognitive Radio Based Wireless Regional Area Networks

    Science.gov (United States)

    Kalidoss, R.; Bhagyaveni, M. A.; Vishvaksenan, K. S.

    2014-08-01

    The search for a method of utilizing the scarce spectrum in an efficient manner is an active area of research in both academic and industrial communities. IEEE 802.22 is a standard for wireless regional area network (WRAN) based on cognitive radio (CR) that operates over underutilized portions of TV bands (54-862 MHz). Time division duplex (TDD)-based WRAN cells have such advantages as dynamic traffic allocation, traffic asymmetry to users and ease of spectrum allocation. However, these cells suffer from severe cross time slot (CTS) interference when the frames of the cells are not synchronized with adjacent WRAN cells. In this paper, we evaluate the location-based duplex (LBD) scheme for eliminating the CTS interference. The proposed LBD system is much more flexible and efficient in providing asymmetric data service and eliminating CTS interference by exploiting the advantages of both TDD and frequency division duplex (FDD) schemes. We also compare the performance of LBD systems with virtual cell concepts. Furthermore, our simulation results reveal that LBD-based systems outperform the virtual cell approach in terms of the low signal-to-interference (SIR) ratio requirement by mitigating the effects of CTS.

  17. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  18. WIDE-AREA BASED ON COORDINATED TUNING OF FUZZY PSS AND FACTS CONTROLLER IN MULTI-MACHINE ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Homayoun Ebrahimian

    2016-03-01

    Full Text Available In this paper coordination of fuzzy power system stabilizer (FPSS and flexible ac transmission systems (FACTS have been considered in a multi-machine power system. The proposed model, has been applied for a wide-area power system. The proposed FPSS presented with local, nonlinear feedbacks, and the corresponding control synthesis conditions are given in terms of solutions to a set of linear matrix inequalities (LMIs. For this model, in fuzzy control synthesis, the new proposed control design method is based on fewer fuzzy rules and less computational burden. Also, the parameters of FACTS controller have been evaluated by improved honey bee mating optimization (IHBMO. The effectiveness of the proposed method has been applied over two case studies of single-machine infinite-bus (SMIB and two areas four machine (TAFM Kundur’s power system. The obtained results demonstrate the superiority of proposed strategy.

  19. Error Analysis of Fast Moving Target Geo-location in Wide Area Surveillance Ground Moving Target Indication Mode

    Directory of Open Access Journals (Sweden)

    Zheng Shi-chao

    2013-12-01

    Full Text Available As an important mode in airborne radar systems, Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI mode has the ability of monitoring a large area in a short time, and then the detected moving targets can be located quickly. However, in real environment, many factors introduce considerable errors into the location of moving targets. In this paper, a fast location method based on the characteristics of the moving targets in WAS-GMTI mode is utilized. And in order to improve the location performance, those factors that introduce location errors are analyzed and moving targets are relocated. Finally, the analysis of those factors is proved to be reasonable by simulation and real data experiments.

  20. Ultra wide band antennas

    CERN Document Server

    Begaud, Xavier

    2013-01-01

    Ultra Wide Band Technology (UWB) has reached a level of maturity that allows us to offer wireless links with either high or low data rates. These wireless links are frequently associated with a location capability for which ultimate accuracy varies with the inverse of the frequency bandwidth. Using time or frequency domain waveforms, they are currently the subject of international standards facilitating their commercial implementation. Drawing up a complete state of the art, Ultra Wide Band Antennas is aimed at students, engineers and researchers and presents a summary of internationally recog

  1. A Robust WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2015-04-01

    Full Text Available With the development of modern society, the scale of the power system is rapidly increased accordingly, and the framework and mode of running of power systems are trending towards more complexity. It is nowadays much more important for the dispatchers to know exactly the state parameters of the power network through state estimation. This paper proposes a robust power system WLS state estimation method integrating a wide-area measurement system (WAMS and SCADA technology, incorporating phasor measurements and the results of the traditional state estimator in a post-processing estimator, which greatly reduces the scale of the non-linear estimation problem as well as the number of iterations and the processing time per iteration. This paper firstly analyzes the wide-area state estimation model in detail, then according to the issue that least squares does not account for bad data and outliers, the paper proposes a robust weighted least squares (WLS method that combines a robust estimation principle with least squares by equivalent weight. The performance assessment is discussed through setting up mathematical models of the distribution network. The effectiveness of the proposed method was proved to be accurate and reliable by simulations and experiments.

  2. 2D PWV monitoring of a wide and orographically complex area with a low dense GNSS network

    Science.gov (United States)

    Ferrando, Ilaria; Federici, Bianca; Sguerso, Domenico

    2018-04-01

    This study presents an innovative procedure to monitor the precipitable water vapor (PWV) content of a wide and orographically complex area with low-density networks. The procedure, termed G4M (global navigation satellite system, GNSS, for Meteorology), has been developed in a geographic information system (GIS) environment using the free and open source GRASS GIS software (https://grass.osgeo.org). The G4M input data are zenith total delay estimates obtained from GNSS permanent stations network adjustment and pressure ( P) and temperature ( T) observations using existing infrastructure networks with different geographic distributions in the study area. In spite of the wide sensor distribution, the procedure produces 2D maps with high spatiotemporal resolution (up to 250 m and 6 min) based on a simplified mathematical model including data interpolation, which was conceived by the authors to describe the atmosphere's physics. In addition to PWV maps, the procedure provides ΔPWV and heterogeneity index maps: the former represents PWV variations with respect to a "calm" moment, which are useful for monitoring the PWV evolution; and the latter are promising indicators to localize severe meteorological events in time and space. This innovative procedure is compared with meteorological simulations in this paper; in addition, an application to a severe event that occurred in Genoa (Italy) is presented.[Figure not available: see fulltext.

  3. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  4. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  5. Wireless Tots

    Science.gov (United States)

    Scott, Lee-Allison

    2003-01-01

    The first wireless technology program for preschoolers was implemented in January at the Primrose School at Bentwater in Atlanta, Georgia, a new corporate school operated by Primrose School Franchising Co. The new school serves as a testing and training facility for groundbreaking educational approaches, including emerging innovations in…

  6. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless... topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  7. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  8. Photonics in wireless transceivers

    International Nuclear Information System (INIS)

    Bogani, A.; Ghelfi, P.

    2013-01-01

    During the last few years, the cross-fertilization between photonics and radio systems has been helping to overcome some major limitations of the classical radio technologies, setting new paradigms, and promising improved performance and new applications with strong benefits for public communications and safety. In particular, photonics-based wireless systems, albeit still at research level, are moving toward a new generation of multifunctional systems able to manage the wireless communication with several different frequencies and protocols, even simultaneously while also realizing surveillance operations. Photonics matches the new requirements of flexibility for software-defined architectures, thanks to its ultra-wide bandwidths and ease of tunability, and guarantees low footprint and weight, thanks to integrated photonic technologies. Moreover, photonics also allows increased resolution and sensitivity by means of the inherent low phase noise of lasers. (author)

  9. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications

    Science.gov (United States)

    Rafi Ahamed, Shaik

    2016-01-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924

  10. Improving the Reliability of Optimised Link State Routing in a Smart Grid Neighbour Area Network based Wireless Mesh Network Using Multiple Metrics

    Directory of Open Access Journals (Sweden)

    Yakubu Tsado

    2017-02-01

    Full Text Available Reliable communication is the backbone of advanced metering infrastructure (AMI. Within the AMI, the neighbourhood area network (NAN transports a multitude of traffic, each with unique requirements. In order to deliver an acceptable level of reliability and latency, the underlying network, such as the wireless mesh network(WMN, must provide or guarantee the quality-of-service (QoS level required by the respective application traffic. Existing WMN routing protocols, such as optimised link state routing (OLSR, typically utilise a single metric and do not consider the requirements of individual traffic; hence, packets are delivered on a best-effort basis. This paper presents a QoS-aware WMN routing technique that employs multiple metrics in OLSR optimal path selection for AMI applications. The problems arising from this approach are non deterministic polynomial time (NP-complete in nature, which were solved through the combined use of the analytical hierarchy process (AHP algorithm and pruning techniques. For smart meters transmitting Internet Protocol (IP packets of varying sizes at different intervals, the proposed technique considers the constraints of NAN and the applications’ traffic characteristics. The technique was developed by combining multiple OLSR path selection metrics with the AHP algorithminns-2. Compared with the conventional link metric in OLSR, the results show improvements of about 23% and 45% in latency and Packet Delivery Ratio (PDR, respectively, in a 25-node grid NAN.

  11. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  12. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  13. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  14. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  15. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  16. WiFi, multiband clipped LTE-A and Gbps 4-PAM simultaneous transmission over 50m Thick-core POF and wireless link for home area networks

    NARCIS (Netherlands)

    Forni, F.; Shi, Y.; van den Boom, H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2018-01-01

    An IEEE802.11n-compliant 40MHz WiFi, 9 bands 64-QAM LTE-A with reduced PAPR by clipping and 1.7Gb/s 4-PAM signals were successfully transmitted over 50m PMMA GI-POF and 12m wireless. This proves that POF is suitable for multi-standard wireless-wired in-home networks.

  17. Wide area scanning system and carbon microbeams at the external microbeam facility of the INFN LABEC laboratory in Florence

    Energy Technology Data Exchange (ETDEWEB)

    Giuntini, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Massi, M. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Calusi, S. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Castelli, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Carraresi, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Fedi, M.E.; Gelli, N. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Liccioli, L.; Mandò, P.A.; Mazzinghi, A. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Palla, L. [INFN, Sezione di Pisa and Università di Pisa, Largo B. Pontecorvo 3, I-56127 Pisa (Italy); Romano, F.P. [Consiglio Nazionale delle Ricerche (CNR), Istituto per i Beni Archeologici e Monumentali (IBAM), Via Biblioteca, 4, 95124 Catania (Italy); Istituto Nazionale di Fisica Nucleare (INFN), LNS, Via S.Sofia 62, 95125 Catania (Italy); and others

    2015-04-01

    Recently, developments have been made to the external scanning microbeam of INFN-LABEC laboratory in Florence. A new system for mechanical sample scanning was implemented. This system allows us to acquire large maps (up to 20 × 20 cm{sup 2}), of great interest in the Cultural Heritage field. In parallel, the possibility of using carbon microbeams for experiments, such as, for example, ion beam modification of materials and MeV Secondary Ion Mass Spectrometry, has been investigated. As a test application, Particle Induced X-ray Emission with carbon microbeams has been performed on a lapis lazuli stone. First results for both wide area imaging and external carbon microbeams are briefly reported.

  18. Leakage localization with an acoustic array that covers a wide area for pipeline leakage monitoring in a closed space

    Energy Technology Data Exchange (ETDEWEB)

    Park, Choon Su [Center for Safety Measurements, Division of Metrology for Quality of Life, Korea Research institute of Standards and Science, Daejeon (Korea, Republic of); Jeon, Jong Hoon [Hyundai Heavy Industry Co.,Ltd., Ulsan (Korea, Republic of); Park, Jin Ho [Korea Atomiv Energy Institute, Daejeon (Korea, Republic of)

    2013-10-15

    It is of great importance to localize leakages in complex pipelines for assuring their safety. A sensor array that can detect where leakages occur enables us to monitor a wide area with a relatively low cost. Beam forming is a fast and efficient algorithm to estimate where sources are, but it is generally made use of in free field condition. In practice, however, many pipelines are placed in a closed space for the purpose of safety and maintenance. This leads us to take reflected waves into account to the beam forming for interior leakage localization. Beam power distribution of reflected waves in a closed space is formulated, and spatial average is introduced to suppress the effect of reflected waves. Computer simulations and experiments ensure how the proposed method is effective to localize leakage in a closed space for structural health monitoring.

  19. A GIS-assisted approach to wide-area wind resource assessment and site selection for the state of Colorado

    Energy Technology Data Exchange (ETDEWEB)

    Brower, M.C. [Brower & Company, Andover, MA (United States); Hurley, P. [RLA Consulting, Bothell, WA (United States); Simon, R. [Consulting Meteorologist, Mill Valley, CA (United States)

    1996-12-31

    This paper describes the methodology and results of a wide-area wind resource assessment and site selection in Colorado. This was the first phase in a three-part assessment and monitoring program conducted for the State of Colorado Office of Energy Conservation and several collaborating utilities. The objective of this phase was to identify up to 20 candidate sites for evaluation and possible long-term monitoring. This was accomplished using a geographic information system (GIS), which takes into account such factors as topography, existing wind resource data, locations of transmission lines, land cover, and land use. The resulting list of sites recommended for evaluation in Phase 2 of the study includes locations throughout Colorado, but most are in the eastern plains. The GIS wind siting model may be modified and updated in the future as additional information becomes available. 3 figs., 1 tab.

  20. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  1. Public relations and political support in area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Dyck, V.A.; Regidor Fernandez, E.E.; Reyes Flores, J.; Teruya, T.; Barnes, B.; Gomez Riera, P.; Lindquist, D.; Reuben, R.

    2005-01-01

    The public relations component of area-wide integrated pest management (AW-IPM) programmes that integrate the sterile insect technique (SIT) has a large impact on programme success. Full-time professionals should direct public relations activities and secure vital political support from governments and community organizations. Good communication among programme staff, and between programme staff and the public, is required to maintain participation and support, and to keep the work goal-oriented even when some programme activities are controversial. The media can be valuable and effective partners by informing the public about the real facts and activities of a programme, especially if this is done in a non-technical and straightforward way. Ongoing research support improves the programme technology, provides technical credibility on contentious issues, and solves operational problems. Programme failure can result from poor public relations and inadequate public support. (author)

  2. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  3. Wide area scanning system and carbon microbeams at the external microbeam facility of the INFN LABEC laboratory in Florence

    International Nuclear Information System (INIS)

    Giuntini, L.; Massi, M.; Calusi, S.; Castelli, L.; Carraresi, L.; Fedi, M.E.; Gelli, N.; Liccioli, L.; Mandò, P.A.; Mazzinghi, A.; Palla, L.; Romano, F.P.

    2015-01-01

    Recently, developments have been made to the external scanning microbeam of INFN-LABEC laboratory in Florence. A new system for mechanical sample scanning was implemented. This system allows us to acquire large maps (up to 20 × 20 cm 2 ), of great interest in the Cultural Heritage field. In parallel, the possibility of using carbon microbeams for experiments, such as, for example, ion beam modification of materials and MeV Secondary Ion Mass Spectrometry, has been investigated. As a test application, Particle Induced X-ray Emission with carbon microbeams has been performed on a lapis lazuli stone. First results for both wide area imaging and external carbon microbeams are briefly reported

  4. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  5. The use of semiochemical-based devices and formulations in area-wide programmes - A commercial perspective

    International Nuclear Information System (INIS)

    Jones, Owen T.; Casagrande, Enzo D.

    2000-01-01

    It is now almost 40 years since the first insect pheromone was isolated and identified and many authors have referred over the years to their commercial potential. Although much progress has been made during those years in terms of scientific and technological advances related to semiochemicals, the 'progress' that has actually been made in the commercial exploitation of pheromones and other semiochemicals has been rather limited when viewed in terms of their share of the agrochemical market. Based on published data and unpublished information which has been made available to the authors, semiochemical-based products are estimated to have world-wide sales in the US$70-80 million range at the manufacturers' level. This compares with a world-wide insecticide market of nearly US$8 billion in 1995 so that it therefore constitutes less than 1% of that market. In terms of the biopesticide market (bacteria, viruses, botanical insecticides, entomopathogenic nematodes and beneficial insects) on the other hand, semiochemicals constitute a much higher percentage (ca. 30%) and probably are third in importance after bacterial and botanical products. The industry has taken over 20 years to achieve its current size and has been pioneered mostly by small to medium-sized enterprises (SMEs). Several technical and biological factors have played a part in determining the rate at which semiochemical-based technology has been adopted commercially in the field but one factor in particular has greatly influenced this technology transfer process, namely, area-wide programmes. These have often been government-backed programmes that have demonstrated the effectiveness of the semiochemical-based technique being implemented and have convinced the farmers and growers of the benefits that these novel techniques can bring. Several strategies have been developed where semiochemicals have been used either alone or in combination with other control technologies but three in particular stands out

  6. Deep seismic transect across the Tonankai earthquake area obtained from the onshore- offshore wide-angle seismic study

    Science.gov (United States)

    Nakanishi, A.; Obana, K.; Kodaira, S.; Miura, S.; Fujie, G.; Ito, A.; Sato, T.; Park, J.; Kaneda, Y.; Ito, K.; Iwasaki, T.

    2008-12-01

    In the Nankai Trough subduction seismogenic zone, M8-class great earthquake area can be divided into three segments; they are source regions of the Nankai, Tonankai and presumed Tokai earthquakes. The Nankai and Tonankai earthquakes had often occurred simultaneously, and caused a great event. Hypocenters of these great earthquakes were usually located off the cape Shiono, Kii Peninsula, and the rupture propagated westwards and eastwards, respectively. To obtain the deep structure of the down-dip limit of around the Nankai Trough seismogenic zone, the segment boundary and first break area off the Kii Peninsula, the onshore-offshore wide-angle seismic studies was conducted in the western and eastern part of the Kii Peninsula and their offshore area in 2004 and 2006, respectively. The result of the seismic study in 2004 is mainly shown here. Structural images along the onshore and offshore profiles have already been separately obtained. In this study, an onshore-offshore integrated image of the western part of the Kii Peninsula, ~400km in a total length, is obtained from first arrival tomography and traveltime mapping of reflection phases by combining dataset of 13 land explosions, 2269 land stations, 36 OBSs and 1806 offshore airgun shots. The subduction angle of the Philippine Sea plate (PSP) gradually increases landward up to ~20-25 degree. Beneath the onshore part, the subducting PSP is estimated at ~5km shallower than that previously derived from seismicity. Low frequency earthquakes (identified and picked by Japan Meteorological Agency) are relocated around the plate interface of the subducting PSP by using the deep seismic transect obtained in this study. The offshore research is part of 'Structure research on plate dynamics of the presumed rupture zone of the Tonankai-Nankai Earthquakes' funded by Ministry of Education, Culture, Sports, Science and Technology (MEXT). The onshore research carried by the Kyoto University is part of 'Special Project for

  7. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  8. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wim Dehaene

    2007-12-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  9. SmartMIMO: An Energy-Aware Adaptive MIMO-OFDM Radio Link Control for Next-Generation Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Dehaene Wim

    2007-01-01

    Full Text Available Multiantenna systems and more particularly those operating on multiple input and multiple output (MIMO channels are currently a must to improve wireless links spectrum efficiency and/or robustness. There exists a fundamental tradeoff between potential spectrum efficiency and robustness increase. However, multiantenna techniques also come with an overhead in silicon implementation area and power consumption due, at least, to the duplication of part of the transmitter and receiver radio front-ends. Although the area overhead may be acceptable in view of the performance improvement, low power consumption must be preserved for integration in nomadic devices. In this case, it is the tradeoff between performance (e.g., the net throughput on top of the medium access control layer and average power consumption that really matters. It has been shown that adaptive schemes were mandatory to avoid that multiantenna techniques hamper this system tradeoff. In this paper, we derive smartMIMO: an adaptive multiantenna approach which, next to simply adapting the modulation and code rate as traditionally considered, decides packet-per-packet, depending on the MIMO channel state, to use either space-division multiplexing (increasing spectrum efficiency, space-time coding (increasing robustness, or to stick to single-antenna transmission. Contrarily to many of such adaptive schemes, the focus is set on using multiantenna transmission to improve the link energy efficiency in real operation conditions. Based on a model calibrated on an existing reconfigurable multiantenna transceiver setup, the link energy efficiency with the proposed scheme is shown to be improved by up to 30% when compared to nonadaptive schemes. The average throughput is, on the other hand, improved by up to 50% when compared to single-antenna transmission.

  10. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Hao, Yang; Foster, Robert

    2008-01-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  11. Area-wide control of fruit flies and other insect pests. Joint proceedings of the international conference on area-wide control of insect pests and the fifth international symposium on fruit flies of economic importance

    International Nuclear Information System (INIS)

    Tan, Keng-Hong

    2000-01-01

    With the world population attaining the six billion mark, the urgency of increasing quality food production and reducing the spread of diseases transmitted by insects, without affecting our fragile environment, will be of paramount importance. Losses currently experienced in agricultural production, due to insect pests and through diseases transmitted by insect vectors, are very high especially in developing and poor countries. Many insect pests and vectors are of economic importance, and several such as fruit flies, mosquitoes and tsetse flies have attracted international concerns. Most pests are traditionally controlled through heavy reliance on pesticides which can cause environmental pollution, pesticide resistance, and pest resurgence. The control, management or eradication of insect pests and vectors with minimal adverse impact on our food quality, environment, health and well-being should be of great concern to many agriculturists, biological and physical scientists as well as to national and international agencies responsible for pest control. Steps taken by the various concerned agencies to improve and implement the area-wide control will hopefully lead us into the next millennium free from major insect pests and vectors while at the same time protect our precarious global environment. This volume is the culmination of proceedings conducted in two recent international meetings, FAO/IAEA International Conference on Area-Wide Control of Insect Pests, 28 May - 2 June 1998, and the Fifth International Symposium on Fruit Flies of Economic Importance, 1-5 June 1998, held in Penang, Malaysia. Over three hundred papers (both oral contributions and posters) were presented at the two meetings. The manuscripts submitted by authors are divided according to broad topics into eighteen sections originally defined by the organisers as corresponding to the sessions of the meetings. The organisers identified one to several individuals in each of the sessions to deliver an

  12. TV White spaces for wireless broadband in rural areas: the regulator, broadcaster and telecommunication(s) operator viewpoint

    CSIR Research Space (South Africa)

    Mfupe, LP

    2012-05-01

    Full Text Available Communications Authority of South Africa (ICASA) has recently conducted occupancy measurement audit of two Ultra High Frequency (UHF) radio spectrum bands: the 450 - 470 MHz and the 790- 862 MHz in major South African cities. The results from these audits..., such as 3GPP Long Term Evolution (LTE), to a possible operation in UHF TVWS bands is considered. In many cases, it is assumed that TVWS would be largely available in rural areas where broadband connectivity is rarely available. The LTE - Time Division...

  13. Sensor Fusion of Position- and Micro-Sensors (MEMS) integrated in a Wireless Sensor Network for movement detection in landslide areas

    Science.gov (United States)

    Arnhardt, Christian; Fernández-Steeger, Tomas; Azzam, Rafig

    2010-05-01

    Monitoring systems in landslide areas are important elements of effective Early Warning structures. Data acquisition and retrieval allows the detection of movement processes and thus is essential to generate warnings in time. Apart from the precise measurement, the reliability of data is fundamental, because outliers can trigger false alarms and leads to the loss of acceptance of such systems. For the monitoring of mass movements and their risk it is important to know, if there is movement, how fast it is and how trustworthy is the information. The joint project "Sensorbased landslide early warning system" (SLEWS) deals with these questions, and tries to improve data quality and to reduce false alarm rates, due to the combination of sensor date (sensor fusion). The project concentrates on the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides by using various low-cost sensors, integrated in a wireless sensor network (WSN). The network consists of numerous connection points (nodes) that transfer data directly or over other nodes (Multi-Hop) in real-time to a data collection point (gateway). From there all the data packages are transmitted to a spatial data infrastructure (SDI) for further processing, analyzing and visualizing with respect to end-user specifications. The ad-hoc characteristic of the network allows the autonomous crosslinking of the nodes according to existing connections and communication strength. Due to the independent finding of new or more stable connections (self healing) a breakdown of the whole system is avoided. The bidirectional data stream enables the receiving of data from the network but also allows the transfer of commands and pointed requests into the WSN. For the detection of surface deformations in landslide areas small low-cost Micro-Electro-Mechanical-Systems (MEMS) and positionsensors from the automobile industries, different industrial applications and from other measurement

  14. Economic evaluation of an area-wide integrated pest management program to control the Asian tiger mosquito in New Jersey.

    Science.gov (United States)

    Shepard, Donald S; Halasa, Yara A; Fonseca, Dina M; Farajollahi, Ary; Healy, Sean P; Gaugler, Randy; Bartlett-Healy, Kristen; Strickman, Daniel A; Clark, Gary G

    2014-01-01

    Aedes albopictus is the most invasive mosquito in the world, an important disease vector, and a biting nuisance that limits outdoor activities. Area-wide integrated pest management (AW-IPM) is the recommended control strategy. We conducted an economic evaluation of the AW-IPM project in Mercer and Monmouth Counties, New Jersey with a controlled design (AW-IPM vs. control) from 2009 through 2011. The study analyzed financial documents and staff time for AW-IPM and surveyed an average of 415 randomly chosen households in AW-IPM and control areas each fall from 2008 through 2011. Hours lost from yard and porch activities were calculated as differences between actual and potential hours of these activities in an average summer week if there had been no mosquito concerns. Net estimated benefits of AW-IPM were based on cross-over and difference-in-difference analyses. Reductions in hours lost were valued based on respondents' willingness to pay for a hypothetical extra hour free of mosquitoes spent on yard or porch activities and literature on valuation of a quality adjusted life year (QALY). The incremental cost of AW-IPM per adult was $41.18 per year. Number of hours lost due to mosquitoes in AW-IPM areas between the base year (2008) and the intervention years (2009-2011) declined by 3.30 hours per summer week in AW-IPM areas compared to control areas. Survey respondents valued this improvement at $27.37 per adult per summer week. Over the 13-week summer, an average adult resident gained 42.96 hours of yard and porch time, worth $355.82. The net benefit over the summer was $314.63. With an average of 0.0027 QALYs gained per adult per year, AW-IPM was cost effective at $15,300 per QALY gained. The benefit-cost ratio from hours gained was 8.64, indicating that each $1 spent on AW-IPM gave adults additional porch and yard time worth over $8.

  15. Economic evaluation of an area-wide integrated pest management program to control the Asian tiger mosquito in New Jersey.

    Directory of Open Access Journals (Sweden)

    Donald S Shepard

    Full Text Available Aedes albopictus is the most invasive mosquito in the world, an important disease vector, and a biting nuisance that limits outdoor activities. Area-wide integrated pest management (AW-IPM is the recommended control strategy. We conducted an economic evaluation of the AW-IPM project in Mercer and Monmouth Counties, New Jersey with a controlled design (AW-IPM vs. control from 2009 through 2011. The study analyzed financial documents and staff time for AW-IPM and surveyed an average of 415 randomly chosen households in AW-IPM and control areas each fall from 2008 through 2011. Hours lost from yard and porch activities were calculated as differences between actual and potential hours of these activities in an average summer week if there had been no mosquito concerns. Net estimated benefits of AW-IPM were based on cross-over and difference-in-difference analyses. Reductions in hours lost were valued based on respondents' willingness to pay for a hypothetical extra hour free of mosquitoes spent on yard or porch activities and literature on valuation of a quality adjusted life year (QALY. The incremental cost of AW-IPM per adult was $41.18 per year. Number of hours lost due to mosquitoes in AW-IPM areas between the base year (2008 and the intervention years (2009-2011 declined by 3.30 hours per summer week in AW-IPM areas compared to control areas. Survey respondents valued this improvement at $27.37 per adult per summer week. Over the 13-week summer, an average adult resident gained 42.96 hours of yard and porch time, worth $355.82. The net benefit over the summer was $314.63. With an average of 0.0027 QALYs gained per adult per year, AW-IPM was cost effective at $15,300 per QALY gained. The benefit-cost ratio from hours gained was 8.64, indicating that each $1 spent on AW-IPM gave adults additional porch and yard time worth over $8.

  16. Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender

    methods and techniques in different areas and brings them together to create an efficient verification system. The overall ambition is to provide a wide range of powerful techniques for analyzing models with quantitative and qualitative security information. We stated a new approach that first verifies...... applications, home automation, and traffic control. The challenges for research in this area are due to the unique features of wireless sensor devices such as low processing power and associated low energy. On top of this, wireless sensor networks need secure communication as they operate in open fields...... low level security protocol s in a qualitative manner and guarantees absolute security, and then takes these verified protocols as actions of scenarios to be verified in a quantitative manner. Working on the emerging ZigBee wireless sensor networks, we used probabilistic verification that can return...

  17. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  18. Wide-area mapping of resting state hemodynamic correlations at microvascular resolution with multi-contrast optical imaging (Conference Presentation)

    Science.gov (United States)

    Senarathna, Janaka; Hadjiabadi, Darian; Gil, Stacy; Thakor, Nitish V.; Pathak, Arvind P.

    2017-02-01

    Different brain regions exhibit complex information processing even at rest. Therefore, assessing temporal correlations between regions permits task-free visualization of their `resting state connectivity'. Although functional MRI (fMRI) is widely used for mapping resting state connectivity in the human brain, it is not well suited for `microvascular scale' imaging in rodents because of its limited spatial resolution. Moreover, co-registered cerebral blood flow (CBF) and total hemoglobin (HbT) data are often unavailable in conventional fMRI experiments. Therefore, we built a customized system that combines laser speckle contrast imaging (LSCI), intrinsic optical signal (IOS) imaging and fluorescence imaging (FI) to generate multi-contrast functional connectivity maps at a spatial resolution of 10 μm. This system comprised of three illumination sources: a 632 nm HeNe laser (for LSCI), a 570 nm ± 5 nm filtered white light source (for IOS), and a 473 nm blue laser (for FI), as well as a sensitive CCD camera operating at 10 frames per second for image acquisition. The acquired data enabled visualization of changes in resting state neurophysiology at microvascular spatial scales. Moreover, concurrent mapping of CBF and HbT-based temporal correlations enabled in vivo mapping of how resting brain regions were linked in terms of their hemodynamics. Additionally, we complemented this approach by exploiting the transit times of a fluorescent tracer (Dextran-FITC) to distinguish arterial from venous perfusion. Overall, we demonstrated the feasibility of wide area mapping of resting state connectivity at microvascular resolution and created a new toolbox for interrogating neurovascular function.

  19. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  20. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  1. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2004-01-01

    A prototype tracking system was built and tested. Moving vehicles were detected by the tracking system when a vehicle was 20 to 30 feet away from a location sensor. The identity of the vehicle was transmitted to Transtek's in-mine communications system and relayed to a desktop computer.

  2. WIRELESS MINE-WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2003-01-01

    We added data transmission to the through-the-earth communications system using quadrature synchronous detection. The results are adequate for computer-to-computer communication as well as for sensor data transmission. We added a feature to the in-mine communications system that allows a person to call an individual, rather than broadcasting, by dialing an identification number before speaking.

  3. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  4. Evaluation of the United States Department of Agriculture Northeast Area-Wide Tick Control Project by Meta-Analysis

    Science.gov (United States)

    Brei, Brandon; George, John E.; Pound, J. Mathews; Miller, J. Allen; Daniels, Thomas J.; Falco, Richard C.; Stafford, Kirby C.; Schulze, Terry L.; Mather, Thomas N.; Carroll, John F.; Fish, Durland

    2009-01-01

    Abstract As part of the Northeast Area-wide Tick Control Project (NEATCP), meta-analyses were performed using pooled data on the extent of tick-vector control achieved through seven concurrent studies, conducted within five states, using U.S. Department of Agriculture “4-Poster” devices to deliver targeted-acaricide to white-tailed deer. Although reductions in the abundance of all life-stages of Ixodes scapularis were the measured outcomes, this study focused on metrics associated with I. scapularis nymphal tick densities as this measure has consistently proven to directly correlate with human risk of acquiring Lyme disease. Since independent tick sampling schemes were undertaken at each of the five environmentally distinct study locations, a meta-analytic approach permitted estimation of a single true control-effect size for each treatment year of the NEATCP. The control-effect is expressed as the annual percent I. scapularis nymphal control most consistent with meta-analysis data for each treatment year. Our meta-analyses indicate that by the sixth treatment year, the NEATCP effectively reduced the relative density of I. scapularis nymphs by 71% on the 5.14 km2 treatment sites, corresponding to a 71% lower relative entomologic risk index for acquiring Lyme disease. PMID:19650737

  5. Wide-area measurement system-based supervision of protection schemes with minimum number of phasor measurement units.

    Science.gov (United States)

    Gajare, Swaroop; Rao, J Ganeswara; Naidu, O D; Pradhan, Ashok Kumar

    2017-08-13

    Cascade tripping of power lines triggered by maloperation of zone-3 relays during stressed system conditions, such as load encroachment, power swing and voltage instability, has led to many catastrophic power failures worldwide, including Indian blackouts in 2012. With the introduction of wide-area measurement systems (WAMS) into the grids, real-time monitoring of transmission network condition is possible. A phasor measurement unit (PMU) sends time-synchronized data to a phasor data concentrator, which can provide a control signal to substation devices. The latency associated with the communication system makes WAMS suitable for a slower form of protection. In this work, a method to identify the faulted line using synchronized data from strategic PMU locations is proposed. Subsequently, a supervisory signal is generated for specific relays in the system for any disturbance or stressed condition. For a given system, an approach to decide the strategic locations for PMU placement is developed, which can be used for determining the minimum number of PMUs required for application of the method. The accuracy of the scheme is tested for faults during normal and stressed conditions in a New England 39-bus system simulated using EMTDC/PSCAD software. With such a strategy, maloperation of relays can be averted in many situations and thereby blackouts/large-scale disturbances can be prevented.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  6. Guidance for packing, shipping, holding and release of sterile flies in area-wide fruit fly control programmes

    International Nuclear Information System (INIS)

    Enkerlin, W.

    2007-01-01

    This guidance represents the recommendations, reached by consensus of an international group of experts, on the standard procedures for the packing, shipping, holding and release of mass reared and sterilized tephritid flies that are to be used in area-wide programmes that include the Sterile Insect Technique (SIT). The majority of the procedures were initially designed specifically for the Mediterranean fruit fly Ceratitis capitata (Wiedemann) (or Medfly), but they are applicable, with minor modifications, for other tephritid species such as those in the genera Anastrepha, Bactrocera and Dacus. The guidance is designed to be a working document that can be subject to periodic updates due to technological developments and research contributions. Future editions will endeavour to include more specific recommendations for other species of fruit flies as the relevant data become available. The procedures described in this guidance will help ensure that released sterile fruit flies will be of optimal quality and that the resulting field density of these flies will be as closely aligned to the individual programme needs. It is hoped that this guidance will help to quickly identify and correct problems in programme effectiveness, resulting from less than optimal emergence and release conditions

  7. Advanced Wireless Sensor Nodes - MSFC

    Science.gov (United States)

    Varnavas, Kosta; Richeson, Jeff

    2017-01-01

    NASA field center Marshall Space Flight Center (Huntsville, AL), has invested in advanced wireless sensor technology development. Developments for a wireless microcontroller back-end were primarily focused on the commercial Synapse Wireless family of devices. These devices have many useful features for NASA applications, good characteristics and the ability to be programmed Over-The-Air (OTA). The effort has focused on two widely used sensor types, mechanical strain gauges and thermal sensors. Mechanical strain gauges are used extensively in NASA structural testing and even on vehicle instrumentation systems. Additionally, thermal monitoring with many types of sensors is extensively used. These thermal sensors include thermocouples of all types, resistive temperature devices (RTDs), diodes and other thermal sensor types. The wireless thermal board will accommodate all of these types of sensor inputs to an analog front end. The analog front end on each of the sensors interfaces to the Synapse wireless microcontroller, based on the Atmel Atmega128 device. Once the analog sensor output data is digitized by the onboard analog to digital converter (A/D), the data is available for analysis, computation or transmission. Various hardware features allow custom embedded software to manage battery power to enhance battery life. This technology development fits nicely into using numerous additional sensor front ends, including some of the low-cost printed circuit board capacitive moisture content sensors currently being developed at Auburn University.

  8. Designing and implementing a geographical information system: A guide for managers of area-wide pest management programmes

    International Nuclear Information System (INIS)

    2006-04-01

    Over the past two decades, the use of computer software and mapping methods known as geographical information systems (GIS) has been adopted by an ever growing variety of professionals. Every activity that deals with location dependent information can use GIS, and agriculture is no exception. The potential of GIS and remote sensing (RS) to facilitate the planning and implementation of areawide integrated pest management (AW-IPM) programmes is enormous but unfortunately, these methods are still much underused. AW-IPM programmes, especially those that integrate the sterile insect technique (SIT) with other surveillance and control methods, would benefit considerably by drawing on GIS/RS. These programmes are often implemented over large areas of even tens of thousands of square kilometres, where surveillance methods are deployed and large data sets are systematically generated on a daily basis. The acquisition of geo-referenced data sets on pest presence/absence, relative abundance, disease prevalence, crop damage, etc., that will allow accurate spatial and temporal analysis is important for proper and timely decision making to efficiently plan and implement any operational pest management programme. Animal health and plant protection officials and pest control programme managers might be intuitively aware of the importance of employing GIS as an analytical tool. However, they often lack a deeper understanding of its capabilities. Since GIS is a desk exercise using computers, data analysis is often left to the computer staff without proper directives from the programme managers on programmatic needs. This is unfortunate as it will usually NOT bring the desired GIS-processed information to the decision makers. This manual targets area-wide pest control programme administrators and managers of FAO and IAEA Member States in an attempt to demonstrate the type of data processing and spatial analysis that can be expected of GIS. The manual does not aim to provide

  9. Preparing the way for coming area wide integrated pest management projects against the new world screwworm, Cochliomyia hominivorax, in MERCOSUR

    Energy Technology Data Exchange (ETDEWEB)

    Mastrangelo, Thiago; Fernandes, Thiago; Walder, Julio, E-mail: piaui@cena.usp.br [Centro de Energia Nuclear na Agricultura (CENA/USP), Piracicaba, SP (Brazil); Bezerra, Fernando [Instituto Federal de Educacao, Ciencia e Tecnologia do Sertao Pernambucano (IFSERTAO-PE), Petrolina, PE (Brazil)

    2011-07-01

    The New World Screwworm (NWS), Cochliomyia hominivorax, was eradicated from the USA, Central America to Panama, but in most tropical regions of Latin America, the NWS is still a serious threat to livestock, provoking estimated annual losses of US$ 1.8 billion in Brazil. Between January and May 2009, a pilot-project was performed at the Brazil-Uruguay border. As the results were positive, novel regional Area-Wide Integrated Pest Management projects are being planned. To set a mass-rearing center based in South America is strategic when considering long-term programs. In partnership with CENA/USP and the Biofactory MOSCAMED Brazil, a project to produce sterile NWS started on 2009. The project aimed to maintain a colony of a regional NWS strain, to develop a mass-rearing system and a sterilization protocol by X rays, and to study the sterility induction in regional strains. A colony was successfully established. The adults were kept in cages and fed on a diet (honey and spray dried egg). The larvae were reared in a medium made of spray dried blood, spray dried egg, milk, water, formalin and Ecogel. Egg hatch has been of 80 {+-} 10%. From F{sub 1} to F{sub 22}, the total amount of pupae produced was about 38 L ({approx} 315,400 pupae). The mean adult emergence and sex ratio were 86.7 {+-} 3% and 0.59 {+-} 0.08 respectively. The mean pupal weight was 47.1 {+-} 1.7 mg. The estimated X ray doses to induce 99% sterility in males and females were 43.7 Gy and 47.5 Gy, respectively. To produce 1.5 L of pupae, the current cost is about US$ 15.00. (author)

  10. Preparing the way for coming area wide integrated pest management projects against the new world screwworm, Cochliomyia hominivorax, in MERCOSUR

    International Nuclear Information System (INIS)

    Mastrangelo, Thiago; Fernandes, Thiago; Walder, Julio; Bezerra, Fernando

    2011-01-01

    The New World Screwworm (NWS), Cochliomyia hominivorax, was eradicated from the USA, Central America to Panama, but in most tropical regions of Latin America, the NWS is still a serious threat to livestock, provoking estimated annual losses of US$ 1.8 billion in Brazil. Between January and May 2009, a pilot-project was performed at the Brazil-Uruguay border. As the results were positive, novel regional Area-Wide Integrated Pest Management projects are being planned. To set a mass-rearing center based in South America is strategic when considering long-term programs. In partnership with CENA/USP and the Biofactory MOSCAMED Brazil, a project to produce sterile NWS started on 2009. The project aimed to maintain a colony of a regional NWS strain, to develop a mass-rearing system and a sterilization protocol by X rays, and to study the sterility induction in regional strains. A colony was successfully established. The adults were kept in cages and fed on a diet (honey and spray dried egg). The larvae were reared in a medium made of spray dried blood, spray dried egg, milk, water, formalin and Ecogel. Egg hatch has been of 80 ± 10%. From F 1 to F 22 , the total amount of pupae produced was about 38 L (∼ 315,400 pupae). The mean adult emergence and sex ratio were 86.7 ± 3% and 0.59 ± 0.08 respectively. The mean pupal weight was 47.1 ± 1.7 mg. The estimated X ray doses to induce 99% sterility in males and females were 43.7 Gy and 47.5 Gy, respectively. To produce 1.5 L of pupae, the current cost is about US$ 15.00. (author)

  11. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sabrina Boubiche

    2016-04-01

    Full Text Available Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  12. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  13. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  14. Artificial Neural Network for Location Estimation in Wireless Communication Systems

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2012-03-01

    Full Text Available In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS. To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA measurements and the angle of arrival (AOA information to locate MS when three base stations (BSs are available. Artificial neural networks (ANN are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line, based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  15. Artificial neural network for location estimation in wireless communication systems.

    Science.gov (United States)

    Chen, Chien-Sheng

    2012-01-01

    In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS). To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA) measurements and the angle of arrival (AOA) information to locate MS when three base stations (BSs) are available. Artificial neural networks (ANN) are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line), based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS) environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  16. Effectiveness of the Area-wide Pest Management Program to Control Asian Tiger Mosquito in New Jersey: Evidence from a Household Survey

    Science.gov (United States)

    Households’ behaviors can both mitigate and measure the spread of urban mosquitos. Beginning in 2009, a comprehensive area-wide pest management (AWPM) project to control Aedes albopictus was implemented in 4 areas in Monmouth and Mercer Counties, New Jersey. Including other activities, the project f...

  17. Effectiveness of the area wide pest management program to control asian tiger mosquito in New Jersey: evidence from a household survey

    Science.gov (United States)

    Households’ behaviors can both mitigate and measure the spread of urban mosquito species. Beginning in 2009, an area-wide pest management (AWPM) project to control Ae. Albopictus was implemented in 6 areas in Monmouth and Mercer counties, NJ. Including other activities, the project focused on increa...

  18. Raspberry Pi Based Intelligent Wireless Sensor Node for Localized Torrential Rain Monitoring

    Directory of Open Access Journals (Sweden)

    Zhaozhuo Xu

    2016-01-01

    Full Text Available Wireless sensor networks are proved to be effective in long-time localized torrential rain monitoring. However, the existing widely used architecture of wireless sensor networks for rain monitoring relies on network transportation and back-end calculation, which causes delay in response to heavy rain in localized areas. Our work improves the architecture by applying logistic regression and support vector machine classification to an intelligent wireless sensor node which is created by Raspberry Pi. The sensor nodes in front-end not only obtain data from sensors, but also can analyze the probabilities of upcoming heavy rain independently and give early warnings to local clients in time. When the sensor nodes send the probability to back-end server, the burdens of network transport are released. We demonstrate by simulation results that our sensor system architecture has potentiality to increase the local response to heavy rain. The monitoring capacity is also raised.

  19. FAO/IAEA international conference on area-wide control of insect pests: Integrating the sterile insect and related nuclear and other techniques. Book of extended synopses

    International Nuclear Information System (INIS)

    2005-01-01

    The successful implementation of area-wide pest control programmes integrating the use of sterile insects with other control technologies against a number of key veterinary, medical and plant insect pests, such as various fruit flies, moths, screwworms, and tsetse species, clearly demonstrates a peaceful application of nuclear technology. Over the last 40 years, FAO and IAEA have played, and they will continue to play, a critical role in supporting their Member States in the development and application of these environment-friendly pest control methods. The concept of area-wide integrated pest management, in which the total population of a pest in an area or region is targeted, is central to the effective application of the Sterile Insect Technique (SIT) and is increasingly being considered for related genetic, biological and other pest control technologies. Insect movement, occurring sometimes over long distances, is generally underestimated. As a consequence, most conventional pest control can be described as localized, un-coordinated action against segments of a pest population, resulting very often in an unsustainable spiral of insecticide application and eventual resistance. However, an area-wide integrated approach adopts a preventive rather than a reactive tactic, whereby all individuals of the pest population are targeted, requiring fewer inputs and resulting in more cost effective and sustainable control. In June 1998 FAO and IAEA sponsored the First International Conference on Area-Wide Control of Insect Pests Integrating the Sterile Insect and Related Nuclear and other Techniques in Penang, Malaysia with the participation of almost 300 participants from 63 Member States and 5 international organizations. This Conference greatly increased awareness concerning the area-wide approach for insect pest control programmes. Since then, many new technical innovations have been introduced and a better regulatory framework is being developed for integrating SIT

  20. FAO/IAEA international conference on area-wide control of insect pests: Integrating the sterile insect and related nuclear and other techniques. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The successful implementation of area-wide pest control programmes integrating the use of sterile insects with other control technologies against a number of key veterinary, medical and plant insect pests, such as various fruit flies, moths, screwworms, and tsetse species, clearly demonstrates a peaceful application of nuclear technology. Over the last 40 years, FAO and IAEA have played, and they will continue to play, a critical role in supporting their Member States in the development and application of these environment-friendly pest control methods. The concept of area-wide integrated pest management, in which the total population of a pest in an area or region is targeted, is central to the effective application of the Sterile Insect Technique (SIT) and is increasingly being considered for related genetic, biological and other pest control technologies. Insect movement, occurring sometimes over long distances, is generally underestimated. As a consequence, most conventional pest control can be described as localized, un-coordinated action against segments of a pest population, resulting very often in an unsustainable spiral of insecticide application and eventual resistance. However, an area-wide integrated approach adopts a preventive rather than a reactive tactic, whereby all individuals of the pest population are targeted, requiring fewer inputs and resulting in more cost effective and sustainable control. In June 1998 FAO and IAEA sponsored the First International Conference on Area-Wide Control of Insect Pests Integrating the Sterile Insect and Related Nuclear and other Techniques in Penang, Malaysia with the participation of almost 300 participants from 63 Member States and 5 international organizations. This Conference greatly increased awareness concerning the area-wide approach for insect pest control programmes. Since then, many new technical innovations have been introduced and a better regulatory framework is being developed for integrating SIT

  1. BLUETOOTH WIRELESS TECHNOLOGY: A MILESTONE IN ICT

    African Journals Online (AJOL)

    DJFLEX

    This article summarizes the Bluetooth technology – a type of Wireless Personal Area Network (WPAN) with emphasis ... facilitating data transmission over short distances from fixed and ... primarily designed for low power consumption, with a.

  2. WirelessHART vs. ISA100.11a: The Format War Hits the Factory Floor

    OpenAIRE

    Petersen, Stig; Carlsen, Simon

    2011-01-01

    The first decade of the new millennium has been a stage for the rapid development of wireless communication technologies for low-cost, low-power wireless solutions capable of robust and reliable communication [1]. IEEE Standard 802.15.4 for low-rate wireless personal area networks (WPANs) [2] has been the enabling technology for numerous applications within the field of wireless sensor networks (WSNs) [3], and more recently, wireless instrumentation. Although WSNs quickly found their way into...

  3. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  6. Does tree harvesting in riparian areas increase stream sedimentation and turbidity - world-wide experience relative to Australia.

    Science.gov (United States)

    Neary, D.; Smethurst, P.; Petrone, K.

    2009-04-01

    A typical improved-pasture property in the high-rainfall zone of Australia contains 0.5-2.0 km of waterways per 100 ha. Nationwide, some 25-30 million ha of improved pasture contains about 100,000 km of streams, of which about 75% are currently un-buffered and contributing to soil and water degradation. Farmers and natural resource managers are considering ways to enhance environmental outcomes at farm and catchment scales using stream-side buffers of trees and other perennial vegetation. Benefits of buffers include improved water quality, biodiversity, carbon sequestration and aesthetics. Lack of sound information and funding for establishing and managing buffer zones is hindering wide-scale adoption of this practice. Stream-side areas of farms are generally highly productive (wet and nutrient-rich) and contain a high biodiversity, but they are also high-risk zones for soil and water values and stock safety. Development of options based on a balance between environmental and economic outcomes would potentially promote wider adoption. Australian codes of forest practice currently discourage or prevent harvesting of trees in streamside buffers. These codes were developed exclusively for large-scale native forests and industrial-scale plantations, and were applicable to farm forestry as now required. In countries including USA and Germany trees in stream-side buffers are harvested using Best Management Practices. Trees may grow at a faster rate in riparian zones and provide a commercial return, but the impacts of tree establishment and harvesting on water yield and quality must be evaluated. However, there have been few designed experiments investigating this problem. Australia has recently initiated studies to explore the use of high-value timber species and associated vegetation in riparian zones to improve water quality, particularly suspended sediment. Preliminary information from the Yan Yan Gurt Catchment in Victoria indicate that forested riparian strips can

  7. IMPACT OF WIRELESS TECHNOLOGIES ON HUMAN HEALTH

    OpenAIRE

    Pejnović, Natalija

    2009-01-01

    SUMMARY: This paper explores adverse impacts of wireless technologies on user health. A wide range of situations in which radiation may influence the user was investigated. Emphasis was placed on the adverse impact of non-ionizing radiation. Thermal and non-thermal effects of non-ionizing radiation were explained in accordance with the operating principle of wireless devices. It is necessary to implement appropriate forms of protection in order to eliminate health risks or reduce them to the ...

  8. Wireless Multiplexed Surface Acoustic Wave Sensors Project

    Science.gov (United States)

    Youngquist, Robert C.

    2014-01-01

    Wireless Surface Acoustic Wave (SAW) Sensor is a new technology for obtaining multiple, real-time measurements under extreme environmental conditions. This project plans to develop a wireless multiplexed sensor system that uses SAW sensors, with no batteries or semiconductors, that are passive and rugged, can operate down to cryogenic temperatures and up to hundreds of degrees C, and can be used to sense a wide variety of parameters over reasonable distances (meters).

  9. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  10. Use of geographic information systems and spatial analysis in area-wide integrated pest management programmes that integrate the sterile insect technique

    International Nuclear Information System (INIS)

    Cox, J.St.H.; Vreysen, M.J.B.

    2005-01-01

    The advantages that geographic information systems (GIS) and associated technologies can offer, in terms of the design and implementation of area-wide programmes of insect and/or disease suppression, are becoming increasingly recognised, even if the realization of this potential has not been fully exploited and for some area-wide programmes adoption appears to be progressing slowly. This chapter provides a basic introduction to the science of GIS, Global Positioning System (GPS), and satellite remote sensing (RS), and reviews the principal ways in which these technologies can be used to assist various stages of development of the sterile insect technique (SIT) as part of area-wide integrated pest management (AW-IPM) programmes - from the selection of project sites, and feasibility assessments and planning of pre-intervention surveys, to the monitoring and analysis of insect suppression programmes, and the release of sterile insects. Potential barriers to the successful deployment of GIS tools are also discussed. (author)

  11. 2nd International Conference on Mobile and Wireless Technology

    CERN Document Server

    Wattanapongsakorn, Naruemon

    2015-01-01

    This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.   The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...

  12. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  13. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  14. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  15. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  16. Area-Wide Suppression of the Mediterranean Fruit Fly, Ceratitis capitata, and the Oriental Fruit Fly, Bactrocera dorsalis, in Kamuela, Hawaii

    OpenAIRE

    Vargas, Roger I.; Pi?ero, Jaime C.; Mau, Ronald F. L.; Jang, Eric B.; Klungness, Lester M.; McInnis, Donald O.; Harris, Ernest B.; McQuate, Grant T.; Bautista, Renato C.; Wong, Lyle

    2010-01-01

    The United States Department of Agriculture's Agricultural Research Service initiated an area-wide fruit fly management program in Hawaii in 2000. The first demonstration site was established in Kamuela, Hawaii, USA. This paper documents suppression of the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), and the oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae), in a 40 km2 area containing urban, rural and agricultural zones during a 6 year period. The suppressio...

  17. Wireless monitoring system for personal dose

    International Nuclear Information System (INIS)

    Kobayashi, Hironobu; Kawamura, Takeshi; Inoue, Takayuki

    2000-01-01

    Fuji Electric has developed a system for the higher radiation controlled area in nuclear power plants, in which exposure dose data measured on the wearer's chest, hands, and legs are transferred by wireless to the data control equipment so that the exposure dose can be controlled in real time. The system using a specified low-power radio wave causes no interference to the other types of dosimeters. The data control equipment automatically saves data received from the dosimeters and also has functions of calibration of dosimeters and maintenance of the wireless system. This paper describes the wireless monitoring system that consists of chest and parts dosimeters and data control equipment. (author)

  18. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  19. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  20. LSコイルを用いたWireless Power Transmission

    OpenAIRE

    吉川, 隆; 更谷, 翔太

    2014-01-01

    The wireless power transmission is widely studied for many kinds of application, for example, power supply for cell phone or power source of EV. The supplying power of those applications is always over mW. But it is impossible to transmit for longer distance under the index of regulation of protection from radiofrequency electromagnetic field. Then many of such applications are considered with restriction of narrow area. Then we have surveyed low power demanding application the suitable appl...