WorldWideScience

Sample records for wsn eco-mac protocol

  1. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  2. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  3. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  4. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  5. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  6. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  7. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  8. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  9. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  10. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN—A Survey

    Directory of Open Access Journals (Sweden)

    Vignesh Raja Karuppiah Ramachandran

    2016-11-01

    Full Text Available With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS, the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN and Wireless Sensor Network (WSN. To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of Wu

  11. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  12. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  13. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  14. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  15. Design of an autonomous decentralized MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dal Pont, L.; Havinga, Paul J.M.

    In this document the design of a MAC protocol for wireless sensor networks is discussed. The autonomous decentralized TDMA based MAC protocol minimizes power consumtion by efficiency implementing unicast/omnicast, scheduled rendezvous times and wakeup calls. The MAC protocol is an ongoing research

  16. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  17. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  18. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  19. Design and Implementation of a Mobile Multihop WSN for AGV System

    Directory of Open Access Journals (Sweden)

    Jiaqi Zhang

    2010-01-01

    Full Text Available A system data sharing protocol of mobile WSN named synchronous dynamic multihop data sharing protocol (S-DMDS is presented for automated guided vehicle (AGV system. It is a cross-layer protocol designed from route layer to MAC layer. By adopting a concept of system data sharing, it is possible to make each node exchange the data timely with all the other nodes. It is also a topology-agnostic protocol which has no knowledge of neighbors, routes, or next hops. From the results of the 16-nodes simulation, S-DMDS protocol is proved to be efficient exchange data timely between the devices of AGV system in mobile multihop situation. Moreover, it also shows that S-DMDS significantly outperforms NST-AODV with investing about 41.6% system sharing delay as well as 80% RAM consumption. At last, 5-node experiment indicates that S-DMDS can work well in real environment.

  20. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  1. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  2. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  3. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  4. The Architecture of WiFi-Based WSN for AMR System and E-HWMP Routing Protocol

    Directory of Open Access Journals (Sweden)

    Li LI

    2014-02-01

    Full Text Available With the development of SoC technology in recent years, the ultra-low power WiFi System on SoC Chip has emerged. As a result, WiFi-based Wireless Sensor Networks come into use, especially used in Automatic Meter Reading. While because the nodes of Wireless Sensor Networks have limited energy supply, smaller storage capability and slower calculation ability, the current WiFi technology cannot be directly applied to WiFi-based Wireless Sensor Networks. The protocols should be upgraded and the security algorithms should be improved to meet the new requests. Firstly, this article describes the network architecture of WiFi-based WSN for AMR system and discusses the reason for using this analogous Mesh architecture. Secondly, the new Hardware architecture of WiFi-based WSN node is designed to realize the AMR system and verify the research work. The node can collect the data of power meter by WiFi and can be powered by a Lithium Battery. Thirdly, on the basis of study work of WiFi original routing protocol HWMP, a new method on improving the energy saving ability of HWMP to adapt the new features of WiFi-based WSN is proposed. And the simulation work on the new routing protocol E-HWMP has been done with NS2 and the simulation results show that the life cycle of the network has been extended to some degree.

  5. DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN) USING PASCAL GRAPH

    OpenAIRE

    Deepali Panwar; Subhrendu Guha Neogi

    2013-01-01

    Development of energy efficient Wireless Sensor Network (WSN) routing protocol is nowadays main area of interest amongst researchers. This research is an effort in designing energy efficient Wireless Sensor Network (WSN) routing protocol under certain parameters consideration. Research report discusses various existing WSN routing protocols and propose a new WSN energy efficient routing protocol. Results show a significant improvement in life cycle of the nodes and enhancement ...

  6. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  7. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  8. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  9. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  10. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  11. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  12. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  13. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  14. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  15. A Very Low Power MAC (VLPM Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-03-01

    Full Text Available Wireless Body Area Networks (WBANs consist of a limited number of battery operated nodes that are used to monitor the vital signs of a patient over long periods of time without restricting the patient’s movements. They are an easy and fast way to diagnose the patient’s status and to consult the doctor. Device as well as network lifetime are among the most important factors in a WBAN. Prolonging the lifetime of the WBAN strongly depends on controlling the energy consumption of sensor nodes. To achieve energy efficiency, low duty cycle MAC protocols are used, but for medical applications, especially in the case of pacemakers where data have time-limited relevance, these protocols increase latency which is highly undesirable and leads to system instability. In this paper, we propose a low power MAC protocol (VLPM based on existing wakeup radio approaches which reduce energy consumption as well as improving the response time of a node. We categorize the traffic into uplink and downlink traffic. The nodes are equipped with both a low power wake-up transmitter and receiver. The low power wake-up receiver monitors the activity on channel all the time with a very low power and keeps the MCU (Micro Controller Unit along with main radio in sleep mode. When a node [BN or BNC (BAN Coordinator] wants to communicate with another node, it uses the low-power radio to send a wakeup packet, which will prompt the receiver to power up its primary radio to listen for the message that follows shortly. The wake-up packet contains the desired node’s ID along with some other information to let the targeted node to wake-up and take part in communication and let all other nodes to go to sleep mode quickly. The VLPM protocol is proposed for applications having low traffic conditions. For high traffic rates, optimization is needed. Analytical results show that the proposed protocol outperforms both synchronized and unsynchronized MAC protocols like T-MAC, SCP-MAC, B-MAC

  16. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  17. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    Science.gov (United States)

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  18. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yugui Qu

    2011-02-01

    Full Text Available Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  19. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  20. Formal Modeling of Greedy Nodes in 802.15.4 WSN

    Directory of Open Access Journals (Sweden)

    Youcef Hammal

    2015-06-01

    Full Text Available This paper deals with formal specification of the non-slotted CSMA/CA protocol in wireless sensor networks(WSN whose some nodes own a greedy behavior. This protocol requires sensor nodes to wait some time before initiating a transmission, whereas greedy nodes may try to reduce their waiting duration, which may penalize other nodes. To analyze their impact on WSN mode in operation, we use timed automata of the model-checker UPPAAL to capture the abstract behavior of communication medium, sane, and greedy nodes in WSN. This enables the use of analysis tools to check whether these models satisfy intended properties.

  1. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  2. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  3. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  4. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  5. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  6. TR-MAC: an energy-efficient MAC protocol for wireless sensor networks exploiting noise-based transmitted reference modulation

    NARCIS (Netherlands)

    Morshed, S.; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor net- works. The medium access control (MAC) protocol determines the time a sensor node transceiver spends listening or transmitting, and hence the energy consumption of the

  7. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  8. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  9. A Selective-Awakening MAC Protocol for Energy-Efficient Data Forwarding in Linear Sensor Networks

    Directory of Open Access Journals (Sweden)

    Iclia Villordo-Jimenez

    2018-01-01

    Full Text Available We introduce the Selective-Awakening MAC (SA-MAC protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs. In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize the performance of the proposed protocol, we present a Discrete-Time Markov Chain-based analysis that is validated through extensive discrete-event simulations. Our results show that SA-MAC significantly outperforms previous proposals in terms of energy consumption, throughput, and packet loss probability. This is particularly true under high node density and high traffic load conditions, which are expected to be common scenarios in the context of IoT applications. We also present an analysis by grade (i.e., the number of hops to the sink, which is located at one end of the LSN that reveals that LSNs exhibit heterogeneous performance depending on the nodes’ grade. Such results can be used as a design guideline for future LSN implementations.

  10. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  11. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  12. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  13. Rancang Bangun Instrumen Sistem Buoy Menggunakan A-Wsn Protokol Zigbee Untuk Pengamatan Ekosistem Pesisir (Development of Buoy System Instrument using A-WSN ZigBee Protocol for Coastal Ecosystem Monitoring

    Directory of Open Access Journals (Sweden)

    Acta Withamana

    2013-12-01

    resolution of sampling. Mooring buoy has been used as one of the options to carry out the task. However the big dimension in the existing buoy system is not suitable for coastal ecosystem monitoring. Rapid development in semiconductor technology has brought wireless sensor network (WSN. ZigBee communication protocol has the advantage of energy efficient and ease of implementation. This research was conducted to developing mooring buoy platform as well as analyzes the possibility of WSN to be implemented in coastal environment. The test on performance of developed mooring buoy was good and stable as the platform of instrument. The network performance of ZigBee radio gave 100% data transmitting and receiving success ratio in the static test. Using four Ni-MH batteries, the instrument can be operated for roughly 39 hours for coordinator and router, and 89 hours for end device. The sea field test shows that the worst is 84.94% success ratio on E1 and the greatest is 100% success ratio on R1 and E3. The received temperature data also accurate to describe the distribution of sea surface temperature at Panggang Island. Results of this study suggest that application of Buoy System instrument using  ZigBee-WSN protocol has the potential to be used in the observation activities of coastal ecosystems. Keywords: mooring buoy, instrument, WSN, ZigBee, coastal observation

  14. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  15. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  16. I-MAC: an incorporation MAC for wireless sensor networks

    Science.gov (United States)

    Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie

    2017-11-01

    This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.

  17. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  18. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Halkes, G.P.; Langendoen, K.G.

    2010-01-01

    The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover,

  19. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  20. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  1. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  2. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  3. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  4. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  5. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  6. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2 and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC, advertisement-based MAC (A-MAC, Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC, and low-power real-time medium access control (LPR-MAC. The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  8. RFID-WSN integrated architecture for energy and delay- aware routing a simulation approach

    CERN Document Server

    Ahmed, Jameel; Tayyab, Muhammad; Nawaz, Menaa

    2015-01-01

    The book identifies the performance challenges concerning Wireless Sensor Networks (WSN) and Radio Frequency Identification (RFID) and analyzes their impact on the performance of routing protocols. It presents a thorough literature survey to identify the issues affecting routing protocol performance, as well as a mathematical model for calculating the end-to-end delays of the routing protocol ACQUIRE; a comparison of two routing protocols (ACQUIRE and DIRECTED DIFFUSION) is also provided for evaluation purposes. On the basis of the results and literature review, recommendations are made for better selection of protocols regarding the nature of the respective application and related challenges. In addition, this book covers a proposed simulator that integrates both RFID and WSN technologies. Therefore, the manuscript is divided in two major parts: an integrated architecture of smart nodes, and a power-optimized protocol for query and information interchange.

  9. An Optimized WSN Design for Latency-Critical Smart Grid Applications

    Directory of Open Access Journals (Sweden)

    Mounib Khanafer

    2017-01-01

    Full Text Available The growing popularity of the Internet of Things (IoT systems such as the smart grid, Body Area Networks (BANs, and the Intelligent Transportation System (ITS is driving Wireless Sensor Network (WSN systems to the limit in terms of abilities and performance. WSNs were initially designed for low power, low data rate, and latency-tolerant applications. However, this paradigm is changing because of the nature of the new applications. Therefore, instead of only focusing on power-efficient WSN design, researchers and industries are now developing Quality of Service (QoS protocols for WSNs. In addition to that, latency- and reliability-critical protocol designs are also becoming significantly important in WSNs. In this paper, we present an overview of some important smart grid latency-critical applications and highlight WSNs implementation challenges for these smart grid applications. Furthermore, we develop and evaluate two novel optimization models that solve for the optimum values of the end-to-end latency and power consumption in a clustered WSN given lower bounds on reliability and other network parameters.

  10. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  11. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  12. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  13. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  14. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  15. The Control Packet Collision Avoidance Algorithm for the Underwater Multichannel MAC Protocols via Time-Frequency Masking

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2016-01-01

    Full Text Available Establishing high-speed and reliable underwater acoustic networks among multiunmanned underwater vehicles (UUVs is basic to realize cooperative and intelligent control among different UUVs. Nevertheless, different from terrestrial network, the propagation speed of the underwater acoustic network is 1500 m/s, which makes the design of the underwater acoustic network MAC protocols a big challenge. In accordance with multichannel MAC protocols, data packets and control packets are transferred through different channels, which lowers the adverse effect of acoustic network and gradually becomes the popular issues of underwater acoustic networks MAC protocol research. In this paper, we proposed a control packet collision avoidance algorithm utilizing time-frequency masking to deal with the control packets collision in the control channel. This algorithm is based on the scarcity of the noncoherent underwater acoustic communication signals, which regards collision avoiding as separation of the mixtures of communication signals from different nodes. We first measure the W-Disjoint Orthogonality of the MFSK signals and the simulation result demonstrates that there exists time-frequency mask which can separate the source signals from the mixture of the communication signals. Then we present a pairwise hydrophones separation system based on deep networks and the location information of the nodes. Consequently, the time-frequency mask can be estimated.

  16. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  17. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Science.gov (United States)

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  18. Implantable Body Sensor Network MAC Protocols Using Wake-up Radio – Evaluation in Animal Tissue

    NARCIS (Netherlands)

    Karuppiah Ramachandran, Vignesh Raja; van der Zwaag, B.J.; Meratnia, Nirvana; Havinga, Paul J.M.

    Applications of implantable sensor networks in the health-care industry have increased tremendously over the last decade. There are different types of medium access control (MAC) protocols that are designed for implantable body sensor networks, using different physical layer technologies such as

  19. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...

  20. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  1. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits have been proposed by Nielsen et al. (nicknamed TinyOT) and by Damg˚ard and Zakarias...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...... of a large number of AES encryptions and find that it performs better than results reported so far on TinyOT, on the same hardware.p...

  2. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chongqing Zhang

    2017-05-01

    Full Text Available Wireless body area networks (WBANs are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic.

  3. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  4. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  5. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Science.gov (United States)

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  6. A new energy-efficient MAC protocol with noise-based transmitted-reference modulation for wireless sensor network

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert; Meijerink, Arjan; Ye, D.; van der Zee, Ronan A.R.; Bentum, Marinus Jan

    2013-01-01

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor networks. The medium access control (MAC) protocol determines to a large extent the time a sensor node transceiver spends listening or transmitting, and hence the energy

  7. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars

    1998-01-01

    The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both...

  8. A comprehensive WSN-based approach to efficiently manage a Smart Grid.

    Science.gov (United States)

    Martinez-Sandoval, Ruben; Garcia-Sanchez, Antonio-Javier; Garcia-Sanchez, Felipe; Garcia-Haro, Joan; Flynn, David

    2014-10-10

    The Smart Grid (SG) is conceived as the evolution of the current electrical grid representing a big leap in terms of efficiency, reliability and flexibility compared to today's electrical network. To achieve this goal, the Wireless Sensor Networks (WSNs) are considered by the scientific/engineering community to be one of the most suitable technologies to apply SG technology to due to their low-cost, collaborative and long-standing nature. However, the SG has posed significant challenges to utility operators-mainly very harsh radio propagation conditions and the lack of appropriate systems to empower WSN devices-making most of the commercial widespread solutions inadequate. In this context, and as a main contribution, we have designed a comprehensive ad-hoc WSN-based solution for the Smart Grid (SENSED-SG) that focuses on specific implementations of the MAC, the network and the application layers to attain maximum performance and to successfully deal with any arising hurdles. Our approach has been exhaustively evaluated by computer simulations and mathematical analysis, as well as validation within real test-beds deployed in controlled environments. In particular, these test-beds cover two of the main scenarios found in a SG; on one hand, an indoor electrical substation environment, implemented in a High Voltage AC/DC laboratory, and, on the other hand, an outdoor case, deployed in the Transmission and Distribution segment of a power grid. The results obtained show that SENSED-SG performs better and is more suitable for the Smart Grid than the popular ZigBee WSN approach.

  9. Cognitive MAC designs for OSA networks

    CERN Document Server

    Derakhshani, Mahsa

    2014-01-01

    This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive M

  10. Performance analysis for a QoS-aware hybrid token-CDMA MAC protocol

    CSIR Research Space (South Africa)

    Liu, YS

    2007-09-01

    Full Text Available ) 20000 Bad state duration ( i badτ ) 3.2 ms Bad state ibadPEP 1.0 Good state igoodPEP Holtzman’s approximation WTRP Channel bit rate 1.28 Mbps Signal to Noise Rato (SNR) 8 dB .... INTRODUCTION d hoc and wireless mesh networks (WMNs) [1] are commonly known to implement IEEE 802.11 related schemes as their medium access control (MAC) protocols. It is known from [2,3] that with the 802.11 based scheme; the performance is degraded...

  11. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  12. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  13. GSHMAC

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    the sensor lifetime from years to days. This paper proposes a secure hybrid MAC mechanism, Green and Secure Hybrid Medium Access Control (GSHMAC) to overcome the devastating effect of WSN MAC attacks. The proposed mechanism provides features such as collision threshold-based MAC mode control......The cost efficiency of wireless platforms and their easy deployment enable the applicability of it in widespread application domains. Wireless sensor networks (WSNs) are not excluded from it. Their application domains vary from industrial monitoring to military applications. A WSN is a resource...... in a WSN is controlled by the medium access control (MAC) mechanism. This paper focuses on WSN MAC mechanisms and countermeasures for attacks targeting the MAC layer in a WSN. Denial of sleep attacks are the most relevant for WSN MAC as these types of attacks have shattered effects, which bring down...

  14. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    Science.gov (United States)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  15. An Effective Hybrid Routing Algorithm in WSN: Ant Colony Optimization in combination with Hop Count Minimization

    Directory of Open Access Journals (Sweden)

    Ailian Jiang

    2018-03-01

    Full Text Available Low cost, high reliability and easy maintenance are key criteria in the design of routing protocols for wireless sensor networks (WSNs. This paper investigates the existing ant colony optimization (ACO-based WSN routing algorithms and the minimum hop count WSN routing algorithms by reviewing their strengths and weaknesses. We also consider the critical factors of WSNs, such as energy constraint of sensor nodes, network load balancing and dynamic network topology. Then we propose a hybrid routing algorithm that integrates ACO and a minimum hop count scheme. The proposed algorithm is able to find the optimal routing path with minimal total energy consumption and balanced energy consumption on each node. The algorithm has unique superiority in terms of searching for the optimal path, balancing the network load and the network topology maintenance. The WSN model and the proposed algorithm have been implemented using C++. Extensive simulation experimental results have shown that our algorithm outperforms several other WSN routing algorithms on such aspects that include the rate of convergence, the success rate in searching for global optimal solution, and the network lifetime.

  16. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  17. A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jinhui TANG

    2018-05-01

    Full Text Available Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control (MAC designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access (FRMA control protocol is proposed. Burst communication, asynchronous Frequency Hopping (FH, channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved. Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. Keywords: Ad hoc networks, Aeronautical communications, Frequency hopping, Media Access Control (MAC, Time-sensitive

  18. Low Latency MAC Protocol in Wireless Sensor Networks Using Timing Offset

    Science.gov (United States)

    Choi, Seung Sik

    This paper proposes a low latency MAC protocol that can be used in sensor networks. To extend the lifetime of sensor nodes, the conventional solution is to synchronize active/sleep periods of all sensor nodes. However, due to these synchronized sensor nodes, packets in the intermediate nodes must wait until the next node wakes up before it can forward a packet. This induces a large delay in sensor nodes. To solve this latency problem, a clustered sensor network which uses two types of sensor nodes and layered architecture is considered. Clustered heads in each cluster are synchronized with different timing offsets to reduce the sleep delay. Using this concept, the latency problem can be solved and more efficient power usage can be obtained.

  19. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  20. Investigation on energy efficient sensor node placement in railway systems

    Directory of Open Access Journals (Sweden)

    Ayona Philipose

    2016-06-01

    Full Text Available Recently wireless sensor network (WSN has been widely used for monitoring railway tracks and rail tunnels. The key requirement in the design of such WSN is to minimize the energy consumption so as to maximize the network lifetime. This paper includes the performance of an improved medium access control (MAC protocol, namely, time adaptive-bit map assisted (TA-BMA protocol, for the purpose of communication between the sensors placed in a railway wagon. The train is considered to be moving at a constant speed, and the sensor nodes are stationary with respect to the motion of train. The effect of mobility on the proposed MAC protocol is determined using genetic algorithm (GA, and the observed increase in energy consumption on considering mobility is 18.51%. Performance analysis of the system model is carried out using QualNet (ver. 7.1, and the energy consumption in transmit mode, receive mode, percentage of time in sleep mode, end-to-end delay and throughput are investigated.

  1. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  2. Development of an eco-protocol for seaweed chlorophylls extraction and possible applications in dye sensitized solar cells

    International Nuclear Information System (INIS)

    Armeli Minicante, S; Ambrosi, E; Back, M; Barichello, J; Cattaruzza, E; Gonella, F; Scantamburlo, E; Trave, E

    2016-01-01

    Seaweeds are a reserve of natural dyes (chlorophylls a , b and c ), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts. (paper)

  3. QL-MAC : a Q-learning based MAC for wireless sensor networks

    NARCIS (Netherlands)

    Galzarano, S.; Liotta, A.; Fortino, G.; Aversa, R.; Kolodziej, J.; Zhang, J.; Amato, F.; Fortino, G.

    2013-01-01

    WSNs are becoming an increasingly attractive technology thanks to the significant benefits they can offer to a wide range of application domains. Extending the system lifetime while preserving good network performance is one of the main challenges in WSNs. In this paper, a novel MAC protocol

  4. Integrated Toolset for WSN Application Planning, Development, Commissioning and Maintenance: The WSN-DPCM ARTEMIS-JU Project.

    Science.gov (United States)

    Antonopoulos, Christos; Asimogloy, Katerina; Chiti, Sarah; D'Onofrio, Luca; Gianfranceschi, Simone; He, Danping; Iodice, Antonio; Koubias, Stavros; Koulamas, Christos; Lavagno, Luciano; Lazarescu, Mihai T; Mujica, Gabriel; Papadopoulos, George; Portilla, Jorge; Redondo, Luis; Riccio, Daniele; Riesgo, Teresa; Rodriguez, Daniel; Ruello, Giuseppe; Samoladas, Vasilis; Stoyanova, Tsenka; Touliatos, Gerasimos; Valvo, Angela; Vlahoy, Georgia

    2016-06-02

    In this article we present the main results obtained in the ARTEMIS-JU WSN-DPCM project between October 2011 and September 2015. The first objective of the project was the development of an integrated toolset for Wireless sensor networks (WSN) application planning, development, commissioning and maintenance, which aims to support application domain experts, with limited WSN expertise, to efficiently develop WSN applications from planning to lifetime maintenance. The toolset is made of three main tools: one for planning, one for application development and simulation (which can include hardware nodes), and one for network commissioning and lifetime maintenance. The tools are integrated in a single platform which promotes software reuse by automatically selecting suitable library components for application synthesis and the abstraction of the underlying architecture through the use of a middleware layer. The second objective of the project was to test the effectiveness of the toolset for the development of two case studies in different domains, one for detecting the occupancy state of parking lots and one for monitoring air concentration of harmful gasses near an industrial site.

  5. Integrated Toolset for WSN Application Planning, Development, Commissioning and Maintenance: The WSN-DPCM ARTEMIS-JU Project

    Directory of Open Access Journals (Sweden)

    Christos Antonopoulos

    2016-06-01

    Full Text Available In this article we present the main results obtained in the ARTEMIS-JU WSN-DPCM project between October 2011 and September 2015. The first objective of the project was the development of an integrated toolset for Wireless sensor networks (WSN application planning, development, commissioning and maintenance, which aims to support application domain experts, with limited WSN expertise, to efficiently develop WSN applications from planning to lifetime maintenance. The toolset is made of three main tools: one for planning, one for application development and simulation (which can include hardware nodes, and one for network commissioning and lifetime maintenance. The tools are integrated in a single platform which promotes software reuse by automatically selecting suitable library components for application synthesis and the abstraction of the underlying architecture through the use of a middleware layer. The second objective of the project was to test the effectiveness of the toolset for the development of two case studies in different domains, one for detecting the occupancy state of parking lots and one for monitoring air concentration of harmful gasses near an industrial site.

  6. MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Durmaz, O.; Jansen, P.G.; Mullender, Sape J.

    2008-01-01

    In traditional wireless sensor network (WSN) applications, energy efficiency is considered to be the most important concern whereas utilizing the use of bandwidth and maximizing the throughput are of secondary importance. However, recent applications, such as structural health monitoring, require

  7. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  8. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    Science.gov (United States)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  9. Eco-ethology

    International Nuclear Information System (INIS)

    Krebs, J.R.; Davies, N.B.

    1981-01-01

    Eco-ethology is the science of the effects of animal behaviour on animal environment and the effects of animal environment on animal behaviour, with the purpose to find out how natural selection within this control loop has formed and molded animals. N. Tinbergen was the first to make experiments on the evolution of patterns of behaviour which are influenced not only by the evolution of species but also by their adaptation to a changing environment. R.H. MacArthur then introduced mathematical modelling for better clarification of the function and adoptive value of behavioural patterns. The book gives a detailed description of both methods and a successful attempt at a synthesis. In surveys and specific contribution, an exemplary outline of eco-ethology is presented, with information, ideas and reflections that are of interest both to teachers and students. The book is addressed to biologists, zoologists, ecologists, sociologists, and evolutionary biologists and to students of these disciplines. (orig.) [de

  10. Fast Oblivious AES A Dedicated application of the MiniMac protocol

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther; Damgård, Ivan Bjerre

    2015-01-01

    We present an actively secure multi-partycomputation of the Advanced Encryption Standard (AES). To the best of our knowledge it is the fastest of its kind to date. We start from an efficient actively secure evaluation of general binary circuits that was implemented by the authors of [DLT14......]. They presented an optimized implementation of the so-called MiniMac protocol [DZ13] that runs in the pre-processing model, and applied this to a binary AES circuit. In this paper we de- scribe how to dedicate the pre-processing to the structure of AES, which improves significantly the throughput and latency...... of previous actively secure implementations. We get a latency of about 6 ms and amortised time about 0.4 ms per AES block, which seems completely adequate for practical applications such as verification of 1-time passwords....

  11. Emergency Handling for MAC Protocol in Human Body Communication

    Directory of Open Access Journals (Sweden)

    Kwon Youngmi

    2011-01-01

    Full Text Available The human body communication (HBC is a technology that enables short range data communication using the human body as a medium, like an electrical wire. Thus it removes the need for a traditional antenna. HBC may be used as a type of data communication in body area network (BAN, while the devices are being in contact with body. One of important issues in BAN is an emergency alarm because it may be closely related to human life. For emergency data communication, the most critical factor is the time constraint. IEEE 802.15.6 specifies that the emergency alarm for the BAN must be notified in less than 1 sec and must provide prioritization mechanisms for emergency traffic and notification. As one type of BAN, the HBC must follow this recommendation, too. Existing emergency handling methods in BAN are based on the carrier sensing capability on radio frequencies to detect the status of channels. However, PHY protocol in HBC does not provide the carrier sensing. So the previous methods are not well suitable for HBC directly. Additionally, in the environment that the emergency rate is very low, the allocation of dedicated slot(s for emergency in each superframe is very wasteful. In this work, we proposed specific emergency handling operation for human body communication's medium access control (HBC-MAC protocol to meet the emergency requirements for BAN. We also showed the optimal number of emergency slots for the various combinations of beacon intervals and emergency rates.

  12. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  13. Power Balance AODV Routing Algorithm of WSN in Precision Agriculture Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Xiaoqin Qin

    2013-11-01

    Full Text Available As one of important technologies of IOT (Internet of Things, WSN (Wireless Sensor Networks has been widely used in precision agriculture environment monitoring. WSN is a kind of energy-constrained network, but power balance is not taken into account in traditional routing protocols. A novel routing algorithm, named Power Balance Ad hoc On-Demand Distance Vector (PB-AODV, is proposed on cross-layer design. In the route discovery process of PB-AODV, routing path is established by the Received Signal Strength Indication (RSSI value. The optimal transmitting power, which is computed according to RSSI value, power threshold and node’s surplus energy, is encapsulated into Route Reply Packet. Hence, the sender node can adjust its transmission power to save energy according to the Route Reply Packet. Simulation results show that the proposed algorithm is effective for load balancing, and increases the WSN’s lifetime 14.3% consequently.

  14. Ecosystem Fabrication (EcoFAB) Protocols for The Construction of Laboratory Ecosystems Designed to Study Plant-microbe Interactions.

    Science.gov (United States)

    Gao, Jian; Sasse, Joelle; Lewald, Kyle M; Zhalnina, Kateryna; Cornmesser, Lloyd T; Duncombe, Todd A; Yoshikuni, Yasuo; Vogel, John P; Firestone, Mary K; Northen, Trent R

    2018-04-10

    Beneficial plant-microbe interactions offer a sustainable biological solution with the potential to boost low-input food and bioenergy production. A better mechanistic understanding of these complex plant-microbe interactions will be crucial to improving plant production as well as performing basic ecological studies investigating plant-soil-microbe interactions. Here, a detailed description for ecosystem fabrication is presented, using widely available 3D printing technologies, to create controlled laboratory habitats (EcoFABs) for mechanistic studies of plant-microbe interactions within specific environmental conditions. Two sizes of EcoFABs are described that are suited for the investigation of microbial interactions with various plant species, including Arabidopsis thaliana, Brachypodium distachyon, and Panicum virgatum. These flow-through devices allow for controlled manipulation and sampling of root microbiomes, root chemistry as well as imaging of root morphology and microbial localization. This protocol includes the details for maintaining sterile conditions inside EcoFABs and mounting independent LED light systems onto EcoFABs. Detailed methods for addition of different forms of media, including soils, sand, and liquid growth media coupled to the characterization of these systems using imaging and metabolomics are described. Together, these systems enable dynamic and detailed investigation of plant and plant-microbial consortia including the manipulation of microbiome composition (including mutants), the monitoring of plant growth, root morphology, exudate composition, and microbial localization under controlled environmental conditions. We anticipate that these detailed protocols will serve as an important starting point for other researchers, ideally helping create standardized experimental systems for investigating plant-microbe interactions.

  15. A Full-Duplex MAC Tailored for 5G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lucas de Melo Guimarães

    2018-01-01

    Full Text Available The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.

  16. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  17. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Phan Van Vinh

    2013-09-01

    Full Text Available This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  18. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. Analysis of Energy Efficiency in WSN by Considering SHM Application

    Science.gov (United States)

    Kumar, Pawan; Naresh Babu, Merugu; Raju, Kota Solomon, Dr; Sharma, Sudhir Kumar, Dr; Jain, Vaibhav

    2017-08-01

    The Wireless Sensor Network is composed of a significant number of autonomous nodes deployed in an extensive or remote area. In WSN, the sensor nodes have a limited transmission range, processing speed and storage capabilities as well as their energy resources are also limited. In WSN all nodes are not directly connected. The primary objective for all kind of WSN is to enhance and optimize the network lifetime i.e. to minimize the energy consumption in the WSN. There are lots of applications of WSN out of which this research paper focuses upon the Structural Health Monitoring application in which 50 Meter bridge has been taken as a test application for the simulation purpose.

  1. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  2. A New MAC Protocol with Pseudo-TDMA Behavior for Supporting Quality of Service in 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available A new medium access control (MAC protocol is proposed for quality-of-service (QoS support in wireless local area networks (WLAN. The protocol is an alternative to the recent enhancement 802.11e. A new priority policy provides the system with better performance by simulating time division multiple access (TDMA functionality. Collisions are reduced and starvation of low-priority classes is prevented by a distributed admission control algorithm. The model performance is found analytically extending previous work on this matter. The results show that a better organization of resources is achieved through this scheme. Throughput analysis is verified with OPNET simulations.

  3. Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Orfanidis, Charalampos; Dragoni, Nicola

    2014-01-01

    In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. In the case of multiple senders having traffic for a given receiver, such beacons form...... points where collisions are likely to happen. In this paper, we present altruistic backoff (AB), a novel collision avoidance mechanism that aims to avoid collisions before the transmission of a beacon. As a result of an early backoff, senders spend less time in idle listening waiting for a beacon, thus...... saving significant amounts of energy. We present an implementation of AB for Texas Instruments' eZ430-rf2500 sensor nodes and we evaluate its performance with simulations and experiments....

  4. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  5. A Review on State of Art Variants of LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuvaraj P.

    2015-03-01

    Full Text Available Recent advances in wireless communication lead to many improvements in application specific wireless sensor network (WSN deployment. Sensing different data from different environments is essential to monitor and control the situations. For instance, it is very important to sense the forest fire as early as possible to control the upshot. So efficient and timely gathering of the data from a network of small sensor nodes is necessary. In WSN, the small sized sensor nodes are working with very small batteries with limited energy. Since those are randomly deployed over a wide area, replacement of battery or recharging is not feasible. So, for getting prolonged life time of WSN, energy efficient operation is the key factor. Among many protocols proposed for enhancing the life time of WSN, the clustering based hierarchical protocols are popular and gaining the attention of researchers because of their high energy efficiency. Low Energy Adaptive Clustering Hierarchy (LEACH is energy efficient hierarchical, clustering based protocol. It is considered as the base of many hierarchical clustering protocols. In this paper, some of the recent tailored protocols proposed to strengthen LEACH are examined.

  6. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  7. Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vinod Namboodiri

    2011-01-01

    Full Text Available Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. We present Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver during protocol execution. Alert is designed to handle multiple simultaneous messages from different nodes efficiently and reliably, minimizing the overall delay to collect all messages along with the delay to get the first message. Moreover, the ability of the network to handle a large number of simultaneous messages does not come at the cost of excessive delays when only a few messages need to be handled. We analyze Alert and evaluate its feasibility and performance with an implementation on commodity hardware. We further compare Alert with existing approaches through simulations and show the performance improvement possible through Alert.

  8. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  9. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  10. Eco-ethology. Oeko-Ethologie

    Energy Technology Data Exchange (ETDEWEB)

    Krebs, J.R.; Davies, N.B.

    1981-01-01

    Eco-ethology is the science of the effects of animal behaviour on animal environment and the effects of animal environment on animal behaviour, with the purpose to find out how natural selection within this control loop has formed and molded animals. N. Tinbergen was the first to make experiments on the evolution of patterns of behaviour which are influenced not only by the evolution of species but also by their adaptation to a changing environment. R.H. MacArthur then introduced mathematical modelling for better clarification of the function and adoptive value of behavioural patterns. The book gives a detailed description of both methods and a successful attempt at a synthesis. In surveys and specific contribution, an exemplary outline of eco-ethology is presented, with information, ideas and reflections that are of interest both to teachers and students. The book is addressed to biologists, zoologists, ecologists, sociologists, and evolutionary biologists and to students of these disciplines.

  11. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    Science.gov (United States)

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  12. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Juan J. Pérez-Solano

    2017-07-01

    Full Text Available Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  13. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  14. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  15. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  16. Definition and specification of "CANlike" protocols in the context of wireless networks

    OpenAIRE

    Juanole , Guy; Mouney , Gérard

    2015-01-01

    Rapport LAAS n° 15276; The implementation of distributed real-time applications on wireless networks constitutes today a new important challenge and, in this context, the MAC protocols, which implement the frame exchange scheduling, have an essential role. This paper is precisely concerned by the specification of such MAC protocols. We specify MAC protocols called CANlike protocols because they are inspired by the MAC protocol of the network CAN which is a wired network. The presentation made...

  17. A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems

    Institute of Scientific and Technical Information of China (English)

    Meng Zheng; Junru Lin; Wei Liang; Haibin Yu

    2015-01-01

    Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work.

  18. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  19. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  20. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  1. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  2. RELIABLE DYNAMIC SOURCE ROUTING PROTOCOL (RDSRP FOR ENERGY HARVESTING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    B. Narasimhan

    2015-03-01

    Full Text Available Wireless sensor networks (WSNs carry noteworthy pros over traditional communication. Though, unkind and composite environments fake great challenges in the reliability of WSN communications. It is more vital to develop a reliable unipath dynamic source routing protocol (RDSRPl for WSN to provide better quality of service (QoS in energy harvesting wireless sensor networks (EH-WSN. This paper proposes a dynamic source routing approach for attaining the most reliable route in EH-WSNs. Performance evaluation is carried out using NS-2 and throughput and packet delivery ratio are chosen as the metrics.

  3. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  4. Technical Report : ContikiMAC vs X-MAC performance analysis

    OpenAIRE

    Michel, Mathieu; Quoitin, Bruno

    2014-01-01

    This paper try to better understand the performance of ContikiMAC compared to X-MAC. ContikiMAC achieves a transmission by repeatedly transmitting a data packet until the reception of an ACK from the destination. While X-MAC uses a stream of small size strobes to advertise the destination of the incoming transmission. A priori, X-MAC is then less bandwidth consumptive. To better understand the efficiency of ContikiMAC, despite an intuitively more consumptive transmitting procedure, we have co...

  5. Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network

    International Nuclear Information System (INIS)

    Li, B B; Yuan, Z F

    2006-01-01

    In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently

  6. Mac Bible

    CERN Document Server

    Spivey, Dwight

    2009-01-01

    This essential guide answers all your questions on using a Macintosh computer, whether you?re unpacking your very first Mac after switching from a PC or upgrading from an older Mac. You?ll walk through all pre-installed Mac applications, including using Mac OS X, browsing the Web using Safari, downloading music from the iTunes store, troubleshooting Mac-specific problems, organizing photos in iPhoto, organizing calendars in iCal, editing digital video in iMovie, and more.

  7. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  8. Minimizing the Energy Consumption in ‎Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammed Saad Talib

    2017-12-01

    Full Text Available Energy in Wireless Sensor networks (WSNs represents an essential factor in designing, controlling and operating the sensor networks. Minimizing the consumed energy in WSNs application is a crucial issue for the network effectiveness and efficiency in terms of lifetime, cost and operation. Number of algorithms and protocols were proposed and implemented to decrease the energy consumption. WSNs operate with battery powered sensors. Sensors batteries have not easily rechargeable even though having restricted power. Frequently the network failure occurs due to the sensors energy insufficiency. MAC protocols in WSNs achieved low duty-cycle by employing periodic sleep and wakeup. Predictive Wakeup MAC (PW-MAC protocol was made use of the asynchronous duty cycling. It reduces the consumption of the node energy by allowing the senders to predict the receiver′s wakeup times. The WSN must be applied in an efficient manner to utilize the sensor nodes and their energy to ensure efficient network throughput. Prediction of the WSN lifetime previously to its installation represents a significant concern. To ensure energy efficiency the sensors duty cycles must be adjusted appropriately to meet the network traffic demands. The energy consumed in each node due to its switching between the active and the idle states were also estimated. The sensors are assumed to be randomly deployed. This paper aims to improve the randomly deployed network lifetime by scheduling the effects of transmission, reception and sleep states on the sensor node energy consumption. Results for these states with many performance metrics were also studied and discussed

  9. The Impact of Dynamic RTS Threshold Adjustment for IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Mostafa Mjidi

    2009-01-01

    Full Text Available In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs. IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.

  10. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue

  11. ECO-FRIENDLY SYNTHESIS OF SILVER NANOPARTICLES ...

    African Journals Online (AJOL)

    userpc

    Keywords: Silver nanoparticles; UV-Visible Spectrophotometry; Dynamic Light Scattering;. Transmission ... The eco- friendly protocol developed led to the synthesis ... lamp for. 5 minutes. (Omidiet al.,. 2014).Authentication of the formation of.

  12. An Integral Model for Target Tracking Based on the Use of a WSN

    Directory of Open Access Journals (Sweden)

    Pietro Manzoni

    2013-06-01

    Full Text Available The use of wireless sensor networks (WSN in tracking applications is growing at a fast pace. In these applications, the sensor nodes discover, monitor and track an event or target object. A significant number of proposals relating the use of WSNs for target tracking have been published to date. However, they either focus on the tracking algorithm or on the communication protocol, and none of them address the problem integrally. In this paper, a comprehensive proposal for target detection and tracking is discussed. We introduce a tracking algorithm to detect and estimate a target location. Moreover, we introduce a low-overhead routing protocol to be used along with our tracking algorithm. The proposed algorithm has low computational complexity and has been designed considering the use of a mobile sink while generating minimal delay and packet loss. We also discuss the results of the evaluation of the proposed algorithms.

  13. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    Science.gov (United States)

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  14. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  15. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  16. Multi-WSN Simulator with Log Data for Efficient Sensing on Internet of Things

    OpenAIRE

    Jeong, Young-Sik; Kim, Hyun-Woo; Yen, Neil Y.; Park, Jong Hyuk

    2015-01-01

    WSN (wireless sensor network) technology came to become fairly activated and as WSN is a part of the world’s environment, research on it is considered important. WSN automated life and work; miniaturized wireless sensor nodes enable observational measurement in regions where access by humans is difficult or periodic sensing data is necessary. Thousands of such sensor nodes are needed. However, when they are wrongly placed in an observed area, sensor node batteries may run out fast or disconne...

  17. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal Saud Yousef; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2011-01-01

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended

  18. Is Kyoto Fatally Flawed? An Analysis with MacGEM

    International Nuclear Information System (INIS)

    Eyckmans, J.; Van Regemorter, D.; Van Steenberghe, V.

    2002-06-01

    In this paper we present some numerical simulations with the MacGEM model to evaluate the consequences of the recent Marrakesh agreements and the defection of the USA for the Kyoto Protocol. MacGEM is a global marginal abatement cost model for carbon emissions from fossil fuel use based on the GEM-E3-World general equilibrium. Nonparticipation of the USA causes the equilibrium carbon price in Annex B countries to fall by approximately 50% since an important share of permit demand falls out. Carbon sinks enhancement activities enable Parties to fulfil their reduction commitment at lower compliance costs and cause the equilibrium permit price to decrease by 40%. Finally, it is shown that the former Soviet Union and central European countries have substantial monopoly power in the Kyoto carbon permit market. We conclude that the recent accords have eroded completely the Kyoto Protocol's emission targets but that they have the merit to have saved the international climate change negotiation framework

  19. Design and FPGA implementation for MAC layer of Ethernet PON

    Science.gov (United States)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  20. Design and Implementation of an Enhanced 802.11 MAC Architecture for Single-Hop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ralph Bernasconi

    2007-01-01

    Full Text Available Due to its extreme simplicity and flexibility, the IEEE 802.11 standard is the dominant technology to implement both infrastructure-based WLANs and single-hop ad hoc networks. In spite of its popularity, there is a vast literature demonstrating the shortcomings of using the 802.11 technology in such environments, such as dramatic degradation of network capacity as contention increases and vulnerability to external interferences. Therefore, the design of enhancements and optimizations for the original 802.11 MAC protocol has been a very active research area in the last years. However, all these modifications to the 802.11 MAC protocol were validated only through simulations and/or analytical investigations. In this paper, we present a very unique work as we have designed a flexible hardware/software platform, fully compatible with current implementations of the IEEE 802.11 technology, which we have used to concretely implement and test an enhanced 802.11 backoff algorithm. Our experimental results clearly show that the enhanced mechanism outperforms the standard 802.11 MAC protocol in real scenarios.

  1. A Fuzzy Adaptive Tightly-Coupled Integration Method for Mobile Target Localization Using SINS/WSN

    Directory of Open Access Journals (Sweden)

    Wei Li

    2016-11-01

    Full Text Available In recent years, mobile target localization for enclosed environments has been a growing interest. In this paper, we have proposed a fuzzy adaptive tightly-coupled integration (FATCI method for positioning and tracking applications using strapdown inertial navigation system (SINS and wireless sensor network (WSN. The wireless signal outage and severe multipath propagation of WSN often influence the accuracy of measured distance and lead to difficulties with the WSN positioning. Note also that the SINS are known for their drifted error over time. Using as a base the well-known loosely-coupled integration method, we have built a tightly-coupled integrated positioning system for SINS/WSN based on the measured distances between anchor nodes and mobile node. The measured distance value of WSN is corrected with a least squares regression (LSR algorithm, with the aim of decreasing the systematic error for measured distance. Additionally, the statistical covariance of measured distance value is used to adjust the observation covariance matrix of a Kalman filter using a fuzzy inference system (FIS, based on the statistical characteristics. Then the tightly-coupled integration model can adaptively adjust the confidence level for measurement according to the different measured accuracies of distance measurements. Hence the FATCI system is achieved using SINS/WSN. This innovative approach is verified in real scenarios. Experimental results show that the proposed positioning system has better accuracy and stability compared with the loosely-coupled and traditional tightly-coupled integration model for WSN short-term failure or normal conditions.

  2. Macs for dummies

    CERN Document Server

    Baig, Edward C

    2014-01-01

    Get the most out of your Mac with this comprehensive guide Macs For Dummies, 13th Edition is the ultimate guide to your Mac, fully updated to include information about the latest updates. The book walks you through troubleshooting, syncing mobile devices, integrating Windows, and more, so you can take advantage of everything Macs have to offer. Whether you're a new user, a recent convert, or you just want to get the most out of your Mac, this book puts all the information you need in one place. Discover what makes Macs superior computing machines. Learn the basics, from mastering the Dock and

  3. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  4. Modeling Energy & Reliability of a CNT based WSN on an HPC Setup

    Directory of Open Access Journals (Sweden)

    Rohit Pathak

    2010-07-01

    Full Text Available We have analyzed the effect of innovations in Nanotechnology on Wireless Sensor Networks (WSN and have modeled Carbon Nanotube (CNT based sensor nodes from a device prospective. A WSN model has been programmed in Simulink-MATLAB and a library has been developed. Integration of CNT in WSN for various modules such as sensors, microprocessors, batteries etc has been shown. Also average energy consumption for the system has been formulated and its reliability has been shown holistically. A proposition has been put forward on the changes needed in existing sensor node structure to improve its efficiency and to facilitate as well as enhance the assimilation of CNT based devices in a WSN. Finally we have commented on the challenges that exist in this technology and described the important factors that need to be considered for calculating reliability. This research will help in practical implementation of CNT based devices and analysis of their key effects on the WSN environment. The work has been executed on Simulink and Distributive Computing toolbox of MATLAB. The proposal has been compared to the recent developments and past experimental results reported in this field. This attempt to derieve the energy consumption and reliability implications will help in development of real devices using CNT which is a major hurdle in bringing the success from lab to commercial market. Recent research in CNT has been used to model an energy efficient model which will also lead to the development CAD tools. Library for Reliability and Energy consumption includes analysis of various parts of a WSN system which is being constructed from CNT. Nano routing in a CNT system is also implemented with its dependencies. Finally the computations were executed on a HPC setup and the model showed remarkable speedup.

  5. Mac Security Bible

    CERN Document Server

    Kissell, Joe

    2010-01-01

    Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  6. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments

    Science.gov (United States)

    Lee, JongHyup

    2018-01-01

    In the complicated settings of WSN (Wireless Sensor Networks) and IoT (Internet of Things) environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness. PMID:29438337

  7. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments.

    Science.gov (United States)

    Lee, JongHyup

    2018-02-13

    [-12]In the complicated settings of WSN (Wireless Sensor Networks) and IoT (Internet of Things) environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  8. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments

    Directory of Open Access Journals (Sweden)

    JongHyup Lee

    2018-02-01

    Full Text Available In the complicated settings of WSN (Wireless Sensor Networks and IoT (Internet of Things environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  9. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  10. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  11. Asymmetric Propagation Delay-Aware TDMA MAC Protocol for Mobile Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    A-Ra Cho

    2018-06-01

    Full Text Available The propagation delay in mobile underwater acoustic sensor network (MUASN is asymmetric because of its low sound propagation speed, and this asymmetry grows with the increase in packet travel time, which damages the collision avoidance mechanism of the spatial reuse medium access control (MAC protocols for MUASN. We propose an asymmetric propagation delay-aware time division multiple access (APD-TDMA for a MUASN in which periodic data packet transmission is required for a sink node (SN. Collisions at the SN are avoided by deferring data packet transmission after reception of a beacon packet from the SN, and data packets are arrived at the SN in a packet-train manner. The time-offset, which is the time for a node to wait before the transmission of a data packet after reception of a beacon packet, is determined by estimating the propagation delay over two consecutive cycles such that the idle interval at the SN is minimized, and this time-offset is announced by the beacon packet. Simulation results demonstrate that the APD-TDMA improves the channel access delay and the channel utilization by approximately 20% and 30%, respectively, compared with those of the block time bounded TDMA under the given network conditions.

  12. QoS Support Polling Scheme for Multimedia Traffic in Wireless LAN MAC Protocol

    Institute of Scientific and Technical Information of China (English)

    YANG Zhijun; ZHAO Dongfeng

    2008-01-01

    Quality of service (QoS) support is a key attribute for multimedia traffic including video, voice, and data in wireless local area networks (LANs) but is limited in 802.11-based wireless LANs. A polling-based scheme called the point coordination function (PCF) was developed for 802.11 LANs to support the trans-mission of multimedia traffic. However, the PCF is not able to meet the desired practical traffic differentiation requirements for real-time data. This paper describes a QoS support polling scheme based on the IEEE 802.11 medium access control (MAC) protocol. The scheme uses a two-level polling mechanism with the QoS classes differentiated by two different access policies. Stations with higher priority traffic such as key or real-time data form the first level and can access the common channel through an exhaustive access policy. Other stations with lower priority traffic form the second level and can access the channel through a gated access policy. A system model based on imbedded Markov chain theory and a generation function were setup to explicitly analyze the mean information packet waiting time of the two-level polling scheme. Theo-retical and simulation results show that the new scheme efficiently differentiates services to guarantee better QoS and system stability.

  13. A Comprehensive Approach to WSN-Based ITS Applications: A Survey

    Directory of Open Access Journals (Sweden)

    Joan Garcia-Haro

    2011-10-01

    Full Text Available In order to perform sensing tasks, most current Intelligent Transportation Systems (ITS rely on expensive sensors, which offer only limited functionality. A more recent trend consists of using Wireless Sensor Networks (WSN for such purpose, which reduces the required investment and enables the development of new collaborative and intelligent applications that further contribute to improve both driving safety and traffic efficiency. This paper surveys the application of WSNs to such ITS scenarios, tackling the main issues that may arise when developing these systems. The paper is divided into sections which address different matters including vehicle detection and classification as well as the selection of appropriate communication protocols, network architecture, topology and some important design parameters. In addition, in line with the multiplicity of different technologies that take part in ITS, it does not consider WSNs just as stand-alone systems, but also as key components of heterogeneous systems cooperating along with other technologies employed in vehicular scenarios.

  14. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  15. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  16. Performance of MAC protocols in beaconing Mobile Adhoc Multibroadcast Networks

    OpenAIRE

    Rico García, Cristina; Lehner, Andreas; Robertson, Patrick; Strang, Thomas

    2010-01-01

    The investigation of infrastructureless safety applications in dierent transportation systems is a hot research topic. The nodes in thevnetwork are designed to advertise to the rest of the nodes informationabout the current traffic situation by means of short beacon messages containing speed, direction, positions and other relevant safety information. The scheduling should be organized by the MAC layer so that the transmitted messages arrive successfully as soon as possible at the recei...

  17. WSN-Based Space Charge Density Measurement System.

    Science.gov (United States)

    Deng, Dawei; Yuan, Haiwen; Lv, Jianxun; Ju, Yong

    2017-01-01

    It is generally acknowledged that high voltage direct current (HVDC) transmission line endures the drawback of large area, because of which the utilization of cable for space charge density monitoring system is of inconvenience. Compared with the traditional communication network, wireless sensor network (WSN) shows advantages in small volume, high flexibility and strong self-organization, thereby presenting great potential in solving the problem. Additionally, WSN is more suitable for the construction of distributed space charge density monitoring system as it has longer distance and higher mobility. A distributed wireless system is designed for collecting and monitoring the space charge density under HVDC transmission lines, which has been widely applied in both Chinese state grid HVDC test base and power transmission projects. Experimental results of the measuring system demonstrated its adaptability in the complex electromagnetic environment under the transmission lines and the ability in realizing accurate, flexible, and stable demands for the measurement of space charge density.

  18. iMac portable genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    The most up-to-date coverage on the latest iMac advice, tools, and shortcuts Cool and useful tips, full-color screenshots, and savvy advice show you how to get the most out of your iMac. Fully updated to cover the iMac's latest features and capabilities, this guide is packed with indispensible information on iLife '09 and Mac OS X Snow Leopard, and shows you how to customize your iMac in a way that it will work best for you.Explores all the bells and whistles of the iMac, including the new Magic Mouse, iLife apps such as iPhoto and iMovie, and Mac OS X Snow LeopardShows yo

  19. MacBook for dummies

    CERN Document Server

    Chambers , Mark L

    2014-01-01

    Make friends with your MacBook the fun and easy way! Ultra-light, ultra-fast, and ultra-powerful, the MacBook is the coolest laptop in town, and longtime Mac guru Mark L. Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. Whether this is your first MacBook or your first laptop, period, you''ll learn to navigate the Mac desktop, c

  20. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  1. A Novel Spectrally Efficient Asynchronous Multi-Channel MAC Using a Half-Duplex Transceiver for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abdullah Devendiran

    2018-01-01

    Full Text Available Multi-channel medium access control (MAC protocols maximize network performance by enabling concurrent wireless transmissions over non-interfering channels. Despite physical layer advancements, the underlying IEEE 802.11 MAC standard cannot fully exploit features and support high-performance applications. In this work, we propose the novel spectrally efficient asynchronous multi-channel MAC (SA-MMAC protocol for wireless networks using a single half-duplex transceiver. A full-duplex mode of operation on data channels reduces the signaling overhead and boosts the spectrum efficiency. A revamped contention mechanism of IEEE 802.11 addresses the multi-channel hidden terminal problem, and a jamming signal from the receiver addresses the collisions in control signals. Furthermore, the control channel is used for data transmissions to increase the bandwidth utilization but under a restricted half-duplex mode to avoid causing a bottleneck situation. The simulator is tested for correctness. The results suggest that the protocol can work well on 3, 4, or 12 concurrent channels with high node density, providing about 12.5 times more throughput than IEEE 802.11 and 18% to 95% more throughput than its multi-channel variants under saturated traffic conditions.

  2. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled

    2015-07-06

    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.

  3. Fuzzy adaptive Kalman filter for indoor mobile target positioning with INS/WSN integrated method

    Institute of Scientific and Technical Information of China (English)

    杨海; 李威; 罗成名

    2015-01-01

    Pure inertial navigation system (INS) has divergent localization errors after a long time. In order to compensate the disadvantage, wireless sensor network (WSN) associated with the INS was applied to estimate the mobile target positioning. Taking traditional Kalman filter (KF) as the framework, the system equation of KF was established by the INS and the observation equation of position errors was built by the WSN. Meanwhile, the observation equation of velocity errors was established by the velocity difference between the INS and WSN, then the covariance matrix of Kalman filter measurement noise was adjusted with fuzzy inference system (FIS), and the fuzzy adaptive Kalman filter (FAKF) based on the INS/WSN was proposed. The simulation results show that the FAKF method has better accuracy and robustness than KF and EKF methods and shows good adaptive capacity with time-varying system noise. Finally, experimental results further prove that FAKF has the fast convergence error, in comparison with KF and EKF methods.

  4. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  5. Performance analysis and improvement of WPAN MAC for home networks.

    Science.gov (United States)

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  6. Performance Analysis and Improvement of WPAN MAC for Home Networks

    Directory of Open Access Journals (Sweden)

    Saurabh Mehta

    2010-03-01

    Full Text Available The wireless personal area network (WPAN is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3 MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  7. Adaptive management of energy consumption, reliability and delay of wireless sensor node: Application to IEEE 802.15.4 wireless sensor node.

    Science.gov (United States)

    Kone, Cheick Tidjane; Mathias, Jean-Denis; De Sousa, Gil

    2017-01-01

    Designing a Wireless Sensor Network (WSN) to achieve a high Quality of Service (QoS) (network performance and durability) is a challenging problem. We address it by focusing on the performance of the 802.15.4 communication protocol because the IEEE 802.15.4 Standard is actually considered as one of the reference technologies in WSNs. In this paper, we propose to control the sustainable use of resources (i.e., energy consumption, reliability and timely packet transmission) of a wireless sensor node equipped with photovoltaic cells by an adaptive tuning not only of the MAC (Medium Access Control) parameters but also of the sampling frequency of the node. To do this, we use one of the existing control approaches, namely the viability theory, which aims to preserve the functions and the controls of a dynamic system in a set of desirable states. So, an analytical model, describing the evolution over time of nodal resources, is derived and used by a viability algorithm for the adaptive tuning of the IEEE 802.15.4 MAC protocol. The simulation analysis shows that our solution allows ensuring indefinitely, in the absence of hardware failure, the operations (lifetime duration, reliability and timely packet transmission) of an 802.15.4 WSN and one can temporarily increase the sampling frequency of the node beyond the regular sampling one. This latter brings advantages for agricultural and environmental applications such as precision agriculture, flood or fire prevention. Main results show that our current approach enable to send more information when critical events occur without the node runs out of energy. Finally, we argue that our approach is generic and can be applied to other types of WSN.

  8. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  9. An energy efficient and dynamic time synchronization protocol for wireless sensor networks

    Science.gov (United States)

    Zhang, Anran; Bai, Fengshan

    2017-01-01

    Time synchronization is an important support technology of WSN(Wireless Sensor Network), and plays an irreplaceable role in the development of WSN. In view of the disadvantage of the traditional timing sync protocol for sensor networks (TPSN), we present a Physical Timing-sync Protocol (PTPSN) that aims at reducing the energy consumption of the synchronization process and realizes a dynamic Network. The algorithm broadcasts reference message to select some nodes in specific area. The receiver calculate offset of every selected node, and then calculate the average of offset to compensate for clock skew . At the same time ,we add time-filter process to ensure the security of the algorithm for time synchronization. The experiment results show that our algorithm is efficient in both saving energy consumption and dynamic network, and it can effectively resist attacks.

  10. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2014-01-01

    Do it all with your iMac and this bestselling For Dummies guide! You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one computer. This updated edition of iMac For Dummies is the ideal way to learn the iMac fundamentals from setting up and personalizing your machine to importing files, making FaceTime video calls, surfing the web, using your favorite programs and apps, and everything in between. Trusted Mac guru Mark

  11. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  12. A WSN-based tool for urban and industrial fire-fighting.

    Science.gov (United States)

    De San Bernabe Clemente, Alberto; Martínez-de Dios, José Ramiro; Ollero Baturone, Aníbal

    2012-11-06

    This paper describes a WSN tool to increase safety in urban and industrial fire-fighting activities. Unlike most approaches, we assume that there is no preexisting WSN in the building, which involves interesting advantages but imposes some constraints. The system integrates the following functionalities: fire monitoring, firefighter monitoring and dynamic escape path guiding. It also includes a robust localization method that employs RSSI-range models dynamically trained to cope with the peculiarities of the environment. The training and application stages of the method are applied simultaneously, resulting in significant adaptability. Besides simulations and laboratory tests, a prototype of the proposed system has been validated in close-to-operational conditions.

  13. Mac at Work

    CERN Document Server

    Sparks, David

    2011-01-01

    Bridge the gap between using a Mac at home and at the office. Now that you love your Mac at home, you want to use one at the office without missing a beat of productivity or professionalism. This unique guide shows you how.  You'll find best Mac business practices for handling word processing, spreadsheet and presentation creation, task and project management, and graphics. The book also explores topics such as hardware maintenance, how to synchronize with multiple computers, data backup, and communication with Windows networks.: Covers the nuts and bolts of using a Mac at work, including sync

  14. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MAC...

  15. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  16. MacBook Teach Yourself VISUALLY

    CERN Document Server

    Miser, Brad

    2010-01-01

    Like the MacBook itself, Teach Yourself VISUALLY MacBook, Second Edition is designed to be visually appealing, while providing excellent functionality at the same time. By using this book, MacBook users will be empowered to do everyday tasks quickly and easily. From such basic steps as powering on or shutting down the MacBook, working on the Mac desktop with the Dashboard and its widgets to running Windows applications, Teach Yourself VISUALLY MacBook, Second Edition covers all the vital information and provides the help and support a reader needs—in many ways it's like having a Mac Genius at

  17. Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages

    Science.gov (United States)

    Larizgoitia, Iker; Muguira, Leire; Vazquez, Juan Ignacio

    Wireless sensor networks (WSN) are becoming extremely popular in the development of context aware systems. Traditionally WSN have been focused on capturing data, which was later analyzed and interpreted in a server with more computational power. In this kind of scenario the problem of representing the sensor information needs to be addressed. Every node in the network might have different sensors attached; therefore their correspondent packet structures will be different. The server has to be aware of the meaning of every single structure and data in order to be able to interpret them. Multiple sensors, multiple nodes, multiple packet structures (and not following a standard format) is neither scalable nor interoperable. Context aware systems have solved this problem with the use of semantic technologies. They provide a common framework to achieve a standard definition of any domain. Nevertheless, these representations are computationally expensive, so a WSN cannot afford them. The work presented in this paper tries to bridge the gap between the sensor information and its semantic representation, by defining a simple architecture that enables the definition of this information natively in a semantic way, achieving the integration of the semantic information in the network packets. This will have several benefits, the most important being the possibility of promoting every WSN node to a real semantic information source.

  18. iMac pocket genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    If you want to get the very most out of your iMac, put this savvy Portable Genius guide to work. Want to make the most of the new Magic Mouse and the latest iLife apps? Set up a wireless network using your iMac's AirPort card? Watch television on your iMac, or show iMac videos and movies on your television? You'll find cool and useful Genius tips, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you time and let you enjoy your iMac to the max.

  19. Enterprise Mac Administrator's Guide

    CERN Document Server

    Edge, Charles; Hunter, Beau

    2009-01-01

    Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with "switcher" campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep cu

  20. A WSN-Based Tool for Urban and Industrial Fire-Fighting

    Directory of Open Access Journals (Sweden)

    Aníbal Ollero Baturone

    2012-11-01

    Full Text Available This paper describes a WSN tool to increase safety in urban and industrial fire-fighting activities. Unlike most approaches, we assume that there is no preexisting WSN in the building, which involves interesting advantages but imposes some constraints. The system integrates the following functionalities: fire monitoring, firefighter monitoring and dynamic escape path guiding. It also includes a robust localization method that employs RSSI-range models dynamically trained to cope with the peculiarities of the environment. The training and application stages of the method are applied simultaneously, resulting in significant adaptability. Besides simulations and laboratory tests, a prototype of the proposed system has been validated in close-to-operational conditions.

  1. The design of tea garden environmental monitoring system based on WSN

    Science.gov (United States)

    Chen, Huajun; Yuan, Lina

    2018-01-01

    Through the application of wireless sensor network (WSN) in tea garden, it can realize the change of traditional tea garden to the modern ones, and effectively improves the comprehensive productive capacity of tea garden. According to the requirement of real-time remote in agricultural information collection and monitoring and the power supply affected by environmental limitations, based on WSN, this paper designs a set of tea garden environmental monitoring system, which achieves the monitoring nodes with ad-hoc network as well as automatic acquisition and transmission to the tea plantations of air temperature, light intensity, soil temperature and humidity.

  2. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    The bestselling guide to the ultimate all-in-one computer—now updated and revised throughout! If you're looking for speed, performance, and power, the iMac is the ultimate all-in-one computer. From its superior performance, powerful operating system, and amazing applications, the iMac is one awesome machine, and the fun, friendly, and approachable style of iMac For Dummies is an ideal way to get started with the basics. You'll learn the fundamentals of the iMac including setting up and customizing your iMac and the software that comes with it, importing files from your old computer, send

  3. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  4. Macs For Dummies, Pocket Edition

    CERN Document Server

    Baig, Edward C

    2011-01-01

    The fun and easy way to make the most of your wonderful Mac. Simply Mac-nificent — all the cool things your Mac can do! This handy guide helps you figure out the nuts and bolts of your Mac. Navigate the Mac desktop, use the Safari Web browser to surf the Internet, e-mail photos to friends and family, create and print documents, rip audio CDs, and more. The fun begins right here!. Open the book and find: How to set up and configure your Mac; Tips for getting around on the Mac desktop; Steps for setting up an e-mail account and browsing the Internet; Details about the free programs that come wit

  5. Enterprise Mac administrators guide

    CERN Document Server

    Smith, William

    2015-01-01

    IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration.

  6. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2015-07-01

    Full Text Available Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1 the operational medium access control (O-MAC hybrid protocol and (2 the pheromone termite (PT model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1 determining the packet generation rate to avoid congestion and (2 pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10 that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.

  7. Detomidine reduces isoflurane anesthetic requirement (MAC) in horses.

    Science.gov (United States)

    Steffey, Eugene P; Pascoe, Peter J

    2002-10-01

    To quantitate the dose- and time-related magnitude of the anesthetic sparing effect of, and selected physiological responses to detomidine during isoflurane anesthesia in horses. Randomized cross-over study. Three, healthy, young adult horses weighing 485 ± 14 kg. Horses were anesthetized on two occasions to determine the minimum alveolar concentration (MAC) of isoflurane in O 2 and then to measure the anesthetic sparing effect (time-related MAC reduction) following IV detomidine (0.03 and 0.06 mg kg -1 ). Selected common measures of cardiopulmonary function, blood glucose and urinary output were also recorded. Isoflurane MAC was 1.44 ± 0.07% (mean ± SEM). This was reduced by 42.8 ± 5.4% and 44.8 ± 3.0% at 83 ± 23 and 125 ± 36 minutes, respectively, following 0.03 and 0.06 mg kg -1 , detomidine. The MAC reduction was detomidine dose- and time-dependent. There was a tendency for mild cardiovascular and respiratory depression, especially following the higher detomidine dose. Detomidine increased both blood glucose and urine flow; the magnitude of these changes was time- and dose-dependent CONCLUSIONS: Detomidine reduces anesthetic requirement for isoflurane and increases blood glucose concentration and urine flow in horses. These changes were dose- and time-related. The results imply potent anesthetic sparing actions by detomidine. The detomidine-related increased urine flow should be considered in designing anesthetic protocols for individual horses. Copyright © 2002 Association of Veterinary Anaesthetists and American College of Veterinary Anesthesia and Analgesia. Published by Elsevier Ltd. All rights reserved.

  8. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  9. An Energy Aware Adaptive Sampling Algorithm for Energy Harvesting WSN with Energy Hungry Sensors

    Science.gov (United States)

    Srbinovski, Bruno; Magno, Michele; Edwards-Murphy, Fiona; Pakrashi, Vikram; Popovici, Emanuel

    2016-01-01

    Wireless sensor nodes have a limited power budget, though they are often expected to be functional in the field once deployed for extended periods of time. Therefore, minimization of energy consumption and energy harvesting technology in Wireless Sensor Networks (WSN) are key tools for maximizing network lifetime, and achieving self-sustainability. This paper proposes an energy aware Adaptive Sampling Algorithm (ASA) for WSN with power hungry sensors and harvesting capabilities, an energy management technique that can be implemented on any WSN platform with enough processing power to execute the proposed algorithm. An existing state-of-the-art ASA developed for wireless sensor networks with power hungry sensors is optimized and enhanced to adapt the sampling frequency according to the available energy of the node. The proposed algorithm is evaluated using two in-field testbeds that are supplied by two different energy harvesting sources (solar and wind). Simulation and comparison between the state-of-the-art ASA and the proposed energy aware ASA (EASA) in terms of energy durability are carried out using in-field measured harvested energy (using both wind and solar sources) and power hungry sensors (ultrasonic wind sensor and gas sensors). The simulation results demonstrate that using ASA in combination with an energy aware function on the nodes can drastically increase the lifetime of a WSN node and enable self-sustainability. In fact, the proposed EASA in conjunction with energy harvesting capability can lead towards perpetual WSN operation and significantly outperform the state-of-the-art ASA. PMID:27043559

  10. An Energy Aware Adaptive Sampling Algorithm for Energy Harvesting WSN with Energy Hungry Sensors

    Directory of Open Access Journals (Sweden)

    Bruno Srbinovski

    2016-03-01

    Full Text Available Wireless sensor nodes have a limited power budget, though they are often expected to be functional in the field once deployed for extended periods of time. Therefore, minimization of energy consumption and energy harvesting technology in Wireless Sensor Networks (WSN are key tools for maximizing network lifetime, and achieving self-sustainability. This paper proposes an energy aware Adaptive Sampling Algorithm (ASA for WSN with power hungry sensors and harvesting capabilities, an energy management technique that can be implemented on any WSN platform with enough processing power to execute the proposed algorithm. An existing state-of-the-art ASA developed for wireless sensor networks with power hungry sensors is optimized and enhanced to adapt the sampling frequency according to the available energy of the node. The proposed algorithm is evaluated using two in-field testbeds that are supplied by two different energy harvesting sources (solar and wind. Simulation and comparison between the state-of-the-art ASA and the proposed energy aware ASA (EASA in terms of energy durability are carried out using in-field measured harvested energy (using both wind and solar sources and power hungry sensors (ultrasonic wind sensor and gas sensors. The simulation results demonstrate that using ASA in combination with an energy aware function on the nodes can drastically increase the lifetime of a WSN node and enable self-sustainability. In fact, the proposed EASA in conjunction with energy harvesting capability can lead towards perpetual WSN operation and significantly outperform the state-of-the-art ASA.

  11. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  12. Environment Emulation For Wsn Testbed

    Directory of Open Access Journals (Sweden)

    Radosław Kapłoniak

    2012-01-01

    Full Text Available The development of applications for wireless sensor networks is a challenging task. For this reason, several testbed platforms have been created. They simplify the manageability of nodes by offering easy ways of programming and debugging sensor nodes. These platforms, sometimes composed of dozens of sensors, provide a convenient way for carrying out research on medium access control and data exchange between nodes. In this article, we propose the extension of the WSN testbed, which could be used for evaluating and testing the functionality of sensor networks applications by emulating a real-world environment.

  13. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  14. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available In this paper, we address the Wireless Sensor Network (WSN deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.

  15. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events.

    Science.gov (United States)

    Aitsaadi, Nadjib; Achir, Nadjib; Boussetta, Khaled; Pujolle, Guy

    2009-01-01

    In this paper, we address the Wireless Sensor Network (WSN) deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.

  16. Energy Aware GPSR Routing Protocol in a Wireless Sensor Network ...

    African Journals Online (AJOL)

    Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their ...

  17. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    International Nuclear Information System (INIS)

    Farooq, Hasan; Jung, Low Tang

    2013-01-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  18. Analisa Eco-friendly Attitudes Dan Eco-friendly Behavior Terhadap Eco-friendly Intention Green Hotel Di Indonesia

    OpenAIRE

    Silvia, Lanny; Rudijanto, Diana Gabriela; Kristanti, Monika

    2017-01-01

    Kesadaran masyarakat akan lingkungan yang semakin meningkat membuat masyarakat gencar mencari hotel yang ramah lingkungan dibandingkan dengan hotel konvensional. Penelitian ini bertujuan untuk mengetahui perbedaan eco-friendly attitude, eco- friendly behavior, dan eco-friendly intention konsumen generasi x dan generasi y terhadap green hotel di Indonesia dan apakah eco-friendly attitudes dan eco-friendly behavior berpengaruh signifikan terhadap eco-friendly intention. Total responden dalam pe...

  19. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  20. Gotcha! Macs lose their innocence

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still believe your Mac is secure because Microsoft PCs fall prey to viruses and worms but Macs don’t? Time to wake up! This year has seen the first major compromise of Macs worldwide*. How is yours doing?   The “Flashback” Trojan is affecting Apple’s own variant of Java and compromises Macs via so-called drive-by infections, i.e. when you visit an appropriately prepared (infected!) website - and this might not necessarily be a site with questionable contents, but could well be a popular, reputable one. Security Companies worldwide have been monitoring this particular Trojan for a while and have estimated that more than half a million Macs were compromised. Connected to a few central command and control servers, the compromised Macs were then supporting the malicious activity of the bad guys! Fortunately, the security companies have now been able to take over those command and control servers and stop their destructive drive. So, Mac users, face the f...

  1. Congestion Control for a Fair Packet Delivery in WSN: From a Complex System Perspective

    Directory of Open Access Journals (Sweden)

    Daniela Aguirre-Guerrero

    2014-01-01

    Full Text Available In this work, we propose that packets travelling across a wireless sensor network (WSN can be seen as the active agents that make up a complex system, just like a bird flock or a fish school, for instance. From this perspective, the tools and models that have been developed to study this kind of systems have been applied. This is in order to create a distributed congestion control based on a set of simple rules programmed at the nodes of the WSN. Our results show that it is possible to adapt the carried traffic to the network capacity, even under stressing conditions. Also, the network performance shows a smooth degradation when the traffic goes beyond a threshold which is settled by the proposed self-organized control. In contrast, without any control, the network collapses before this threshold. The use of the proposed solution provides an effective strategy to address some of the common problems found in WSN deployment by providing a fair packet delivery. In addition, the network congestion is mitigated using adaptive traffic mechanisms based on a satisfaction parameter assessed by each packet which has impact on the global satisfaction of the traffic carried by the WSN.

  2. An Eco-Friendly Improved Protocol for the Synthesis of Bis(3-indolyl)methanes Using Poly(4-vinylpyridinium)hydrogen Sulfate as Efficient, Heterogeneous, and Recyclable Solid Acid Catalyst

    Science.gov (United States)

    Banothu, Janardhan; Gali, Rajitha; Velpula, Ravibabu; Bavantula, Rajitha; Crooks, Peter A.

    2013-01-01

    Highly efficient and eco-friendly protocol for the synthesis of bis(3-indolyl)methanes by the electrophilic substitution reaction of indole with aldehydes catalyzed by poly(4-vinylpyridinium)hydrogen sulfate was described. Excellent yields, shorter reaction times, simple work-up procedure, avoiding hazardous organic solvents, and reusability of the catalyst are the most obvious advantages of this method. PMID:24052864

  3. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  4. [Applications of eco-environmental big data: Progress and prospect].

    Science.gov (United States)

    Zhao, Miao Miao; Zhao, Shi Cheng; Zhang, Li Yun; Zhao, Fen; Shao, Rui; Liu, Li Xiang; Zhao, Hai Feng; Xu, Ming

    2017-05-18

    With the advance of internet and wireless communication technology, the fields of ecology and environment have entered a new digital era with the amount of data growing explosively and big data technologies attracting more and more attention. The eco-environmental big data is based airborne and space-/land-based observations of ecological and environmental factors and its ultimate goal is to integrate multi-source and multi-scale data for information mining by taking advantages of cloud computation, artificial intelligence, and modeling technologies. In comparison with other fields, the eco-environmental big data has its own characteristics, such as diverse data formats and sources, data collected with various protocols and standards, and serving different clients and organizations with special requirements. Big data technology has been applied worldwide in ecological and environmental fields including global climate prediction, ecological network observation and modeling, and regional air pollution control. The development of eco-environmental big data in China is facing many problems, such as data sharing issues, outdated monitoring facilities and techno-logies, and insufficient data mining capacity. Despite all this, big data technology is critical to solving eco-environmental problems, improving prediction and warning accuracy on eco-environmental catastrophes, and boosting scientific research in the field in China. We expected that the eco-environmental big data would contribute significantly to policy making and environmental services and management, and thus the sustainable development and eco-civilization construction in China in the coming decades.

  5. MAC-Level Communication Time Modeling and Analysis for Real-Time WSNs

    Directory of Open Access Journals (Sweden)

    STANGACIU, V.

    2016-02-01

    Full Text Available Low-level communication protocols and their timing behavior are essential to developing wireless sensor networks (WSNs able to provide the support and operating guarantees required by many current real-time applications. Nevertheless, this aspect still remains an issue in the state-of-the-art. In this paper we provide a detailed analysis of a recently proposed MAC-level communication timing model and demonstrate its usability in designing real-time protocols. The results of a large set of measurements are also presented and discussed here, in direct relation to the main time parameters of the analyzed model.

  6. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  7. Comparative Study of Temporal Aspects of Data Collection Using Remote Database vs. Abstract Database in WSN

    Directory of Open Access Journals (Sweden)

    Abderrahmen BELFKIH

    2015-06-01

    Full Text Available The real-time aspect is an important factor for Wireless Sensor Network (WSN applications, which demand a timely data delivery, to reflect the current state of the environment. However, most existing works in the field of sensor networks are only interested in data processing and energy consumption, to improve the lifetime of WSN. Extensive researches have been done on data processing in WSN. Some works have been interested in improving data collection methods, and others have focused on various query processing techniques. In recent years, the query processing using abstract database technology like Cougar and TinyDB has shown efficient results in many researches. This paper presents a study of timing properties through two data processing techniques for WSN. The first is based on a warehousing approach, in which data are collected and stored on a remote database. The second is based on query processing using an abstract database like TinyDB. This study has allowed us to identify some factors which enhance the respect of temporal constraints.

  8. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter.

    Science.gov (United States)

    Modali, Sita D; Zgurskaya, Helen I

    2011-08-01

    Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.

  9. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  10. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Higgins Henry

    2009-01-01

    Full Text Available Abstract This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  11. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sana Ullah

    2009-01-01

    Full Text Available This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  12. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  13. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  14. Development of Energy Efficient Clustering Protocol in Wireless Sensor Network Using Neuro-Fuzzy Approach.

    Science.gov (United States)

    Julie, E Golden; Selvi, S Tamil

    2016-01-01

    Wireless sensor networks (WSNs) consist of sensor nodes with limited processing capability and limited nonrechargeable battery power. Energy consumption in WSN is a significant issue in networks for improving network lifetime. It is essential to develop an energy aware clustering protocol in WSN to reduce energy consumption for increasing network lifetime. In this paper, a neuro-fuzzy energy aware clustering scheme (NFEACS) is proposed to form optimum and energy aware clusters. NFEACS consists of two parts: fuzzy subsystem and neural network system that achieved energy efficiency in forming clusters and cluster heads in WSN. NFEACS used neural network that provides effective training set related to energy and received signal strength of all nodes to estimate the expected energy for tentative cluster heads. Sensor nodes with higher energy are trained with center location of base station to select energy aware cluster heads. Fuzzy rule is used in fuzzy logic part that inputs to form clusters. NFEACS is designed for WSN handling mobility of node. The proposed scheme NFEACS is compared with related clustering schemes, cluster-head election mechanism using fuzzy logic, and energy aware fuzzy unequal clustering. The experiment results show that NFEACS performs better than the other related schemes.

  15. Mycobacterium Avium Complex (MAC)

    Science.gov (United States)

    ... sweat, and saliva red-orange (may stain contact lenses); can interfere with birth control pills. Many drug interactions. CAN MAC BE PREVENTED? The bacteria that cause MAC are very common. It is ...

  16. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  17. Pithy Review on Routing Protocols in Wireless Sensor Networks and Least Routing Time Opportunistic Technique in WSN

    Science.gov (United States)

    Salman Arafath, Mohammed; Rahman Khan, Khaleel Ur; Sunitha, K. V. N.

    2018-01-01

    Nowadays due to most of the telecommunication standard development organizations focusing on using device-to-device communication so that they can provide proximity-based services and add-on services on top of the available cellular infrastructure. An Oppnets and wireless sensor network play a prominent role here. Routing in these networks plays a significant role in fields such as traffic management, packet delivery etc. Routing is a prodigious research area with diverse unresolved issues. This paper firstly focuses on the importance of Opportunistic routing and its concept then focus is shifted to prime aspect i.e. on packet reception ratio which is one of the highest QoS Awareness parameters. This paper discusses the two important functions of routing in wireless sensor networks (WSN) namely route selection using least routing time algorithm (LRTA) and data forwarding using clustering technique. Finally, the simulation result reveals that LRTA performs relatively better than the existing system in terms of average packet reception ratio and connectivity.

  18. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  19. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  20. An ACOR-Based Multi-Objective WSN Deployment Example for Lunar Surveying.

    Science.gov (United States)

    López-Matencio, Pablo

    2016-02-06

    Wireless sensor networks (WSNs) can gather in situ real data measurements and work unattended for long periods, even in remote, rough places. A critical aspect of WSN design is node placement, as this determines sensing capacities, network connectivity, network lifetime and, in short, the whole operational capabilities of the WSN. This paper proposes and studies a new node placement algorithm that focus on these aspects. As a motivating example, we consider a network designed to describe the distribution of helium-3 (³He), a potential enabling element for fusion reactors, on the Moon. ³He is abundant on the Moon's surface, and knowledge of its distribution is essential for future harvesting purposes. Previous data are inconclusive, and there is general agreement that on-site measurements, obtained over a long time period, are necessary to better understand the mechanisms involved in the distribution of this element on the Moon. Although a mission of this type is extremely complex, it allows us to illustrate the main challenges involved in a multi-objective WSN placement problem, i.e., selection of optimal observation sites and maximization of the lifetime of the network. To tackle optimization, we use a recent adaptation of the ant colony optimization (ACOR) metaheuristic, extended to continuous domains. Solutions are provided in the form of a Pareto frontier that shows the optimal equilibria. Moreover, we compared our scheme with the four-directional placement (FDP) heuristic, which was outperformed in all cases.

  1. Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN

    Directory of Open Access Journals (Sweden)

    Wang Xue-Wen

    2016-01-01

    Full Text Available The secure location of node is significant in the WSN (Wireless Sensor Networks of the troop frontier defence system. The wormhole attack is a big threat in the secure location. The credibility of the beacon node was used to determine the malicious nodes produced by wormhole attack in the WSN. The estimated method of multibeacon nodes was adopted to improve DV-HOP algorithm after excluding the malicious nodes. In this paper, we compared the basic DV-HOP algorithm and the improved DV-HOP algorithm in the coverage percentage and the error of network localization by simulating. The simulation results indicate that the improved DV-HOP algorithm makes the localization coverage percentage can reach 90% on a certain scale of the network, and it makes the error percentage lower when the number of beacons is different.

  2. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter

    OpenAIRE

    Modali, Sita D.; Zgurskaya, Helen I.

    2011-01-01

    Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation o...

  3. Learn Excel 2011 for Mac

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Microsoft Excel 2011 for Mac OS X is a powerful application, but many of its most impressive features can be difficult to find. Learn Excel 2011 for Mac by Guy Hart-Davis is a practical, hands-on approach to learning all of the details of Excel 2011 in order to get work done efficiently on Mac OS X. From using formulas and functions to creating databases, from analyzing data to automating tasks, you'll learn everything you need to know to put this powerful application to use for a variety of tasks. What you'll learn * The secrets of the Excel for Mac interface! * How to create effective workbo

  4. Mac Programming for Absolute Beginners

    CERN Document Server

    Wang, Wallace

    2011-01-01

    Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs.

  5. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee Pro

    Science.gov (United States)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Standards-based wireless sensor network (WSN) protocols are promising candidates for spacecraft avionics systems, offering unprecedented instrumentation flexibility and expandability. Ensuring reliable data transport is key, however, when migrating from wired to wireless data gathering systems. In this paper, we conduct a rigorous laboratory analysis of the relative performances of the ZigBee Pro and ISA100.11a protocols in a representative crewed aerospace environment. Since both operate in the 2.4 GHz radio frequency (RF) band shared by systems such as Wi-Fi, they are subject at times to potentially debilitating RF interference. We compare goodput (application-level throughput) achievable by both under varying levels of 802.11g Wi-Fi traffic. We conclude that while the simpler, more inexpensive ZigBee Pro protocol performs well under moderate levels of interference, the more complex and costly ISA100.11a protocol is needed to ensure reliable data delivery under heavier interference. This paper represents the first published, rigorous analysis of WSN protocols in an aerospace environment that we are aware of and the first published head-to-head comparison of ZigBee Pro and ISA100.11a.

  6. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2007-01-01

    Thinking of making the switch from your PC to a Mac? Congratulations! You're in for a great, virus-free ride. And Switching to Mac For Dummies makes it smoother than you ever imagined. From buying the Mac that's right for you to transferring your files to breaking your old Windows habits and learning to do things the (much easier) Mac way, it makes the whole process practically effortless. Whether you've been using Windows XP, Vista, or even Linux, you'll find simple, straightforward ways to make your transition go smoothly. That will leave you plenty of time to get familiar with Mac'

  7. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  8. Enterprise Mac Managed Preferences

    CERN Document Server

    Marczak, Edward

    2010-01-01

    Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple's Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also be used in Windows environments or where no dedicated server exists at all. Enterprise Mac Managed Preferences is the definitive guide to Apple's Managed Client technology. With this book, you'll get the following: * An example-driven guide to Mac OS X Managed Pr

  9. Development of Energy Efficient Clustering Protocol in Wireless Sensor Network Using Neuro-Fuzzy Approach

    Directory of Open Access Journals (Sweden)

    E. Golden Julie

    2016-01-01

    Full Text Available Wireless sensor networks (WSNs consist of sensor nodes with limited processing capability and limited nonrechargeable battery power. Energy consumption in WSN is a significant issue in networks for improving network lifetime. It is essential to develop an energy aware clustering protocol in WSN to reduce energy consumption for increasing network lifetime. In this paper, a neuro-fuzzy energy aware clustering scheme (NFEACS is proposed to form optimum and energy aware clusters. NFEACS consists of two parts: fuzzy subsystem and neural network system that achieved energy efficiency in forming clusters and cluster heads in WSN. NFEACS used neural network that provides effective training set related to energy and received signal strength of all nodes to estimate the expected energy for tentative cluster heads. Sensor nodes with higher energy are trained with center location of base station to select energy aware cluster heads. Fuzzy rule is used in fuzzy logic part that inputs to form clusters. NFEACS is designed for WSN handling mobility of node. The proposed scheme NFEACS is compared with related clustering schemes, cluster-head election mechanism using fuzzy logic, and energy aware fuzzy unequal clustering. The experiment results show that NFEACS performs better than the other related schemes.

  10. Facile, eco-friendly, catalyst-free synthesis of polyfunctionalized quinoxalines.

    Science.gov (United States)

    Zhang, Yaohong; Luo, Mengqiang; Li, Yan; Wang, Hai; Ren, Xiaorong; Qi, Chenze

    2018-02-01

    A novel, facile and eco-friendly synthesis of quinoxalines from [Formula: see text] and 1,2-diamines was developed. An attractive feature of this protocol is that the desired products could be generated efficiently in water and without any catalyst, which is in accordance with the aim of green chemistry. A plausible mechanism has been proposed.

  11. ERT to aid in WSN based early warning system for landslides

    Science.gov (United States)

    T, H.

    2017-12-01

    Amrita University's landslide monitoring and early warning system using Wireless Sensor Networks (WSN) consists of heterogeneous sensors like rain gauge, moisture sensor, piezometer, geophone, inclinometer, tilt meter etc. The information from the sensors are accurate and limited to that point. In order to monitor a large area, ERT can be used in conjunction with WSN technology. To accomplish the feasibility of ERT in landslide early warning along with WSN technology, we have conducted experiments in Amrita's landslide laboratory setup. The experiment was aimed to simulate landslide, and monitor the changes happening in the soil using moisture sensor and ERT. Simulating moisture values from resistivity measurements to a greater accuracy can help in landslide monitoring for large areas. For accomplishing the same we have adapted two mathematical approaches, 1) Regression analysis between resistivity measurements and actual moisture values from moisture sensor, and 2) Using Waxman Smith model to simulate moisture values from resistivity measurements. The simulated moisture values from Waxman Smith model is compared with the actual moisture values and the Mean Square Error (MSE) is found to be 46.33. Regression curve is drawn for the resistivity vs simulated moisture values from Waxman model, and it is compared with the regression curve of actual model, which is shown in figure-1. From figure-1, it is clear that there the regression curve from actual moisture values and the regression curve from simulated moisture values, follow the similar pattern and there is a small difference between them. Moisture values can be simulated to a greater accuracy using actual regression equation, but the limitation is that, regression curves will differ for different sites and different soils. Regression equation from actual moisture values can be used, if we have conducted experiment in the laboratory for a particular soil sample, otherwise with the knowledge of soil properties

  12. Eco-marketing and eco-design of products

    Directory of Open Access Journals (Sweden)

    Filipović Jovan

    2007-01-01

    Full Text Available Environmental marketing (Eco-marketing, as a relatively new movement, emerged at the beginning of the 20th century, is in the growing phase of its development. Eco-labeling and other ways/types of eco-marketing are attracting more attention of consumers, since they are aware of the necessity of nature conservation and environmental protection. There has been a lot of misunderstanding and miss leadings in interpretation and substantiation of ecomarketing claims in previous period of time. One of the most concrete improvements in eco-marketing was appearance and establishment of ISO 14020 guidelines. ISO 14020 guidelines are integral part of ISO 14000 series of standards, which could be implemented in eco-marketing. At the same time, development of "green" products and marketing of "green" products, are direct positive contributions to resources reduction, environmental protection and sustainable economic development. Companies designing this kind of products can expect better position on the market, improvement of competitiveness, reduction of expenses (less raw materials, less waste, less harmful effects on the environment, raising corporate social responsibility, higher export.

  13. Synchronous Firefly Algorithm for Cluster Head Selection in WSN

    Directory of Open Access Journals (Sweden)

    Madhusudhanan Baskaran

    2015-01-01

    Full Text Available Wireless Sensor Network (WSN consists of small low-cost, low-power multifunctional nodes interconnected to efficiently aggregate and transmit data to sink. Cluster-based approaches use some nodes as Cluster Heads (CHs and organize WSNs efficiently for aggregation of data and energy saving. A CH conveys information gathered by cluster nodes and aggregates/compresses data before transmitting it to a sink. However, this additional responsibility of the node results in a higher energy drain leading to uneven network degradation. Low Energy Adaptive Clustering Hierarchy (LEACH offsets this by probabilistically rotating cluster heads role among nodes with energy above a set threshold. CH selection in WSN is NP-Hard as optimal data aggregation with efficient energy savings cannot be solved in polynomial time. In this work, a modified firefly heuristic, synchronous firefly algorithm, is proposed to improve the network performance. Extensive simulation shows the proposed technique to perform well compared to LEACH and energy-efficient hierarchical clustering. Simulations show the effectiveness of the proposed method in decreasing the packet loss ratio by an average of 9.63% and improving the energy efficiency of the network when compared to LEACH and EEHC.

  14. A Camac-VME-MacIntosh data acquisition system for nuclear experiments

    International Nuclear Information System (INIS)

    Anzalone, A.; Giustolisi, F.

    1989-01-01

    A multiprocessor system for data acquisition and analysis in low energy nuclear physics has been realized at the Laboratorio Nazionale del Sud. the system is built around Camac, VME-bus and MacIntosh PC. A multiprocessor software has been developed, using RTF, Macsys and Cern cross-software. The execution of several programs which run on several VME-CPU's and on an external PC, is coordinated by a mail box protocol. No operating system is used on the VME-CPU's

  15. Mac OS X Tiger for Unix Geeks

    CERN Document Server

    Jepson, Brian

    2005-01-01

    If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Gee

  16. Design and Implementation of PV based Energy Harvester for WSN Node with MAIC algorithm

    Directory of Open Access Journals (Sweden)

    RAJENDRAN, H.

    2015-05-01

    Full Text Available Wireless sensor networks (WSNs are hardly in need of an additional source of power other than the normally used batteries, to increase the lifetime considerably. In this paper, mathematical modeling of photovoltaic energy harvesting (PVEH system for the WSN is presented. The system comprises of the solar PV panel, boost converter as maximum power point tracker with moving averaged incremental conductance (MAIC maximum power point (MPP algorithm, Ni-MH battery for energy storage, compensator, buck regulator and the mathematically modeled WSN mote. MAIC algorithm is proposed to avoid the effect of drastic variations in input irradiance, in locking the MPP point. WSN mote is modeled in both active and sleep state based on the power consumption. To maintain the voltage stability, proper compensator has been designed for the proposed system. The performance of the system is tested for dynamic variations of environmental conditions using MATLAB simulation. The proposed system has 50 to 60 percent improved conversion efficiency when compared to the conventional direct coupling method. The parameters of the photovoltaic panel model have been validated through experimentation. Also the practical verification of the operation of MPPT circuit has been performed.

  17. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  18. AeroMACS system characterization and demonstrations

    Science.gov (United States)

    Kerczewski, R. J.; Apaza, R. D.; Dimond, R. P.

    This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  19. Implementation Of The Precision Agriculture Using LEACH Protocol Of Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Than Htike Aung

    2015-08-01

    Full Text Available The evolution of wireless sensor network technology leads to develop advanced systems for real-time monitoring. Wireless sensor network WSN is a major technology that drives the development of precision agriculture.By forming wireless sensor networkagricultural practicescan be made good monitoring systems.Various agricultural parameters like soil moisture temperature and humidity are monitored by monitoring units.The paper explains about how to utilize thesensors in agricultural practices and explains about routing protocols of wireless sensor network. In this paper agricultural parameter of temperature will monitor with the use of LEACH protocol.

  20. EcoMark 2.0

    DEFF Research Database (Denmark)

    Guo, Chenjuan; Yang, Bin; Andersen, Ove

    2015-01-01

    Eco-routing is a simple yet effective approach to substantially reducing the environmental impact, e.g., fuel consumption and greenhouse gas (GHG) emissions, of vehicular transportation. Eco-routing relies on the ability to reliably quantify the environmental impact of vehicles as they travel...... in a spatial network. The procedure of quantifying such vehicular impact for road segments of a spatial network is called eco-weight assignment. EcoMark 2.0 proposes a general framework for eco-weight assignment to enable eco-routing. It studies the abilities of six instantaneous and five aggregated models......, and experiments for assessing the utility of the impact models in assigning eco-weights. The application of EcoMark 2.0 indicates that the instantaneous model EMIT and the aggregated model SIDRA-Running are suitable for assigning eco-weights under varying circumstances. In contrast, other instantaneous models...

  1. On Developing a Novel Versatile Framework for Heterogeneous Home Monitoring WSN networks

    Directory of Open Access Journals (Sweden)

    Ch. P. Antonopoulos

    2015-05-01

    Full Text Available The ability to deploy efficient and versatile WSN networks in the home environment is and will remain in the years to come a cornerstone objective in wireless networking. Respective services are continuously expanding requiring novel design and implementation approaches able to cover all relative present and even more importantly future requirements. This paper aims to present and convey knowledge and experience gained from such an effort in the context of home monitoring. Respective discussion covers all relative aspects and analyzes all critical challenges addressed ranging from identification and specification of the main requirements, to possible implementation approaches considered and finally the actual development undertaken. The final outcome considering the WSN home monitoring infrastructure as well as extracted knowledge and practical conclusions can be proven useful for further extending such an endeavour or even pursuing a different approach.

  2. MacBook All-in-One For Dummies

    CERN Document Server

    Chambers, Mark L

    2011-01-01

    Get comfortable and confident with your MacBook! Combining the fun-but-straightforward content of nine minibooks, this new edition of MacBook All-in-One For Dummies delivers helpful coverage of the rich features and essential tools you need to know to use the MacBook to its fullest potential. You'll learn an array of MacBook basics while veteran author Mark Chambers walks you through setting up your MacBook, running programs, finding files with Finder, searching with Spotlight, keeping track with Address Book, enjoying music with iTunes, creating cool multimedia projects with iLife, and more.

  3. Mac OS X Lion Server For Dummies

    CERN Document Server

    Rizzo, John

    2011-01-01

    The perfect guide to help administrators set up Apple's Mac OS X Lion Server With the overwhelming popularity of the iPhone and iPad, more Macs are appearing in corporate settings. The newest version of Mac Server is the ideal way to administer a Mac network. This friendly guide explains to both Windows and Mac administrators how to set up and configure the server, including services such as iCal Server, Podcast Producer, Wiki Server, Spotlight Server, iChat Server, File Sharing, Mail Services, and support for iPhone and iPad. It explains how to secure, administer, and troubleshoot the networ

  4. ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

    OpenAIRE

    Younas Khan; Sheeraz Ahmed; Fakhri Alam Khan; Imran Ahmad; Saqib Shahid Rahim; M. Irfan Khattak

    2016-01-01

    Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no da...

  5. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  6. Switching to the Mac The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls, inefficien

  7. Macs all-in-one for dummies

    CERN Document Server

    Hutsko, Joe

    2014-01-01

    Your all-in-one guide to unleashing your Mac's full potential It's a Mac world out there. But if you haven't read the instruction manual, you may be neglecting some of your computer's coolest features. Turn to Macs All-in-One For Dummies' jam-packed guide to access the incredible tools within your computer. With this fully updated reference, you will learn how to use Launchpad and Mission Control; protect your Mac; back up and restore data with Time Machine; sync across devices in iCloud; import, organize, and share photos; direct in iMovie; compose in GarageBand; and so much more. The possi

  8. Eco-sustainable routing in optical networks

    DEFF Research Database (Denmark)

    Ricciardi, Sergio; Wang, Jiayuan; Palmieri, Francesco

    2013-01-01

    infrastructures are now widely recognized to play a fundamental role in the emission of green-house gases (GHG) in the at- mosphere, signicantly aecting the environmental sustainability of new evolutions in network architectures as well as technological developments in communication devices. In this paper......, a novel eco-sustainable Routing and Wavelength Assignment (RWA) algorithm, based on shortest-path routing with an adaptive link weighting function relying on an extension of the OSPF-TE protocol to convey carbon footprint information, has been proposed to decrease the network ecological impact while...

  9. Developing security tools of WSN and WBAN networks applications

    CERN Document Server

    A M El-Bendary, Mohsen

    2015-01-01

    This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

  10. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Alexandr M. Kuzminskiy

    2007-10-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  11. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Kuzminskiy Alexandr M

    2007-01-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  12. A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2014-01-01

    Full Text Available This article presents a novel approach to the analysis of wireless sensor networks (WSN security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.

  13. RUMUSAN METODE DETEKSI PENCURIAN LISTRIK MEMANFAATKAN PERANGKAT WSN

    Directory of Open Access Journals (Sweden)

    A Sony

    2017-03-01

    Full Text Available Mendeteksi kasus pencurian listrik di Indonesia memerlukan usaha dan biaya yang besar. PLN saat ini masih menggunakan metode lama dalam mendeteksi kasus pencurian yaitu dengan memeriksa pola tagihan listrik yang didapatkan dari pencatatan secara manual oleh petugas. Penelitian ini mengajukan suatu metode deteksi pencurian listrik dengan memanfaatkan perangkat WSN yang dipasangkan dimeteran pelanggan untuk memonitor jumlah pemakaian listrik. Logika pendeteksian adalah dengan membandingkan data konsumsi pada pelanggan dengan data jumlah listrik yang disalurkan oleh gardu penyalur pada suatu cakupan wilayah. Hasil penelitian berupa simulasi dengan bantuan perangkat lunak Excel, hasil simulasi menunjukkan keefektifan penggunaan metode yang diajukan dengan tingkat akurasi yang tinggi.Detecting theft electricity in Indonesia require enormous amount of efforts and money. PLN until these days still using the old school method to detect this case by checking the pattren of customers electricity bills manualy by the PLN employee. Purposed method in this research is to detect leak of electricity by spreading WSN devices inside each customers meteran to monitor total power consumtion. Logic of the method is compare sum of power consumtion in a testing area with amount of electricity flow in that area by monitor the gardu penyalur conductor. Result of this research is excel simulation, simulation outcome shows that using the purposed to decided system status is effective in the system operational with high accuracy with the actual condition.        

  14. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  15. Mac OS X ja tietoturva

    OpenAIRE

    Herranen, Joni

    2011-01-01

    Tämän opinnäytetyön tavoitteena on luoda kattava kokonaiskuva Mac OS X -käyttöjärjestelmän sisäänrakennetuista tietoturvaratkaisuista ja selvittää miten tietoturvaratkaisut toteuttavat tietoturvan kolmea perustavoitetta eli luottamuksellisuutta, eheyttä ja saatavuutta. Työn kohderyhmäksi on valittu edistyneemmät tietokoneenkäyttäjät, joilla ei ole aikaisempaa Mac-kokemusta. Teoriaosuudessa syvennytään aluksi Apple-yhtiöön sekä Mac OS X -järjestelmän teknisiin ominaisuuksiin. Osuuden pääta...

  16. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  17. Learn Mac OS X Snow Leopard

    CERN Document Server

    Meyers, Scott

    2009-01-01

    You're smart and savvy, but also busy. This comprehensive guide to Apple's Mac OS X 10.6, Snow Leopard, gives you everything you need to know to live a happy, productive Mac life. Learn Mac OS X Snow Leopard will have you up and connected lickity split. With a minimum of overhead and a maximum of useful information, you'll cover a lot of ground in the time it takes other books to get you plugged in. If this isn't your first experience with Mac OS X, skip right to the "What's New in Snow Leopard" sections. You may also find yourself using this book as a quick refresher course or a way

  18. An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks

    OpenAIRE

    Albu, Roxana; Labit, Yann; Thierry, Gayraud; Pascal, Berthou

    2010-01-01

    5p.; International audience; The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol...

  19. Dossier Shell Eco-Marathon; Dossier Shell Eco-Marathon

    Energy Technology Data Exchange (ETDEWEB)

    Matla, P.

    2012-05-15

    Three articles address subjects concerning the annual race with highly energy efficient cars: the Shell Eco-Marathon. [Dutch] In 3 artikelen wordt aandacht besteed aan de ontwerpen voor de jaarlijkse race met superzuinige auto's, de Shell Eco-Marathon.

  20. Java and Mac OS X

    CERN Document Server

    Davis, T Gene

    2010-01-01

    Learn the guidelines of integrating Java with native Mac OS X applications with this Devloper Reference book. Java is used to create nearly every type of application that exists and is one of the most required skills of employers seeking computer programmers. Java code and its libraries can be integrated with Mac OS X features, and this book shows you how to do just that. You'll learn to write Java programs on OS X and you'll even discover how to integrate them with the Cocoa APIs.: Shows how Java programs can be integrated with any Mac OS X feature, such as NSView widgets or screen savers; Re

  1. Generando entornos de investigación y desarrollo utilizando redes inalámbricas de sensores (WSN)

    OpenAIRE

    Sosa, Eduardo Omar; Godoy, Diego Alberto

    2013-01-01

    Las Redes Inalámbricas de Sensores (WSN) jugarán un papel preponderante tanto en las actividades académicas y como en el desarrollo en nuestro país. En este artículo se reportan actividades desarrolladas en dos universidades argentinas, utilizando a la tecnología WSN como disparador de actividades de investigación, desarrollo. La aplicación de ésta tecnología de última generación se enmarcan en el dominio de “Internet de las Cosas” y “Ciudades Inteligentes”. Las actividades teórico-práctic...

  2. EcoBears

    DEFF Research Database (Denmark)

    Nielsen, Nick; Pedersen, Sandra Bleuenn; Sørensen, Jens Ager

    2015-01-01

    In this paper, we introduce the EcoBears concept that aims to augment household appliances with functional and aesthetic features to promote their "use'' and "longevity of use'' to prevent their disposal. The EcoBears also aim to support the communication of environmental issues in the home setting....... We present our initial design and implementation of the EcoBears that consist of two bear modules (a mother and her cub). We also present our preliminary concept validations and lessons learned to be considered for future directions....

  3. Development of high yielding Soybean variety MACS 450 by using Kalitur mutant-MACS 111

    International Nuclear Information System (INIS)

    Raut, V.M.; Taware, S.P.; Halvankar, G.B.; Varghese, Philips

    2000-01-01

    A mutant variety -MACS 111 developed by treating seeds of indigenous black seeded 'Kalitur' variety with gamma irradiation + Ethyleneimine was used in development of high yielding varieties. MACS 450 a promising high yielding variety was selected from Bragg x MACS 111 cross by pedigree selection method. This variety gave the highest average seed yield in station trials (3422 kg/ha), coordinated breeding trials (2361 kg/ha) and varieties cum plant population trial (2215 kg/ha). On the basis of its performance in these trials it was released for commercial cultivation in Southern India. On all India basis, it also recorded the highest seed yield of 4076 kg/ha and 3582 kg/ha in Front line Demonstrations conducted on the farmers' field during 1998 and 1999 respectively. (author)

  4. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  5. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  6. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    Science.gov (United States)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  7. dynamic-threshold-limited timed-token (dtltt) protocol

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous traffic in ... Keywords: multi-access, multiservice, network, synchronous, asynchronous, traffic, timed-token. 1. Introduction .... Messages generated in the system at run time may be classified as ...

  8. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  9. Take control the Mac OS X lexicon

    CERN Document Server

    Zardetto, Sharon

    2009-01-01

    This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, fo

  10. MacA, a periplasmic membrane fusion protein of the macrolide transporter MacAB-TolC, binds lipopolysaccharide core specifically and with high affinity.

    Science.gov (United States)

    Lu, Shuo; Zgurskaya, Helen I

    2013-11-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.

  11. Developing an eco-routing application.

    Science.gov (United States)

    2014-01-01

    The study develops eco-routing algorithms and investigates and quantifies the system-wide impacts of implementing an eco-routing system. Two eco-routing algorithms are developed: one based on vehicle sub-populations (ECO-Subpopulation Feedback Assign...

  12. Evaluation of svr: a wireless sensor network routing protocol

    International Nuclear Information System (INIS)

    Baloch, J.; Khanzada, T.J.S.

    2014-01-01

    The advancement in technology has made it possible to create small in size, low cost sensor nodes. However, the small size and low cost of such nodes comesat at price that is, reduced processing power, low memory and significantly small battery energy storage. WSNs (Wireless Sensor Networks) are inherently ad hoc in nature and are assumed to work in the toughest terrain. The network lifetime plays a pivotal role in a wireless sensor network. A long network lifetime, could be achieved by either making significant changes in these low cost devices, which is not a feasible solution or by improving the means of communication throughout the network. The communication in such networks could be improved by employing energy efficient routing protocols, to route the data throughout the network. In this paper the SVR (Spatial Vector Routing) protocol is compared against the most common WSN routing protocols, and from the results it could be inferred that the SVR protocol out performs its counterparts. The protocol provides an energy efficient means of communication in the network. (author)

  13. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2011-01-01

    Tips and techniques for forward-thinking MacBook Pro users Now that you have a MacBook Pro, you need just one more accessory, your very own copy of MacBook Pro Portable Genius, Third Edition. This handy, compact book lets you in on a wealth of tips and tricks, so you get the very most out of Apple's very popular notebook. Discover the latest on the most recent release of iLife, get the skinny on the new Intel Core i7 and i5 processors in the Pro, see how to go wireless in a smart way, and much more. The book is easy to navigate, doesn't skimp on the essentials, and helps you save time and avoi

  14. MacSelfService online tutorial

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Mac Self-Service is a functionality within the Mac Desktop Service built and maintained to empower CERN users by giving them easy access to applications and configurations through the Self-Service application. This tutorial (text attached to the event page) explains how to install Mac Self-Service and how to use it to install applications and printers. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  15. MAC reduction of isoflurane by sufentanil.

    Science.gov (United States)

    Brunner, M D; Braithwaite, P; Jhaveri, R; McEwan, A I; Goodman, D K; Smith, L R; Glass, P S

    1994-01-01

    We have shown previously that a plasma fentanyl concentration of 1.67 ng ml-1 reduced the MAC of isoflurane by 50%. By comparing equal degrees of MAC reduction by sufentanil, we may determine the potency ratio of these opioids. Seventy-six patients were allocated randomly to receive predetermined infusions of sufentanil, and end-tidal concentrations of isoflurane in oxygen. Blood samples were obtained 10 min after the start of the infusion, and just before and after skin incision. Any purposeful movement by the patient was recorded. The MAC reduction of isoflurane produced by sufentanil was obtained using a logistic regression model. A sufentanil plasma concentration of 0.145 ng ml-1 (95% confidence limits 0.04, 0.26 ng ml-1) resulted in a 50% reduction in the MAC of isoflurane. At a plasma concentration greater than 0.5 ng ml-1, sufentanil exhibited a ceiling effect.

  16. Low-power low-latency MAC protocol for aeronautical applications

    Science.gov (United States)

    Sabater, Jordi; Kluge, Martin; Bovelli, Sergio; Schalk, Josef

    2007-05-01

    This paper describes asynchronous MAC (Medium Access Control) strategies based on the IEEE 802.15.4 physical layer for wireless aeronautical applications where low power and low latency are important requirements as well as security and data integrity. Sensor data is acquired and collected on request, by means of a mobile device, and later stored in a centralized database. In order to have the smallest power consumption the wireless sensor has to remain in deep sleep mode as long as possible and wake up and listen periodically for RF activity. If its unique ID is mentioned in the destination address field, the complete frame is received, processed and replied if necessary. If the detected packet is addressed to another sensor the reception will stop immediately and the wireless sensor will go into deep sleep mode again. Listening instead of sending actively does not 'pollute' the already crowded 2.45GHz spectrum, reduces collisions and increases security. The mobile data concentrator can not be synchronized with all the sensors installed in a distributed environment, therefore smart asynchronous data transmission strategies are needed to reduce latencies and increase throughput. For the considered application, sensors are independent of each other, simply share the medium and together with the data concentrator are organized in a star network topology. The centre of the star is the concentrator which is rarely in range. It coordinates and activates the wireless sensor nodes to collect the measured data.

  17. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  18. Asymptotic performance modelling of DCF protocol with prioritized channel access

    Science.gov (United States)

    Choi, Woo-Yong

    2017-11-01

    Recently, the modification of the DCF (Distributed Coordination Function) protocol by the prioritized channel access was proposed to resolve the problem that the DCF performance worsens exponentially as more nodes exist in IEEE 802.11 wireless LANs. In this paper, an asymptotic analytical performance model is presented to analyze the MAC performance of the DCF protocol with the prioritized channel access.

  19. Modelling Of Eco-innovation Diffusion: The EU Eco-label

    Directory of Open Access Journals (Sweden)

    KIJEK TOMASZ

    2015-03-01

    Full Text Available The aim of this article is to carry out a theoretical and empirical analysis of the process of eco-label diffusion. Eco-labels allow consumers to identify products and services that have a reduced environmental impact during their life cycle. Thus, they are aimed at diminishing the information gap between sellers and buyers. The results of the estimation using the Bass model indicate that the diffusion of the EU eco-label has been most dynamic in countries such as Hungary, Poland, Denmark, Germany and France. In turn, the scope of diffusion (absolute saturation level reached the highest value for companies in France and Italy. In addition, the results of the study confirm the stimulating impact of the scope of eco-label diffusion on consumer awareness of environmental issues. This finding points to the need for environmental education among consumers, which could in turn encourage firms to undertake pro-environmental actions.

  20. EcoGene 3.0.

    Science.gov (United States)

    Zhou, Jindan; Rudd, Kenneth E

    2013-01-01

    EcoGene (http://ecogene.org) is a database and website devoted to continuously improving the structural and functional annotation of Escherichia coli K-12, one of the most well understood model organisms, represented by the MG1655(Seq) genome sequence and annotations. Major improvements to EcoGene in the past decade include (i) graphic presentations of genome map features; (ii) ability to design Boolean queries and Venn diagrams from EcoArray, EcoTopics or user-provided GeneSets; (iii) the genome-wide clone and deletion primer design tool, PrimerPairs; (iv) sequence searches using a customized EcoBLAST; (v) a Cross Reference table of synonymous gene and protein identifiers; (vi) proteome-wide indexing with GO terms; (vii) EcoTools access to >2000 complete bacterial genomes in EcoGene-RefSeq; (viii) establishment of a MySql relational database; and (ix) use of web content management systems. The biomedical literature is surveyed daily to provide citation and gene function updates. As of September 2012, the review of 37 397 abstracts and articles led to creation of 98 425 PubMed-Gene links and 5415 PubMed-Topic links. Annotation updates to Genbank U00096 are transmitted from EcoGene to NCBI. Experimental verifications include confirmation of a CTG start codon, pseudogene restoration and quality assurance of the Keio strain collection.

  1. EcoGene 3.0

    Science.gov (United States)

    Zhou, Jindan; Rudd, Kenneth E.

    2013-01-01

    EcoGene (http://ecogene.org) is a database and website devoted to continuously improving the structural and functional annotation of Escherichia coli K-12, one of the most well understood model organisms, represented by the MG1655(Seq) genome sequence and annotations. Major improvements to EcoGene in the past decade include (i) graphic presentations of genome map features; (ii) ability to design Boolean queries and Venn diagrams from EcoArray, EcoTopics or user-provided GeneSets; (iii) the genome-wide clone and deletion primer design tool, PrimerPairs; (iv) sequence searches using a customized EcoBLAST; (v) a Cross Reference table of synonymous gene and protein identifiers; (vi) proteome-wide indexing with GO terms; (vii) EcoTools access to >2000 complete bacterial genomes in EcoGene-RefSeq; (viii) establishment of a MySql relational database; and (ix) use of web content management systems. The biomedical literature is surveyed daily to provide citation and gene function updates. As of September 2012, the review of 37 397 abstracts and articles led to creation of 98 425 PubMed-Gene links and 5415 PubMed-Topic links. Annotation updates to Genbank U00096 are transmitted from EcoGene to NCBI. Experimental verifications include confirmation of a CTG start codon, pseudogene restoration and quality assurance of the Keio strain collection. PMID:23197660

  2. 'Eco' For Whom? Envisioning Eco-urbanism in the Sino-Singapore Tianjin Eco-city, China

    OpenAIRE

    Caprotti, Federico; Springer, Cecilia; Harmer, Nichola

    2015-01-01

    Eco-cities have attracted international attention from governments, corporations, academics and other actors seeking to use sustainable urban planning to reduce urban environmental impacts. China has devoted significant political will and economic resources to the development of new-build eco-city projects, reflecting the Chinese government's goals to build a 'harmonious society' in which environmental sustainability and social stability are mutually reinforcing. We critically analyse the cas...

  3. Photocatalytic degradation of C. I. Reactive Red 24 solution with K₆SiW₁₁O₃₉Sn(II.).

    Science.gov (United States)

    Guo, Guixiang; Zhu, Xiuhua; Shi, Fuyou; Wang, Anning; Wang, Wei; Mu, Jun; Wan, Quanli; Zhang, Rong

    2013-12-01

    Environmental friendly materials, K6SiW11O39Sn (SiWSn), was synthesized. SiWSn photocatalytic decomposition of C. I. Reactive Red 24 (RR24) with the UV-lamp (253.7 nm, 20 W), Xenon lamp filtered less than 390 nm light (500 W) and sun light was investigated. The results showed that RR24 solution could be effectively decolorized with the SiWSn photocatalyst. The photocatalytic degradation efficiency of RR24 with SiWSn was affected by the initial concentration of RR2 solution, the amount of SiWSn and the photolysis time. It is demonstrated that the process of photodegradation of RR24 with SiWSn is a pesudo first-order reaction, which can be described by Langmuir-Hinshelwood equation. Hydroxyl radicals and holes are both the main oxidants in the photocatalytic reaction of RR24 with SiWSn. Copyright © 2013 The Research Centre for Eco-Environmental Sciences, Chinese Academy of Sciences. Published by Elsevier B.V. All rights reserved.

  4. Office 2008 for Mac for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Office 2008 for Mac is here, with great new enhancements to all your favorite office productivity tools. Who better than "Dr. Mac, "Bob LeVitus, to show you how to load and use them all? From choosing the best version for your needs to managing your life with your online calendar, Office 2008 For Mac For Dummies covers what you need to know. It compares the Student/Teacher Edition, Standard Edition, and Professional Edition, then walks you through installing your preferred version and keeping it up to date. You'll find out all the things you can do with Word, Excel, PowerPoint, and Entourage,

  5. [Review on enterprises'eco-innovation].

    Science.gov (United States)

    Liao, Zhong Ju; Huang, Chao

    2017-12-01

    Eco-innovation is an important way to realize sustainable development. It has the dual positive externality of "knowledge spillover" and "environmental spillover", which has attracted much attention from theory and practice. In order to systematically grasp the current situation of eco-innovation, this study collected the relevant foreign literatures on eco-innovation in the past ten years, and made a systematic review of the definition, characteristics and dimensions of eco-innovation. Focusing on the theory of institutional theory, stakeholder theory and resource-based view, this paper explored the antecedents of eco-innovation. Then, this paper also demonstrated the positive and negative effects of eco-innovation on corporate financial performance, and the meditating and moderating mechanisms between eco-innovation and financial performance. Finally, based on the limitations of existing research, the future research direction was put forward.

  6. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  7. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  8. Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks

    Science.gov (United States)

    Song, Yurong; Jiang, Guo-Ping

    Based on the inherent characteristics of wireless sensor networks (WSN), the dynamic behavior of malware propagation in flat WSN is analyzed and investigated. A new model is proposed using 2-D cellular automata (CA), which extends the traditional definition of CA and establishes whole transition rules for malware propagation in WSN. Meanwhile, the validations of the model are proved through theoretical analysis and simulations. The theoretical analysis yields closed-form expressions which show good agreement with the simulation results of the proposed model. It is shown that the malware propaga-tion in WSN unfolds neighborhood saturation, which dominates the effects of increasing infectivity and limits the spread of the malware. MAC mechanism of wireless sensor networks greatly slows down the speed of malware propagation and reduces the risk of large-scale malware prevalence in these networks. The proposed model can describe accurately the dynamic behavior of malware propagation over WSN, which can be applied in developing robust and efficient defense system on WSN.

  9. Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  10. Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

    Directory of Open Access Journals (Sweden)

    Pieter Robyns

    2017-01-01

    Full Text Available We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11 enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construct a fingerprint of the transmitter that is 80.0 to 67.6 percent unique for 50 to 100 observed devices and 33.0 to 15.1 percent unique for 1,000 to 10,000 observed devices. We show how existing mitigation strategies such as MAC address randomization can be circumvented using only this fingerprint and temporal information. Our second technique leverages peer-to-peer 802.11u Generic Advertisement Service (GAS requests and 802.11e Block Acknowledgement (BA requests to instigate transmissions on demand from devices that support these protocols. We validate these techniques using two datasets, one of which was recorded at a music festival containing 28,048 unique devices and the other at our research lab containing 138 unique devices. Finally, we discuss a number of countermeasures that can be put in place by mobile device vendors in order to prevent noncooperative tracking through the discussed techniques.

  11. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  12. A Mobile Automated Characterization System (MACS) for indoor floor characterization

    International Nuclear Information System (INIS)

    Richardson, B.S.; Haley, D.C.; Dudar, A.M.; Ward, C.R.

    1995-01-01

    The Savannah River Technology Center (SRTC) and Oak Ridge National Laboratory are developing an advanced Mobile Automated Characterization System (MACS) to characterize indoor contaminated floors. MACS is based upon Semi-Intelligent Mobile Observing Navigator (SIMON), an earlier floor characterization system developed at SRTC. MACS will feature enhanced navigation systems, operator interface, and an interface to simplify integration of additional sensors. The enhanced navigation system will provide the capability to survey large open areas much more accurately than is now possible with SIMON, which is better suited for hallways and corridors that provide the means for recalibrating position and heading. MACS operator interface is designed to facilitate MACS's use as a tool for health physicists, thus eliminating the need for additional training in the robot's control language. Initial implementation of MACS will use radiation detectors. Additional sensors, such as PCB sensors currently being developed, will be integrated on MACS in the future. Initial use of MACS will be focused toward obtaining comparative results with manual methods. Surveys will be conducted both manually and with MACS to compare relative costs and data quality. While clear cost benefits anticipated, data quality benefits should be even more significant

  13. Hydrocyanation of sulfonylimines using potassium hexacyanoferrate(II) as an eco-friendly cyanide source

    International Nuclear Information System (INIS)

    Li, Zheng; Li, Rongzhi; Zheng, Huanhuan; Wen, Fei; Li, Hongbo; Yin, Junjun; Yang, Jingya

    2013-01-01

    An efficient and eco-friendly method for hydrocyanation of sulfonylimines via one-pot two-step procedure using potassium hexacyanoferrate)II) as cyanide source, benzoyl chloride as a promoter, and potassium carbonate as a base is described. This protocol has the features of using nontoxic, nonvolatile and inexpensive cyanide source, high yield, and simple work-up procedure. (author)

  14. Hydrocyanation of sulfonylimines using potassium hexacyanoferrate(II) as an eco-friendly cyanide source

    Energy Technology Data Exchange (ETDEWEB)

    Li, Zheng; Li, Rongzhi; Zheng, Huanhuan; Wen, Fei; Li, Hongbo; Yin, Junjun; Yang, Jingya, E-mail: lizheng@nwnu.edu.cn [Key Laboratory of Eco-Environment-Related Polymer Materials for Ministry of Education, College of Chemistry and Chemical Engineering, Northwest Normal University, Gansu (China)

    2013-11-15

    An efficient and eco-friendly method for hydrocyanation of sulfonylimines via one-pot two-step procedure using potassium hexacyanoferrate)II) as cyanide source, benzoyl chloride as a promoter, and potassium carbonate as a base is described. This protocol has the features of using nontoxic, nonvolatile and inexpensive cyanide source, high yield, and simple work-up procedure. (author)

  15. Establishment of an eco-compensation fund based on eco-services consumption.

    Science.gov (United States)

    Liu, Moucheng; Yang, Lun; Min, Qingwen

    2018-04-01

    Eco-compensation is a type of institutional arrangement that uses economic measures to adjust the relationships among stakeholders in order to conserve and/or sustainably use ecosystem services. The externality of the value of ecosystem services is one of the theoretical bases for eco-compensation. Different types of ecosystem services are consumed by people from different regions. Some are consumed by people living where the services originate, while some are carried by rivers, wind, vehicles or other natural or manmade means to other areas. Thus, the flow and consumption of ecosystem services should be seen as the basis for establishing eco-compensation funds. This paper uses satellite images of the Zhang-Cheng area near Beijing in 2013 to discuss how to establish an eco-compensation fund for stakeholders in this area. Firstly, six important types of ecosystem services in the Zhang-Cheng area were identified based on ecological function zoning, and the value of these ecosystem services was calculated based on ecological pricing methods. Secondly, the field intensity model from physics was used to analyze where Zhang-Cheng area ecosystem services flowed and calculate how much of these services were used by other areas. Thirdly, based on this analysis and calculation, the paper proposes the rates that different stakeholders should invest in the eco-compensation fund, based on their consumption of eco-services. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Mac OS X for Unix Geeks (Leopard)

    CERN Document Server

    Rothman, Ernest E; Rosen, Rich

    2009-01-01

    If you've been lured to Mac OS X because of its Unix roots, this invaluable book serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. The new edition offers a complete tour of Mac OS X's Unix shell for Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities. Learn how to compile code, link to libraries, and port Unix software to Mac OS X and much more with this concise guide.

  17. Functional Implications of an Intermeshing Cogwheel-like Interaction between TolC and MacA in the Action of Macrolide-specific Efflux Pump MacAB-TolC*

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-01-01

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274

  18. Functional implications of an intermeshing cogwheel-like interaction between TolC and MacA in the action of macrolide-specific efflux pump MacAB-TolC.

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-04-15

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.

  19. Mac OS X Snow Leopard Server For Dummies

    CERN Document Server

    Rizzo, John

    2009-01-01

    Making Everything Easier!. Mac OS® X Snow Leopard Server for Dummies. Learn to::;. Set up and configure a Mac network with Snow Leopard Server;. Administer, secure, and troubleshoot the network;. Incorporate a Mac subnet into a Windows Active Directory® domain;. Take advantage of Unix® power and security. John Rizzo. Want to set up and administer a network even if you don't have an IT department? Read on!. Like everything Mac, Snow Leopard Server was designed to be easy to set up and use. Still, there are so many options and features that this book will save you heaps of time and effort. It wa

  20. iMac G3 Blueberry 350MHz

    CERN Multimedia

    2000-01-01

    The iMac G3 is an all-in-one personal computer, encompassing both the monitor and the computer in one package. It allowed to revitalize the Apple brand that was in decline and close to financial ruin. Originally released in striking bondi blue and later a range of other translucent plastic envelopes in bright colors. The iMac comes with a keyboard and mouse matching the color of the case. The iMac G3 was sold from 1998 to 2003 and has been updated many times.

  1. Una lectura interpretativa de Tras la virtud, de Alasdair MacIntyre - An Interpretive Reading of After Virtue, by Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Fernando Fernández-Llebrez

    2010-12-01

    Full Text Available This article centers on the thought of Alasdair MacIntyre, whose most prominente work, After Virtue, is considered a classic of political science. In contrast with other reviews, this article will examine After Virtue within the broader context of MacIntyre’s thinking and publications. An overview of MacIntyre’s literary corpus and the evolution of his thinking will shed light on the volume examined and trace certain ideas that are characteristic of this Scottish political philosopher. Matters that remained unsettled in After Virtue have become over time more defined in MacIntyre’s thinking, such as the influence exerted upon him by Thomas Aquinas.

  2. Refrigerated Fruit Storage Monitoring Combining Two Different Wireless Sensing Technologies: RFID and WSN

    Directory of Open Access Journals (Sweden)

    Ricardo Badia-Melis

    2015-02-01

    Full Text Available Every day, millions of tons of temperature-sensitive goods are produced, transported, stored or distributed worldwide, thus making their temperature and humidity control essential. Quality control and monitoring of goods during the cold chain is an increasing concern for producers, suppliers, logistic decision makers and consumers. In this paper we present the results of a combination of RFID and WSN devices in a set of studies performed in three commercial wholesale chambers of 1848 m3 with different set points and products. Up to 90 semi-passive RFID temperature loggers were installed simultaneously together with seven motes, during one week in each chamber. 3D temperature mapping charts were obtained and also the psychrometric data model from ASABE was implemented for the calculation of enthalpy changes and the absolute water content of air. Thus thank to the feedback of data, between RFID and WSN it is possible to estimate energy consumption in the cold room, water loss from the products and detect any condensation over the stored commodities.

  3. George MacDonald's Estimate of Childhood

    Science.gov (United States)

    Pridmore, John

    2007-01-01

    The nineteenth-century fantasy writer George MacDonald believed that "it is better to be a child in a green field than a knight of many orders." In this paper, I shall explore the bearing of this high estimate of childhood on spiritual education. MacDonald explores the spirituality of the child in his essay "A Sketch of Individual Development" and…

  4. Mac OS X : Tiger edition the missing manual

    CERN Document Server

    Pogue, David

    2005-01-01

    You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? Th

  5. Increased NMDA receptor inhibition at an increased Sevoflurane MAC

    Directory of Open Access Journals (Sweden)

    Brosnan Robert J

    2012-06-01

    Full Text Available Abstract Background Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Methods Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL plus 0.4 mg/mL dizocilpine (MK-801 was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Results Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P  Conclusions Glycine receptor antagonism increases NMDA receptor antagonism by sevoflurane at MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  6. MACS as a tool for international inspections

    Energy Technology Data Exchange (ETDEWEB)

    Curtiss, J.A.; Indusi, J.P.

    1995-08-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

  7. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites

  8. Learn Office 2011 for Mac OS X

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Office for Mac remains the leading productivity suite for Mac, with Apple's iWork and the free OpenOffice.org trailing far behind. And now it's being updated with a cleaner interface and more compatibility with Exchange and SharePoint. Learn Office 2011 for Mac OS X offers a practical, hands-on approach to using Office 2011 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts,

  9. The Study of Critical Eco-Linguistic in Green Discourse: Prospective Eco-Linguistic Analysis

    Directory of Open Access Journals (Sweden)

    Tommi Yuniawan

    2017-10-01

    Full Text Available Eco-linguistic studies are influenced by one of the other interdisciplinary sciences, namely critical discourse analysis. The combination of these two sciences is called critical eco-linguistic studies. Critical eco-linguistic examines the discourse about the environment and various forms of discourse and their ideology which concerns people and the environment. The environmental discourse with all its manifestations (oral text, written text is called green discourse. To that end, critical eco-linguistic dictates the linguistic aspects contained in the green discourse. Utilization of lingual units in green discourse will affect the sense and logic of people involved in the discourse, ie the writers and readers or the speakers and the speakers. What is recorded in their cognition, will affect their attitudes and actions to the environment. If green discourse is constructive, then their attitude and actions to the environment are constructive. Conversely, if green discourse is more destructive and exploitative, then their attitudes and actions towards the environment will also be affected towards destruction and exploitation. For this reason, critical eco-linguistic studies in green discourse deserve to be given space as a form of prospective eco-linguistic analysis.

  10. The deployment of carbon monoxide wireless sensor network (CO-WSN) for ambient air monitoring.

    Science.gov (United States)

    Chaiwatpongsakorn, Chaichana; Lu, Mingming; Keener, Tim C; Khang, Soon-Jai

    2014-06-16

    Wireless sensor networks are becoming increasingly important as an alternative solution for environment monitoring because they can reduce cost and complexity. Also, they can improve reliability and data availability in places where traditional monitoring methods are difficult to site. In this study, a carbon monoxide wireless sensor network (CO-WSN) was developed to measure carbon monoxide concentrations at a major traffic intersection near the University of Cincinnati main campus. The system has been deployed over two weeks during Fall 2010, and Summer 2011-2012, traffic data was also recorded by using a manual traffic counter and a video camcorder to characterize vehicles at the intersection 24 h, particularly, during the morning and evening peak hour periods. According to the field test results, the 1 hr-average CO concentrations were found to range from 0.1-1.0 ppm which is lower than the National Ambient Air Quality Standards (NAAQS) 35 ppm on a one-hour averaging period. During rush hour periods, the traffic volume at the intersection varied from 2,067 to 3,076 vehicles per hour with 97% being passenger vehicles. Furthermore, the traffic volume based on a 1-h average showed good correlation (R2 = 0.87) with the 1-h average CO-WSN concentrations for morning and evening peak time periods whereas CO-WSN results provided a moderate correlation (R2 = 0.42) with 24 hours traffic volume due to fluctuated changes of meteorological conditions. It is concluded that the performance and the reliability of wireless ambient air monitoring networks can be used as an alternative method for real time air monitoring.

  11. Processo de adaptação da bateria Montreal de avaliação da comunicação: bateria MAC - ao português brasileiro Adaptation process to Brazilian Portuguese of the Montreal communication evaluation battery: MAC battery

    Directory of Open Access Journals (Sweden)

    Rochele Paz Fonseca

    2007-01-01

    Full Text Available O presente estudo tem por objetivo apresentar a adaptação do "Protocole Montréal d'Évaluation de la Communication - Protocole MEC" (Bateria Montreal de Avaliação da Comunicação - Bateria MAC ao Português Brasileiro. Esta bateria canadense foi construída para avaliar quatro processamentos comunicativos de ativação do hemisfério direito: discursivo, pragmático-inferencial, léxico-semântico e prosódico. Participaram do estudo seis tradutores, três juízes especialistas, 54 juízes não-especialistas e 16 participantes dos estudos piloto. Os procedimentos gerais promovidos foram tradução, análise de critérios psicolingüísticos por juízes e aplicação do instrumento em estudos piloto. As tarefas Interpretação de metáforas, Discurso narrativo e Julgamento semântico exigiram um processo de adaptação mais complexo e rigoroso. Com base em critérios psicolingüísticos, realizaram-se algumas mudanças nos estímulos, com a finalidade principal de manutenção do objetivo de cada tarefa do instrumento original. Este instrumento neuropsicológico pode ser uma ferramenta de avaliação da comunicação de indivíduos com lesão de hemisfério direito, lesão frontal, traumatismo crânio-encefálico e demência.This research aims to present the adaptation of the "Protocole Montréal d'Évaluation de la Communication - Protocole MEC" (Montreal Communication Evaluation Battery - MAC Battery to Brazilian Portuguese, in accordance with psycholinguistics criteria. MAC Battery is a Canadian instrument constructed to evaluate right hemisphere communicative and linguistic abilities, considering four processing domains: discoursive, pragmatic-inferential, lexical-semantic and prosodic. The participants were six translators, three specialist judges, 54 non-specialist judges and 16 subjects from pilot studies. Adaptation procedures included translation, judge analysis of psycholinguistics criteria and two pilot tests. Some tasks required

  12. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  13. A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast

    Institute of Scientific and Technical Information of China (English)

    ZHAO Anjun; LU Xiangli; GUO Lei

    2006-01-01

    A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA(timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

  14. Victor Bérard et la Macédoine

    Directory of Open Access Journals (Sweden)

    Ivan Savev

    2011-01-01

    Full Text Available Un helléniste convaincu, Victor Bérard, en vient, au début du XXe siècle à soutenir l’existence de « Macédoniens » et le slogan « la Macédoine aux Macédoniens”.Le Congrès de Berlin en 1878 avait laissé la Macédoine aux mains des Ottomans. La Grèce, la Serbie et la Bulgarie, parvenues à ses limites et prévoyant le retrait futur des Ottomans peaufinent les arguments linguistiques et historiques qui justifieront leurs revendications territoriales. Victor Bérard, un helléniste respecté et bon connaisseur de la région sud balkanique, effectue des enquêtes en Macédoine en 1896 et 1903 qu’il publie à Paris.Cette étude montre comment, dans le contexte de la propagande nationaliste des prétendants à la possession de la Macédoine, Victor Bérard en vient progressivement à affirmer qu’il existe une population autochtone, les Macédoniens. Il soutient leur programme pour la constitution d’une fédération ou confédération avec le slogan « la Macédoine aux Macédoniens » ce qui fait toute l’actualité de ses ouvrages.In 1878, the Congress of Berlin had left Macedonia in the hands of the Ottomans. Greece, Serbia and Bulgaria had reached its limits. Anticipating the Ottoman retreat, they polish language and historical arguments that will justify their territorial claims. Victor Bérard, a respected Hellenist and a good expert of the southern Balkans, is doing researches in Macedonia in 1896 and 1903. These will be later published in Paris.This study shows how, in the context of the nationalist propaganda build-up made by the candidates for the possession of Macedonia, Victor Bérard comes progressively to assert the existence of a native population: the Macedonians. He supports their program for the forming of a federation or confederation which slogan would be “Macedonia to Macedonians”. This makes his works very topical.

  15. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  16. EcoCount

    Directory of Open Access Journals (Sweden)

    Phillip P. Allen

    2014-05-01

    Full Text Available Techniques that analyze biological remains from sediment sequences for environmental reconstructions are well established and widely used. Yet, identifying, counting, and recording biological evidence such as pollen grains remain a highly skilled, demanding, and time-consuming task. Standard procedure requires the classification and recording of between 300 and 500 pollen grains from each representative sample. Recording the data from a pollen count requires significant effort and focused resources from the palynologist. However, when an adaptation to the recording procedure is utilized, efficiency and time economy improve. We describe EcoCount, which represents a development in environmental data recording procedure. EcoCount is a voice activated fully customizable digital count sheet that allows the investigator to continuously interact with a field of view during the data recording. Continuous viewing allows the palynologist the opportunity to remain engaged with the essential task, identification, for longer, making pollen counting more efficient and economical. EcoCount is a versatile software package that can be used to record a variety of environmental evidence and can be installed onto different computer platforms, making the adoption by users and laboratories simple and inexpensive. The user-friendly format of EcoCount allows any novice to be competent and functional in a very short time.

  17. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    Directory of Open Access Journals (Sweden)

    Christos Verikoukis

    2011-01-01

    Full Text Available The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs. The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions. In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs, which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead.

  18. The Role of Interaction Patterns with Hybrid Electric Vehicle Eco-Features for Drivers' Eco-Driving Performance.

    Science.gov (United States)

    Arend, Matthias G; Franke, Thomas

    2017-03-01

    The objective of the present research was to understand drivers' interaction patterns with hybrid electric vehicles' (HEV) eco-features (electric propulsion, regenerative braking, neutral mode) and their relationship to fuel efficiency and driver characteristics (technical system knowledge, eco-driving motivation). Eco-driving (driving behaviors performed to achieve higher fuel efficiency) has the potential to reduce CO 2 emissions caused by road vehicles. Eco-driving in HEVs is particularly challenging due to the systems' dynamic energy flows. As a result, drivers are likely to show diverse eco-driving behaviors, depending on factors like knowledge and motivation. The eco-features represent an interface for the control of the systems' energy flows. A sample of 121 HEV drivers who had constantly logged their fuel consumption prior to the study participated in an online questionnaire. Drivers' interaction patterns with the eco-features were related to fuel efficiency. A common factor was identified in an exploratory factor analysis, characterizing the intensity of actively dealing with electric energy, which was also related to fuel efficiency. Driver characteristics were not related to this factor, yet they were significant predictors of fuel efficiency. From the perspective of user-energy interaction, the relationship of the aggregated factor to fuel efficiency emphasizes the central role of drivers' perception of and interaction with energy conversions in determining HEV eco-driving success. To arrive at an in-depth understanding of drivers' eco-driving behaviors that can guide interface design, authors of future research should be concerned with the psychological processes that underlie drivers' interaction patterns with eco-features.

  19. Eco-feedback for non-consumption

    NARCIS (Netherlands)

    Lim, V.; Jense, A.; Janmaat, J.; Funk, M.

    2014-01-01

    Eco-feedback is a strategy to increase awareness of resource use and to encourage conservation. We applied eco-feedback on household food waste with the prospective to increase awareness and explore its impact on food related decision-making. In this paper we present a prototype of an eco-feedback

  20. Eco-friendly Development Of Industry

    International Nuclear Information System (INIS)

    An, Gi Cheol; Park, Hun; Lee, Dong Jin; Ryu, Sang Hui

    1998-02-01

    This book reports eco-friendly development of industry, which has summary on bring up the issue and research way and system of research. It deals with current state of affairs on eco-friendly development of industry and the case of developed countries such as necessity and meaning of eco-friendly development industry, prospect and change of the tendency, environmental issue by field in Korea like the steel industry, nonferrous metal industry, auto industry, and cement industry and general policy for eco-friendly development of industry.

  1. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  2. Accuracy of the MacArthur competence assessment tool for clinical research (MacCAT-CR) for measuring children's competence to consent to clinical research.

    Science.gov (United States)

    Hein, Irma M; Troost, Pieter W; Lindeboom, Robert; Benninga, Marc A; Zwaan, C Michel; van Goudoever, Johannes B; Lindauer, Ramón J L

    2014-12-01

    An objective assessment of children's competence to consent to research participation is currently not possible. Age limits for asking children's consent vary considerably between countries, and, to our knowledge, the correlation between competence and children's age has never been systematically investigated. To test a standardized competence assessment instrument for children by modifying the MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR), to investigate its reliability and validity, and to examine the correlation of its assessment with age and estimate cutoff ages. This prospective study included children and adolescents aged 6 to 18 years in the inpatient and outpatient departments of allergology, gastroenterology, oncology, ophthalmology, and pulmonology from January 1, 2012, through January 1, 2014. Participants were eligible for clinical research studies, including observational studies and randomized clinical trials. Competence judgments by experts aware of the 4 relevant criteria-understanding, appreciation, reasoning, and choice-were used to establish the reference standard. The index test was the MacCAT-CR, which used a semistructured interview format. Interrater reliability, validity, and dimensionality of the MacCAT-CR and estimated cutoff ages for competence. Of 209 eligible patients, we included 161 (mean age, 10.6 years; 47.2% male). Good reproducibility of MacCAT-CR total and subscale scores was observed (intraclass correlation coefficient range, 0.68-0.92). We confirmed unidimensionality of the MacCAT-CR. By the reference standard, we judged 54 children (33.5%) to be incompetent; by the MacCAT-CR, 61 children (37.9%). Criterion-related validity of MacCAT-CR scores was supported by high overall accuracy in correctly classifying children as competent against the reference standard (area under the receiver operating characteristics curve, 0.78). Age was a good predictor of competence on the MacCAT-CR (area under the receiver

  3. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  4. Library Signage: Applications for the Apple Macintosh and MacPaint.

    Science.gov (United States)

    Diskin, Jill A.; FitzGerald, Patricia

    1984-01-01

    Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…

  5. ECO-DRIVING MODELING ENVIRONMENT

    Science.gov (United States)

    2015-11-01

    This research project aims to examine the eco-driving modeling capabilities of different traffic modeling tools available and to develop a driver-simulator-based eco-driving modeling tool to evaluate driver behavior and to reliably estimate or measur...

  6. From “eco-pessimism” to “eco-optimism” ECOMOG And The West ...

    African Journals Online (AJOL)

    From “eco-pessimism” to “eco-optimism” ECOMOG And The West African Integration Process. Emmanuel Kwesi Aning. Abstract. No Abstract African Journal of Political Science Vol.4(1) 1999: 21-39. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  7. Wi-GIM system: a new wireless sensor network (WSN) for accurate ground instability monitoring

    Science.gov (United States)

    Mucchi, Lorenzo; Trippi, Federico; Schina, Rosa; Fornaciai, Alessandro; Gigli, Giovanni; Nannipieri, Luca; Favalli, Massimiliano; Marturia Alavedra, Jordi; Intrieri, Emanuele; Agostini, Andrea; Carnevale, Ennio; Bertolini, Giovanni; Pizziolo, Marco; Casagli, Nicola

    2016-04-01

    Landslides are among the most serious and common geologic hazards around the world. Their impact on human life is expected to increase in the next future as a consequence of human-induced climate change as well as the population growth in proximity of unstable slopes. Therefore, developing better performing technologies for monitoring landslides and providing local authorities with new instruments able to help them in the decision making process, is becoming more and more important. The recent progresses in Information and Communication Technologies (ICT) allow us to extend the use of wireless technologies in landslide monitoring. In particular, the developments in electronics components have permitted to lower the price of the sensors and, at the same time, to actuate more efficient wireless communications. In this work we present a new wireless sensor network (WSN) system, designed and developed for landslide monitoring in the framework of EU Wireless Sensor Network for Ground Instability Monitoring - Wi-GIM project (LIFE12 ENV/IT/001033). We show the preliminary performance of the Wi-GIM system after the first period of monitoring on the active Roncovetro Landslide and on a large subsiding area in the neighbourhood of Sallent village. The Roncovetro landslide is located in the province of Reggio Emilia (Italy) and moved an inferred volume of about 3 million cubic meters. Sallent village is located at the centre of the Catalan evaporitic basin in Spain. The Wi-GIM WSN monitoring system consists of three levels: 1) Master/Gateway level coordinates the WSN and performs data aggregation and local storage; 2) Master/Server level takes care of acquiring and storing data on a remote server; 3) Nodes level that is based on a mesh of peripheral nodes, each consisting in a sensor board equipped with sensors and wireless module. The nodes are located in the landslide ground perimeter and are able to create an ad-hoc WSN. The location of each sensor on the ground is

  8. Does Nationality Matter in Eco-Behaviour?

    Directory of Open Access Journals (Sweden)

    Michelle Bonera

    2017-09-01

    Full Text Available Although many authors agree on the role of personal values in explaining the main determinants of eco-behaviour, disagreement about the effects of socio-demographic features exists, particularly about the effect of nationality. In an attempt to fill this gap in the literature, this paper contributes to the debate surrounding the main determinants of eco-behaviour, based on a cross-country analysis. To test the role of nationality and personal values in eco-behaviour, a linear regression model involving 353 Chinese and 333 Italian subjects was performed. A stepwise analysis was then conducted to identify the main significant effects. The explorative and stepwise analyses confirmed that nationality is significant when explaining individual eco-behaviour, for both Italian and Chinese people. Moreover, the linear regression model, as a stepwise analysis, showed that regulatory focus and universalism are the main personal values influencing ecological behaviour. Differences emerging from the analysis show significant differences in terms of eco-behaviour and eco-awareness, for the two countries involved in the analysis, that might lead companies to adopt different marketing strategies when promoting eco-products.

  9. New experience in atmospheric monitoring in Moscow city on the base of WSN technology

    Science.gov (United States)

    Asavin, Alex; Litvinov, Artur; Baskakov, Sergey; Chesalova, Elena

    2016-04-01

    The aim of this report is to present the gas emission of H2 in the general composition of atmospheric pollution of Moscow city. We start the project at the beginning of 2015 year in two Moscow academicals organization -Vernadsky Institute of Geochemistry and Analytical Chemistry and Moscow Geological State Museum. One place is in the center of Moscow, near the Kremlin and other one is in the most clear zone of Moscow - Moscow State University place, Vorobyevy Mountains (high point of Moscow). We plan to compare these regions by the concentration of H2 and other gases (CH4, SO2) for green gas pollution. Application network of monitoring is composed of gas sensors (H2, CH4), complex autonomous equipment for measurement temperature, pressure, humidity and network of telecommunications (used ZigBee protocol). Our project offer the technical solutions for monitoring network on the base of WSN (wireless sensor network) technology and the high-sensitive sensors of hydrogen and methane, software and electronic equipment with a transmitter network. This work is the first project in Russia. Gas sensors for monitoring system were developed on the base of MIS-structures (metal-insulator-semiconductor). MIS-sensors are suitable for measuring the concentrations of the following gases: hydrogen, hydrogen sulphide, nitrogen dioxide, ethylmercaptan, chlorine and ammonia. The basis of the sensor is MIS - structure Pd-Ta2O5-SiO2-Si,), which capacitance changes when reaction with gases occurs. The sensor fabrication technology is based on the microelectronics device fabrication technologies and the thin film laser deposition technique. Sensor can be used for measuring the concentration of any gas among noted before, in ambient temperature range -30..+40°C and RH 30-90% (30°C).Three gas sensors with analog interface were made for our experimental monitoring system. Original calibration was made using calibration by special standard mixture of H2 and atmosphere. There are 10-15 points

  10. MacRuby Ruby and Cocoa on OS X

    CERN Document Server

    Aimonetti, Matt

    2011-01-01

    Want to build native Mac OS X applications with a sleek, developer-friendly alternative to Objective-C? MacRuby is an ideal choice. This in-depth guide shows you how Apple's implementation of Ruby gives you access to all the features available to Objective-C programmers. You'll get clear, detailed explanations of MacRuby, including quick programming techniques such as prototyping. Perfect for programmers at any level, this book is packed with code samples and complete project examples. If you use Ruby, you can tap your skills to take advantage of Interface Builder, Cocoa libraries, the Objec

  11. MacBook Pro portable genius

    CERN Document Server

    Gruman, Galen

    2013-01-01

    Learn the skills, tools and shortcuts you need in order to make the most of your MacBook Pro This easy-to-use, compact guide skips the fluff and gets right to the essentials so that you can maximize all the latest features of the MacBook Pro. Packed with savvy insights and tips on key tools and shortcuts, this handy book aims to help you increase your productivity and save you time and hassle. From desktop sharing and wireless networking to running Windows applications and more, this book shows you what you want to know. Includes the latest version of OS X, iCloud, FaceTime, and moreCovers al

  12. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2012-01-01

    Discover loads of tips and techniques for the newest MacBook Pro You're already ahead of the game with a MacBook Pro. Now you can get even more out the popular Apple notebook with the new edition of this handy, compact book. Crammed with savvy insights and tips on key tools and shortcuts, this book will help you increase your productivity and keep your Apple digital lifestyle on track. From desktop sharing and wireless networking to running Windows applications, this book avoids fluff, doesn't skimp on the essentials, saves you time and hassle, and shows you what you most want to know. Include

  13. Learning Unix for Mac OS X Tiger Unlock the Power of Unix

    CERN Document Server

    Taylor, Dave

    2005-01-01

    Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price

  14. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  15. Low-Power Wireless Sensor Networks Protocols, Services and Applications

    CERN Document Server

    Suhonen, Jukka; Kaseva, Ville; Hämäläinen, Timo D; Hännikäinen, Marko

    2012-01-01

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data m...

  16. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  17. Douglas MacArthur- An Administrative Biography

    OpenAIRE

    Tehan III, William J.

    2002-01-01

    For more than a half century Douglas MacArthur was a servant of the United States. He is best remembered as a general and a soldier, especially for his leadership during World War II and the Korean War. MacArthur was also the Superintendent of West Point, Chief of Staff of the U.S. Army, Generalissimo ( Commander) of the Armed Forces and Military Advisor (Minister of Defense) to the President of the Commonwealth of the Philippines, and the Supreme Commander Allied Powers and the Military Gove...

  18. Turning the Big Mac Index into the Medical MAC Index | Wilson ...

    African Journals Online (AJOL)

    Objective: The purpose of this study was to create a global medical earnings index, called the Medical MAC Index, to enable a comparison of what medical specialists earn in the countries included in the study. Design: The study gathered data on the earnings of specialist anaesthetists employed in state hospitals with five ...

  19. Alistair William MacDonald.

    Science.gov (United States)

    Callegari, Angus

    2018-01-06

    A devoted family man and churchgoer, Alistair MacDonald was a meticulous vet with a great sense of humour. Having served in the RAF during the Second World War, he had plenty of stories to tell. British Veterinary Association.

  20. Office for iPad and Mac for dummies

    CERN Document Server

    Weverka, Peter

    2015-01-01

    The easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook-and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things a

  1. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms

    Science.gov (United States)

    Kim, Jaeho; Choi, Sung-Chan; Ahn, Il-Yeup; Sung, Nak-Myoung; Yun, Jaeseok

    2016-01-01

    Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs), forming a global network infrastructure, called the Internet of Things (IoT). To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs) is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT). Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS) enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control) to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions. PMID:27782058

  2. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms

    Directory of Open Access Journals (Sweden)

    Jaeho Kim

    2016-10-01

    Full Text Available Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs, forming a global network infrastructure, called the Internet of Things (IoT. To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT. Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions.

  3. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms.

    Science.gov (United States)

    Kim, Jaeho; Choi, Sung-Chan; Ahn, Il-Yeup; Sung, Nak-Myoung; Yun, Jaeseok

    2016-10-06

    Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs), forming a global network infrastructure, called the Internet of Things (IoT). To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs) is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT). Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS) enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control) to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions.

  4. Dynamic Voltage-Frequency and Workload Joint Scaling Power Management for Energy Harvesting Multi-Core WSN Node SoC

    Directory of Open Access Journals (Sweden)

    Xiangyu Li

    2017-02-01

    Full Text Available This paper proposes a scheduling and power management solution for energy harvesting heterogeneous multi-core WSN node SoC such that the system continues to operate perennially and uses the harvested energy efficiently. The solution consists of a heterogeneous multi-core system oriented task scheduling algorithm and a low-complexity dynamic workload scaling and configuration optimization algorithm suitable for light-weight platforms. Moreover, considering the power consumption of most WSN applications have the characteristic of data dependent behavior, we introduce branches handling mechanism into the solution as well. The experimental result shows that the proposed algorithm can operate in real-time on a lightweight embedded processor (MSP430, and that it can make a system do more valuable works and make more than 99.9% use of the power budget.

  5. Wound Healing in Mac-1 Deficient Mice

    Science.gov (United States)

    2017-05-01

    Dentistry, University of Illinois at Chicago, Chicago, IL, USA. 2 Department of Defense Biotechnology High Performance Computing Software...study, we used a commercially available Mac-1 deficient strain to examine whether this deficit 5 extends to slightly smaller wounds and incisional...levels of Collagen I and Collagen III in wounds from the two strains of mice at any time point. Unwounded skin from both WT and Mac-1 -/- mice contained

  6. Eco-Innovation in Circular Agri-Business

    Directory of Open Access Journals (Sweden)

    Dong-Her Shih

    2018-04-01

    Full Text Available This study constructs a theory of eco-innovation in circular agri-business. Although previous studies have discussed eco-innovation in circular agri-business, they did not address eco-innovation from the perspective of a closed-loop sustainable supply chain. Hence, this study applied the fuzzy TOPSIS method to conduct the analysis and determine the interrelationship between eco-innovation and the closed-loop concept. The results are consistent with the theory and a significant improvement in terms of the decisive attributes. The findings suggest that improving water management, relationships with suppliers, knowledge sharing, environmental management systems, and new product and service development are the most effective and efficient ways to build eco-innovation in circular agri-business. The managerial and theoretical implications are discussed.

  7. Douglas MacArthur Upon Reflection

    National Research Council Canada - National Science Library

    Snitchler, Lowell

    1998-01-01

    .... This research recounts MacArthur's personality development from childhood, investigates his last military campaign, and, finally, applies the diagnosis of narcissistic personality disorder to the assembled data...

  8. Umberto Eco - autobiograf?

    Directory of Open Access Journals (Sweden)

    Regina Lubas-Bartoszyńska

    2009-01-01

    Full Text Available This text shows that U. Eco is an autobiographer in only some sense of the word. He has not written an autobiobiographical text in which he would present a segment of his life. However, he told the history of his novelistic work and presented his intellectual train of thought in his essays, interviews, introductions to his works. There also exists an indirect autobiographism in Eco, which expresses signs of the author's life and of his personality dispersed in his interpretative and theoretical writings on literature, aesthetics, history, in his feuilletons and in his novels. Five types of autobiographism have been distinguished in Eco as well as five autobiographical strategies within the indirect autobiographism. The first strategy - a strong presence of autorial I in the text - is not sufficient and requires support of some other of the strategies discussed.

  9. Mammalian Synthetic Biology: Time for Big MACs.

    Science.gov (United States)

    Martella, Andrea; Pollard, Steven M; Dai, Junbiao; Cai, Yizhi

    2016-10-21

    The enabling technologies of synthetic biology are opening up new opportunities for engineering and enhancement of mammalian cells. This will stimulate diverse applications in many life science sectors such as regenerative medicine, development of biosensing cell lines, therapeutic protein production, and generation of new synthetic genetic regulatory circuits. Harnessing the full potential of these new engineering-based approaches requires the design and assembly of large DNA constructs-potentially up to chromosome scale-and the effective delivery of these large DNA payloads to the host cell. Random integration of large transgenes, encoding therapeutic proteins or genetic circuits into host chromosomes, has several drawbacks such as risks of insertional mutagenesis, lack of control over transgene copy-number and position-specific effects; these can compromise the intended functioning of genetic circuits. The development of a system orthogonal to the endogenous genome is therefore beneficial. Mammalian artificial chromosomes (MACs) are functional, add-on chromosomal elements, which behave as normal chromosomes-being replicating and portioned to daughter cells at each cell division. They are deployed as useful gene expression vectors as they remain independent from the host genome. MACs are maintained as a single-copy and can accommodate multiple gene expression cassettes of, in theory, unlimited DNA size (MACs up to 10 megabases have been constructed). MACs therefore enabled control over ectopic gene expression and represent an excellent platform to rapidly prototype and characterize novel synthetic gene circuits without recourse to engineering the host genome. This review describes the obstacles synthetic biologists face when working with mammalian systems and how the development of improved MACs can overcome these-particularly given the spectacular advances in DNA synthesis and assembly that are fuelling this research area.

  10. Florence Jessie Mac Williams

    Indian Academy of Sciences (India)

    CPMGIKAlBGE-340/2003-05. Resonance - January 2005. Licenced to post WPP No.6 RT Nagar Postoffice. Florence Jessie Mac Williams. (1917 - 1990). Registered with Registrar of Newspapers in India vide Regn. No. 66273/96. ISSN 0971-8044. Price per copy: Rs 40.

  11. Vehicle Health Management Communications Requirements for AeroMACS

    Science.gov (United States)

    Kerczewski, Robert J.; Clements, Donna J.; Apaza, Rafael D.

    2012-01-01

    As the development of standards for the aeronautical mobile airport communications system (AeroMACS) progresses, the process of identifying and quantifying appropriate uses for the system is progressing. In addition to defining important elements of AeroMACS standards, indentifying the systems uses impacts AeroMACS bandwidth requirements. Although an initial 59 MHz spectrum allocation for AeroMACS was established in 2007, the allocation may be inadequate; studies have indicated that 100 MHz or more of spectrum may be required to support airport surface communications. Hence additional spectrum allocations have been proposed. Vehicle health management (VHM) systems, which can produce large volumes of vehicle health data, were not considered in the original bandwidth requirements analyses, and are therefore of interest in supporting proposals for additional AeroMACS spectrum. VHM systems are an emerging development in air vehicle safety, and preliminary estimates of the amount of data that will be produced and transmitted off an aircraft, both in flight and on the ground, have been prepared based on estimates of data produced by on-board vehicle health sensors and initial concepts of data processing approaches. This allowed an initial estimate of VHM data transmission requirements for the airport surface. More recently, vehicle-level systems designed to process and analyze VHM data and draw conclusions on the current state of vehicle health have been undergoing testing and evaluation. These systems make use of vehicle system data that is mostly different from VHM data considered previously for airport surface transmission, and produce processed system outputs that will be also need to be archived, thus generating additional data load for AeroMACS. This paper provides an analysis of airport surface data transmission requirements resulting from the vehicle level reasoning systems, within the context of overall VHM data requirements.

  12. Enhanced Sleep Mode MAC Control for EPON

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler.......This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler....

  13. A survey of system architecture requirements for health care-based wireless sensor networks.

    Science.gov (United States)

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  14. A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2011-05-01

    Full Text Available Wireless Sensor Networks (WSNs have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera. However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  15. SELF-POWERED WIRELESS SENSOR NODE POWER MODELING BASED ON IEEE 802.11 COMMUNICATION PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Raymond A. DeCarlo; Lefteri H. Tsoukalas

    2016-04-01

    considerations that must also be taken into account when computing the power consumption associated with each task. The considerations includes: number of events occurring in a fixed active time period and the duration of each event, event-information processing time, total communication time, number of retransmission, etc. Additionally, at the network level the communication of information data packets between WSNs involves collisions, latency, andretransmission, which result in unanticipated power losses. This paper presents stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers, IEEE, 802.11 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The results are verified via simulation.

  16. Policy Instruments for Eco-Innovation in Asian Countries

    OpenAIRE

    Jang, Eun; Park, Mi; Roh, Tae; Han, Ki

    2015-01-01

    Eco-innovation globally emerged as an effort to implement sustainable development. States and firms established and implemented policies and strategies for eco-innovation as one route to achieving sustainable development. Eco-innovation has been facilitated in developed countries, specifically OECD members and European countries, through action plans. Recently, eco-innovation policies have emerged in developing countries. Thus, this study analyzes eco-innovation policies in Asian countries. ...

  17. MAC calorimeters and applications

    International Nuclear Information System (INIS)

    MAC Collaboration.

    1982-03-01

    The MAC detector at PEP features a large solid-angle electromagnetic/hadronic calorimeter system, augmented by magnetic charged-particle tracking, muon analysis and scintillator triggering. Its implementation in the context of electron-positron annihilation physics is described, with emphasis on the utilization of calorimetry

  18. Highly efficient and eco-friendly gold-catalyzed synthesis of homoallylic ketones

    KAUST Repository

    Gó mez-Suá rez, Adriá n; Gasperini, Danila; Vummaleti, Sai V. C.; Poater, Albert; Cavallo, Luigi; Nolan, Steven P.

    2014-01-01

    We report a new catalytic protocol for the synthesis of γ,δ-unsaturated carbonyl units from simple starting materials, allylic alcohols and alkynes, via a hydroxalkoxylation/Claisen rearrangement sequence. This new process is more efficient (higher TON and TOF) and more eco-friendly (increased mass efficiency) than the previous state-of-the-art technique. In addition, this method tolerates both terminal and internal alkynes. Moreover, computational studies have been carried out in order to shed light on how the Claisen rearrangement is initiated. © 2014 American Chemical Society.

  19. Highly efficient and eco-friendly gold-catalyzed synthesis of homoallylic ketones

    KAUST Repository

    Gómez-Suárez, Adrián

    2014-08-01

    We report a new catalytic protocol for the synthesis of γ,δ-unsaturated carbonyl units from simple starting materials, allylic alcohols and alkynes, via a hydroxalkoxylation/Claisen rearrangement sequence. This new process is more efficient (higher TON and TOF) and more eco-friendly (increased mass efficiency) than the previous state-of-the-art technique. In addition, this method tolerates both terminal and internal alkynes. Moreover, computational studies have been carried out in order to shed light on how the Claisen rearrangement is initiated. © 2014 American Chemical Society.

  20. ECO-INNOVATION FOR A SUSTAINABLE FUTURE

    Directory of Open Access Journals (Sweden)

    RATIU Mariana

    2014-05-01

    Full Text Available Eco-innovation is any form of innovation resulting in or aiming at significant and demonstrable progress towards the goal of sustainable development, through reducing impacts on the environment, enhancing resilience to environmental pressures, or achieving a more efficient and responsible use of natural resources. States and governments of the world, different institutions and organizations actively involved and aware in public policies, strategies and actions, reaffirm their commitments and reassess actions in order to achieve a truly sustainable development. In the common vision and the resolutions and other documents of the United Nations Conference on Sustainable Development, Rio+20, the words "environment", "innovation", "green economy" appear very often and almost always along the same context, to achieve the objectives of the sustainable development. The objectives of EU's Europe 2020 strategy for smart, sustainable and inclusive growth, are being implemented through a number of Flagship Initiatives addressing the main challenges, like “Innovation for a sustainable Future - The Eco-innovation Action Plan (EcoAP”. Eco-innovation Observatory developed the Eco-Innovation index, the first tool to assess and illustrate eco-innovation performance across the EU Member States. Like in all fields, in textiles and leather field, eco-innovation is present and there are a lot of tools available that measure environmental damage and help manufacturers and brands become more sustainable. Eco-innovation is not just a trendy concept but a reality and a necessity nowadays, a way to achieve a sustainable future for ourselves and future generations.

  1. Perspective on Eco-Hydrology Developing Strategy in China

    Science.gov (United States)

    Xia, J.

    2017-12-01

    China is one of developing countries with higher eco-environmental press in the world due to large population and its socio-economic development. In China, water is not only the sources for life, but also the key for production, and the foundation for eco-system. Thus, Eco-hydrology becomes a fundamental also an applied sciences related to describe the hydrologic mechanisms that underlie ecologic patterns and processes. This paper addresses the issue of Eco-hydrology Developing Strategy in China, supported by Chinese Academy of Sciences (CAS). Major contents include four aspects, namely: (1) Demands and frontier of eco-hydrology in the world; (2) Major theories and approaches of Eco-hydrology; (3) Perspective of future development on Eco-hydrology; (4) Enacting and proposal for China development strategy on Eco-hydrology. Application fields involves urban, rural area, wetland, river & lake, forest and special regions in China, such as the arid and semi-arid region and so on. The goal is to promote the disciplinary development of eco-hydrology, and serve for national demands on ecological civilization construction in China.

  2. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    General acceptance of the challenge provision in the Chemical Weapons Convention has the potential for influence in other arms control areas. While most applications of the challenge inspection may be straightforward, there may be instances where access to the site by inspectors may be problematic. The MACS system described in this paper was developed to respond to these situations. Inspection and verification may be difficult when a host is unwilling,for valid reasons, to permit physical access to a site. We proposed a system of remote sensors which may be used to demonstrate compliance with Chemical Weapons Convention (CWC) challenge inspections even ff the inspector is physically excluded from a sensitive site. The system is based upon alternative-means-of-access provisions of the CWC. The Defense Nuclear Agency (DNA) funded design and construction of a system prototype, designated as MACS for Managed Access by Controlled Sensing. Features of the MACS design allow growth of the prototype into a versatile device for international monitoring of production facilities and other sites. MACS consists of instrumentation and communication equipment allowing site personnel to conduct a facility tour and perform acceptable measurements, while physically excluding the inspector from the facility. MACS consists of a base station used by the inspector, and a mobile unit used within the facility and manipulated by the facility staff. The base station and the mobile unit are at sign ed by a communication system, currently realized as a fiber optic cable. The mobile unit is equipped with television cameras and remote-reading distance-measuring equipment (DME) for use in verifying locations and dimensions. Global Positioning System receivers on the mobile unit provide both precise location and dead reckoning, suitable for tracking the mobile unit's position while within a building when satellite signals are not available

  3. Feedback-Based Eco-Design for Integrating the Recency, Frequency, and Monetary Value of Eco-Efficiency into Sustainability Management

    Directory of Open Access Journals (Sweden)

    Rui Yang Chen

    2016-09-01

    Full Text Available Customer feedback is used to understand customer requirements. Early design phases require the consideration of items including manufacturing, the environment, and sustainability management. Therefore, it is crucial that eco-efficiency is taken into account in the early design phases. Traditionally, eco-efficiency is considered only in terms of eco-design issues, not customer requirements based on business values such as Recency, Frequency, and Monetary (RFM value. In the meantime, integrating innovation from eco-design is one important aspect. Here, I propose that customer feedback-based eco-efficiency and TRIZ-based innovation can be considered in early eco-design based on the RFM value for sustainability management. The analytic hierarchy process (AHP and fuzzy-based AHP were integrated to explore the relative weights of RFM variables for business value evaluation. The innovative method of the paper is using a TRIZ contradiction matrix associated with engineering parameters for eco-design. The experimental study has been carried out, and it meets the forecasting business value for green product usage. The business value was used as the decision-making factor in order to evaluate both environmental and marketing performance.

  4. Mac OS X Snow Leopard for Power Users Advanced Capabilities and Techniques

    CERN Document Server

    Granneman, Scott

    2010-01-01

    Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world's slickest and most elegant operating system, then this is the book for you. Written by Scott Granneman, an experienced teacher, developer, and consultant, Mac OS X for Power Users helps you push Mac OS X to the max, unveiling advanced techniques and options that you may have not known even existed. Create custom workflows and apps with Automa

  5. Performance comparison between S-ALOHA and R3T protocols for multirate OFFH-CDMA systems in optical packet networks

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M.

    2006-12-01

    We discuss two newly proposed multiple-access control (MAC) protocols for multirate optical code-division multiple access (OCDMA) networks. The first protocol is slotted ALOHA/optical fast-frequency-hopping code-division multiple access (S-ALOHA/OFFH-CDMA), and the second is round-robin receiver-transmitter/optical fast-frequency-hopping code-division multiple access (R3/OFFH-CDMA). Our main subject is to exploit the potential of the optical fast-frequency-hopping CDMA using a fiber Bragg grating when jointly used with two different MAC protocols in a link layer as an effective way of integrating multirate traffic. The system throughput and the average packet delay are compared for both systems. It is shown that S-ALOHA is better than R3T when the user's activity and the offered load are high, whereas R3T is better for smaller values. Both protocols can be competitive in terms of the system throughput, with the advantage going to the R3T protocol at a moderate offered load. However, the R3T protocol suffers a higher delay mainly because of the presence of additional modes. Finally, the overlapped OCDMA system always outperforms the variable processing gain (VPG) OCDMA system regardless of the protocol used.

  6. DEMONSTRATION BULLETIN: THE ECO LOGIC THERMAL DESORPTION UNIT - MIDDLEGROUND LANDFILL - BAY CITY, MI - ELI ECO LOGIC INTERNATIONAL, INC.

    Science.gov (United States)

    ECO Logic has developed a thermal desorption unit 0"DU) for the treatment of soils contaminated with hazardous organic contaminants. This TDU has been designed to be used in conjunction with Eco Logic's patented gas-phase chemical reduction reactor. The Eco Logic reactor is the s...

  7. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  8. A Study on an Energy Conservation and Interconnection Scheme between WSN and Internet Based on the 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Runtong Zhang

    2015-01-01

    Full Text Available Wireless sensor network (WSN, which has broad application prospects, consists of small nodes with sensing, computation, and communications capabilities. IPv6 is used over low power WPAN (wireless personal area network which is run by 6LoWPAN technology on the LoWPAN devices. In order to establish seamless connection of two heterogeneous networks, that is, WSN and IPv6 network, this paper proposes an improved energy conservation and interconnection scheme (ECIS based on the analysis of the current schemes. Detailed design of each functional component in the new scheme is proposed, and an expansion of the SSCS module in NS2 802.15.4 simulator is examined. Comprehensive experiments on the simulation platform show that the newly proposed scheme is advantageous over existing results.

  9. Macintosh Troubleshooting Pocket Guide for Mac OS

    CERN Document Server

    Lerner, David; Corporation, Tekserve

    2009-01-01

    The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

  10. Eco-innovations in the functioning of companies.

    Science.gov (United States)

    Ociepa-Kubicka, A; Pachura, P

    2017-07-01

    The development of entrepreneurships in the 21st century cannot occur without taking care of the natural environment. The article presents issues related to eco-innovation. Despite the opportunities offered by eco-innovations, implementation of such initiatives remains to lead to various difficulties. They vary across countries and sectors. The insufficient number of enterprises in Poland and other European countries implement adequate level of eco-innovations. The main aim of this paper is to indicate the causes of this status and activities aimed to develop eco-innovativeness. The benefits and risks connected with implementation of innovative products and technologies were also discussed. Furthermore, the advantages of and barriers to their implementation into companies were analysed. The entrepreneurs from the least eco-innovative countries emphasize serious barriers, including uncertain demand from the market, uncertain return on investment or too long a payback period for eco-innovation, lack of funds within the enterprise, insufficient access to existing subsidies and fiscal incentive. They are especially afraid of the financial risks, which raises uncertainty and leads to refraining from innovative initiatives. The possibilities were indicated for the entrepreneurs who face problems with the implementation of innovative solutions. Particular attention was paid to the European Union activities for the development of eco-innovations. Numerous programs supporting their implementation were indicated. The article also presents examples of eco-innovation in water and sewage enterprises. It was emphasized that planning of eco-innovative solutions should be based on comprehensive information about actual benefits and possibility of threats to the environment which can be caused by implementation of eco-innovations. The study presents the example of threats resulting from different methods of sewage sludge management. Copyright © 2017 Elsevier Inc. All rights

  11. On eco-planning for an eco-demonstration park (EDP) and sustainability-Case study of the Luhua EDP in the Chongming Island of Shanghai,China

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The background,concept,connotation,principles,and methods ofeco-planning for an Eco-Demonstration Park (EDP) and sustainability were examined based on a case study of the Luhua EDP in the Chongming Island of Shanghai,China,which is an important part of Shanghai Eco-city planning and construction in the 21st century.By analyzing natural,social and economic conditions,calculating population using the land capacity eco-model,eco-function zoning,and eco-construction,an innovative eco-industrial structure and technical chain were formulated.A comprehensive eco-planning scheme for the EDP was proposed,including planning and management strategies for subsystems of efficient industry,good quality human settlement,high standard eco-construction and eco-tourism as well as effective environmental protection and attractive landscape.The EDP should be an area with coordinated and sustainable economic,social and environmental subsystems.Eco-planning for the EDP should be a very important part of eco-city planning and sustainability.The paper aims to set up a theoretical framework and practical basis for eco-planning and promoting harmony between human and nature.

  12. Electric Power Self-Supply Module for WSN Sensor Node Based on MEMS Vibration Energy Harvester

    Directory of Open Access Journals (Sweden)

    Wenyang Zhang

    2018-04-01

    Full Text Available This paper proposes an electric power self-supply module for the wireless sensor network (WSN sensor node. The module includes an electromagnetic vibration energy harvester based on micro-electro-mechanical system (MEMS technology and a processing circuit. The vibration energy harvester presented in this paper is fabricated by an integrated microfabrication process and consists of four similar and relatively independent beam vibration elements. The main functions of the processing circuit are to convert the output of the harvester from unstable alternating current (AC to stable direct current (DC, charge the super capacitor, and ensure the stable output of the super capacitor. The preliminary test results of the harvester chip show that the chip can output discontinuous pulse voltage, and the range of the voltage value is from tens to hundreds of millivolts in the vibration frequency range of 10–90 Hz. The maximum value that can be reached is 563 mV (at the vibration frequency of 18 Hz. The results of the test show that the harvester can output a relatively high voltage, which can meet the general electric power demand of a WSN sensor node.

  13. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  14. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  15. Eco-efficiency in industrial production

    NARCIS (Netherlands)

    von Raesfeld Meijer, Ariane M.; de Bakker, F.G.A.; Groen, Arend J.

    2001-01-01

    English AbstractThis report of the MATRIC project investigated 'Eco-efficiency in industrial production'. After a general introduction into the domain of eco-efficiency, the first part of this report further focusses on the organisation of Product-Oriented Environmental Management (POEM), which is

  16. Eco-Schools campaign. The European projects

    International Nuclear Information System (INIS)

    Blanchini, P.; Marino, G.

    1999-01-01

    The Foundation for Environmental Education in Europe (FEEE) was established in 1981; since then it was been actively promoting and delivering education through a series of successful internationals programmes launched in 21 different European nations. The Eco-School Campaign aims to raise students' awareness of environment issues through classroom study, and provide an integrated system for environmental management of schools based on EMAS (with waste, water and energy management as priority areas). As a process of facilitating sustainable developpement at a local level, pupils are encouraged to take an active role in mental impact of the schools. The Eco-Schools Green Flag, awarded to schools with high achievement in their Programme, is a recognised and respected eco-label for environmental education and performance. In Italy the National Eco-Schools operator was asked to set up a ten-schools pilot programme in the region Friuli Venezia Giulia: these are very first national schools that are likely to become 'Eco-Schools'

  17. MacIntyre's Moral Theory and Moral Relativism

    OpenAIRE

    Ali Abedi Renani

    2017-01-01

    In this paper, I seek to explain the similarity and disparity between MacIntyre’s moral theory and moral relativism. I will argue that MacIntyre’s moral theory can escape the charge of moral relativism because both his earlier social and his later metaphysical approaches appeal to some criteria, the human telos or universal human qualities respectively. The notion of telos is wider than the notion of function which is defined in social contexts. If there is a context-transcending notion of te...

  18. The economic value of corporate eco-efficiency

    NARCIS (Netherlands)

    Guenster, N.; Bauer, R.; Derwall, J.M.M.; Koedijk, C.G.

    2011-01-01

    This study adds new insights to the long-running corporate environmental-financial performance debate by focusing on the concept of eco-efficiency. Using a new database of eco-efficiency scores, we analyse the relation between eco-efficiency and financial performance from 1997 to 2004. We report

  19. An R&D Management Framework for Eco-Technology

    Directory of Open Access Journals (Sweden)

    Kenji Sano

    2011-08-01

    Full Text Available Although research and development (R&D affects new value-added creation, including that related to environmental aspects, there is little literature dealing with the integration of R&D management and eco-value. Here, eco-value of technology is defined as the advantage of environmental competitiveness in the market. This paper proposes a framework of R&D management of eco-technology (RDMOET, consisting of: (1 future research for sustainability; (2 making an original eco-theme portfolio and roadmap; (3 gap analysis and implementation of new eco-themes; and (4 eco-value evaluation. (1 and (4 are new processes compared with conventional R&D management. Through practice at the Corporate R&D Center of Toshiba Corporation, the usefulness of the proposed framework is verified from the viewpoint of not only technological eco-innovation, but also that of organizational learning for environmental sustainability.

  20. Eco-efficiency and control loop configuration for recycle systems

    Energy Technology Data Exchange (ETDEWEB)

    Munir, Muhammad Tajammal; Yu, Wei; Young, Brent P. [The University of Auckland, Auckland (New Zealand)

    2013-05-15

    To integrate measurements of eco-efficiency with control loop configuration has become an important topic since all industrial processes/plants are requested to increase their eco-efficiency. The exergy eco-efficiency factor, a new measure of eco-efficiency for control loop configuration, has been developed recently. The exergy eco-efficiency factor is based on the thermodynamic concept of exergy, which can be used to analyze a process in terms of its efficiency. The combination of the relative gain array (RGA), NI, CN, dynamic RGA, and the exergy eco-efficiency factor will help guide the process designer to find the optimal control design with low operating cost/eco-efficiency. In this paper, we validate the proposed exergy eco-efficiency factor for processes with recycles which are very common industrially.

  1. Eco-efficiency and control loop configuration for recycle systems

    International Nuclear Information System (INIS)

    Munir, Muhammad Tajammal; Yu, Wei; Young, Brent P.

    2013-01-01

    To integrate measurements of eco-efficiency with control loop configuration has become an important topic since all industrial processes/plants are requested to increase their eco-efficiency. The exergy eco-efficiency factor, a new measure of eco-efficiency for control loop configuration, has been developed recently. The exergy eco-efficiency factor is based on the thermodynamic concept of exergy, which can be used to analyze a process in terms of its efficiency. The combination of the relative gain array (RGA), NI, CN, dynamic RGA, and the exergy eco-efficiency factor will help guide the process designer to find the optimal control design with low operating cost/eco-efficiency. In this paper, we validate the proposed exergy eco-efficiency factor for processes with recycles which are very common industrially

  2. Wireless Sensor Node Power Profiling Based on IEEE 802.11 and IEEE 802.15.4 Communication Protocols. Modeling and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Vivek [Idaho National Lab. (INL), Idaho Falls, ID (United States); Richardson, Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States); Zhang, Yanliang [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-10-01

    retransmission, which result in unanticipated power losses. This report focuses rigorous stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers 802.11 and 802.15.4 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The report will present development of an expression to compute the expected energy consumption per operational cycle of a schedule-driven WSN by taking into consideration the node level activities, i.e., sensing and processing, and the network level activities, i.e., channel access, packet collision, retransmission attempts, and transmission of a data packet.

  3. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  4. Practical Eco-Design and Eco-Innovation of Consumer Electronics—the Case of Mobile Phones

    Directory of Open Access Journals (Sweden)

    Anders S. G. Andrae

    2016-02-01

    Full Text Available Annually, it is estimated that about 4 billion units of consumer electronics for mobile communications are produced worldwide. This could lead to various ecological imbalances unless the design and disposal of the products are handled optimally. To illustrate how industry looks at and responds to the increasing social awareness, this article describes how sustainability is successfully implemented in practice at a large Chinese company, developing and producing various kinds of electronic products used for communication. It also describes how a variety of eco-innovations and business models contribute to reducing the environmental impact; for example, through increased recovery and recycling. A new kind of eco-design procedure is presented along with a new methodology which shows how a mobile phone gradually becomes more sustainable from one generation to the next. The issues with and set-up of new eco-labeling schemes for mobile phones, eco-rating, is described in detail. The conclusion is that due to high competition between companies, the industry acts resourcefully and a lot is done to the save the ecological environment.

  5. Mr MacDonald's suitcase

    DEFF Research Database (Denmark)

    2017-01-01

    Undervisningsforløbet Mr. MacDonald’s suitcase beskriver læringsmålstyret undervisning i faget engelsk i 1. klasse, hvor der arbejdes med kompetenceområdet mundtlig kommunikation. Undervisningsforløbet er bygget op omkring en engelsk tøjdukke, der besøger klassen og fortæller små historier...

  6. Functional characterization of the copper transcription factor AfMac1 from Aspergillus fumigatus.

    Science.gov (United States)

    Park, Yong-Sung; Kim, Tae-Hyoung; Yun, Cheol-Won

    2017-07-03

    Although copper functions as a cofactor in many physiological processes, copper overload leads to harmful effects in living cells. Thus, copper homeostasis is tightly regulated. However, detailed copper metabolic pathways have not yet been identified in filamentous fungi. In this report, we investigated the copper transcription factor AfMac1 ( A spergillus f umigatus Mac1 homolog) and identified its regulatory mechanism in A. fumigatus AfMac1 has domains homologous to the DNA-binding and copper-binding domains of Mac1 from Saccharomyces cerevisiae , and AfMac1 efficiently complemented Mac1 in S. cerevisiae Expression of Afmac1 resulted in CTR1 up-regulation, and mutation of the DNA-binding domain of Afmac1 failed to activate CTR1 expression in S. cerevisiae The Afmac1 deletion strain of A. fumigatus failed to grow in copper-limited media, and its growth was restored by introducing ctrC We found that AfMac1 specifically bound to the promoter region of ctrC based on EMSA. The AfMac1-binding motif 5'-TGTGCTCA-3' was identified from the promoter region of ctrC , and the addition of mutant ctrC lacking the AfMac1-binding motif failed to up-regulate ctrC in A. fumigatus Furthermore, deletion of Afmac1 significantly reduced strain virulence and activated conidial killing activity by neutrophils and macrophages. Taken together, these results suggest that AfMac1 is a copper transcription factor that regulates cellular copper homeostasis in A. fumigatus . © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.

  7. Understanding Eco-innovation and Green Business Models

    DEFF Research Database (Denmark)

    Andersen, Maj Munch

    2014-01-01

    Eco-innovation is considered a still more important competitive strategy to maintain production in highcost economies such as the Danish one. Within the studies of economics of technological change only little research has been undertaken on the dynamics of eco-innovation. Rigorous statistics...... technologies which has taken a starting pointin the environmental effects of varies technologies. The seven categories are:1. Curative eco-innovations - add-on (clean-up, recycling and resource handling)2. Integrated continuous process and product eco-innovations (cleaner production and products)3. User...... and definitions of ecoinnovationare lacking leading to much confusion and methodologically weak empirical analyses. This paperseeks to remedy this by offering a definition and taxonomy of eco-innovations and discussing theimplications for green business model thinking, bringing in examples of Danish successful...

  8. From an eco-industrial park towards an eco-city : a case study in Suzhou, China

    NARCIS (Netherlands)

    Yu, Chang; Dijkema, Gerard P. J.; de Jong, Martin; Shi, Han

    2015-01-01

    As eco-industrial park policies have been in place for years, many mature eco-industrial parks tend to acquire more than just industrial functions and become new urban districts. We investigated this development and conducted empirical research in Suzhou Industrial Park, to obtain insight in how a

  9. Experimental characterisation of Polyethylene Terephthalate (PET) bottle Eco-bricks

    International Nuclear Information System (INIS)

    Taaffe, Jonathan; O’Sullivan, Seán; Rahman, Muhammad Ekhlasur; Pakrashi, Vikram

    2014-01-01

    Highlights: • Characterisation of a novel “Eco-brick” by recycling PET bottles and plastic waste. • Eco-bricks have properties for possible uses in construction. • Consistent manufacturing of Eco-bricks demonstrated to be possible. • Weight of Eco-bricks has a nearly linear relationship with mechanical strength. • Light passage and sound reduction potential of Eco-bricks shown to be good. - Abstract: This paper addresses the issue of recycling waste plastic by considering the feasibility of use of Eco-bricks for constructional purposes. The Eco-bricks are formed by packing plastic within Polyethylene Terephthalate (PET) bottles. Guidelines were provided for the construction of Eco-bricks. Experiments were carried out to characterise some of the properties of these bricks. Compression test, sound insulation assessment and light transmission were considered in this regard and compared with traditional construction materials and conditions. Possible applications of Eco-bricks were discussed. The paper presents the first attempt to characterise these bricks and the results encourage future use of them to a significantly wider extent and for various purposes

  10. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  11. Sleep Control Game for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sang Hoon Lee

    2016-01-01

    Full Text Available In wireless sensor networks (WSNs, each node controls its sleep to reduce energy consumption without sacrificing message latency. In this paper we apply the game theory, which is a powerful tool that explains how each individual acts for his or her own economic benefit, to analyze the optimal sleep schedule for sensor nodes. We redefine this sleep control game as a modified version of the Prisoner’s Dilemma. In the sleep control game, each node decides whether or not it wakes up for the cycle. Payoff functions of the sleep control game consider the expected traffic volume, network conditions, and the expected packet delay. According to the payoff function, each node selects the best wake-up strategy that may minimize the energy consumption and maintain the latency performance. To investigate the performance of our algorithm, we apply the sleep control game to X-MAC, which is one of the recent WSN MAC protocols. Our detailed packet level simulations confirm that the proposed algorithm can effectively reduce the energy consumption by removing unnecessary wake-up operations without loss of the latency performance.

  12. Determinants of eco-efficiency in the Chinese industrial sector.

    Science.gov (United States)

    Fujii, Hidemichi; Managi, Shunsuke

    2013-12-01

    This study measures productive inefficiency within the context of multi-environmental pollution (eco-efficiency) in the Chinese industrial sector. The weighted Russell directional distance model is applied to measure eco-efficiency using production technology. The objective is to clarify how external factors affect eco-efficiency. The major findings are that both foreign direct investment and investment for pollution abatement improve eco-efficiency as measured by air pollutant substances. A levy system for wastewater discharge improves eco-efficiency as measured by wastewater pollutant substances. However, an air pollutant levy does not significantly affect eco-efficiency as measured by air pollutants. Copyright © 2013 The Research Centre for Eco-Environmental Sciences, Chinese Academy of Sciences. Published by Elsevier B.V. All rights reserved.

  13. Resource efficient data compression algorithms for demanding, WSN based biomedical applications.

    Science.gov (United States)

    Antonopoulos, Christos P; Voros, Nikolaos S

    2016-02-01

    During the last few years, medical research areas of critical importance such as Epilepsy monitoring and study, increasingly utilize wireless sensor network technologies in order to achieve better understanding and significant breakthroughs. However, the limited memory and communication bandwidth offered by WSN platforms comprise a significant shortcoming to such demanding application scenarios. Although, data compression can mitigate such deficiencies there is a lack of objective and comprehensive evaluation of relative approaches and even more on specialized approaches targeting specific demanding applications. The research work presented in this paper focuses on implementing and offering an in-depth experimental study regarding prominent, already existing as well as novel proposed compression algorithms. All algorithms have been implemented in a common Matlab framework. A major contribution of this paper, that differentiates it from similar research efforts, is the employment of real world Electroencephalography (EEG) and Electrocardiography (ECG) datasets comprising the two most demanding Epilepsy modalities. Emphasis is put on WSN applications, thus the respective metrics focus on compression rate and execution latency for the selected datasets. The evaluation results reveal significant performance and behavioral characteristics of the algorithms related to their complexity and the relative negative effect on compression latency as opposed to the increased compression rate. It is noted that the proposed schemes managed to offer considerable advantage especially aiming to achieve the optimum tradeoff between compression rate-latency. Specifically, proposed algorithm managed to combine highly completive level of compression while ensuring minimum latency thus exhibiting real-time capabilities. Additionally, one of the proposed schemes is compared against state-of-the-art general-purpose compression algorithms also exhibiting considerable advantages as far as the

  14. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  15. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  16. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  17. The innovative application studty on eco-packaging design and materials

    Directory of Open Access Journals (Sweden)

    Cui Yong Min

    2016-01-01

    Full Text Available The paper solves the increasingly deteriorate environmental problems by positively exploring how to utilize and develop eco-packaging design reasonably. The paper explores an effective method that combines eco-packaging and environmental protection materials, hoping to define the sustainable development road of packaging design. The paper is centered on the design application of eco-packaging and environmental protection materials, applies and analyzes the method to obtain innovative design requirements and development tendency of eco-packaging design by analyzing status and significance of eco-packaging design, combining with the development and main types of eco-packaging packaging materials, and based on the achievements acquired by eco-packaging and environmental protection materials. Meanwhile, the paper also reveals mutual dependence and mutual promotion of eco-packaging design and eco-packaging materials.

  18. Sustainable packaging: from eco-efficiency to eco-effectiveness

    DEFF Research Database (Denmark)

    Niero, Monia; Boas, Simon H.; Olsen, Stig Irving

    2014-01-01

    According to Verghese et al (2012) sustainable packaging should be: effective in delivering its functional requirements, efficient in its use of materials, energy, and water throughout its life cycle, cyclic in its use of renewable materials and recoverability at end-of-life, and safe for people...... and the natural environment. Companies in the packaging sector have traditionally been using the Life Cycle Assessment (LCA) methodology to fulfill these requirements. However, being inspired by the eco-efficiency principle, LCA aims to reduce the negative environmental footprint of human activities by optimizing...... and emissions can be taken up as nutrients by other processes instead of reducing the amount of waste as eco-efficiency advocates. From a company point of view, LCA and C2C are complementary approaches to develop sustainable andinnovative solutions for packaging, see Figure 1. We will illustrate the challenges...

  19. User's guide to the biosphere code ECOS

    International Nuclear Information System (INIS)

    Kane, P.; Thorne, M.C.

    1984-10-01

    This report constitutes the user's guide to the biosphere model ECOS and provides a detailed description of the processes modelled and mathematical formulations used. The FORTRAN code ECOS is an equilibrium-type compartmental biosphere code. ECOS was designed with the objective of producing a general but comprehensive code for use in the assessment of the radiological impact of unspecified geological repositories for radioactive waste. ECOS transforms the rate of release of activity from the geosphere to the rate of accumulation of weighted committed effective dose equivalent (dose). Both maximum individual dose (critical group dose) and collective dose rates may be computed. (author)

  20. Eco-marketing in industrial enterprise activities

    OpenAIRE

    N.M. Chupryna

    2015-01-01

    The aim of the article. The aim of the article is determination of the areas of industrial enterprise’s development and detection of the specificity of their activity in terms of environmental priorities. The results of the analysis. The analysis of the research and publications of the leading scholars on the eco-marketing’s problem was conducted. The main factors of eco-marketing’s mechanism use were considered. Eco-marketing was determined as an important tool of the enterprises’ modern ...

  1. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee

    Science.gov (United States)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Wireless Sensor Networks (WSNs) can provide a substantial benefit in spacecraft systems, reducing launch weight and providing unprecedented flexibility by allowing instrumentation capabilities to grow and change over time. Achieving data transport reliability on par with that of wired systems, however, can prove extremely challenging in practice. Fortunately, much progress has been made in developing standard WSN radio protocols for applications from non-critical home automation to mission-critical industrial process control. The relative performances of candidate protocols must be compared in representative aerospace environments, however, to determine their suitability for spaceflight applications. In this paper, we will present the results of a rigorous laboratory analysis of the performance of two standards-based, low power, low data rate WSN protocols: ZigBee Pro and ISA100.11a. Both are based on IEEE 802.15.4 and augment that standard's specifications to build complete, multi-hop networking stacks. ZigBee Pro targets primarily the home and office automation markets, providing an ad-hoc protocol that is computationally lightweight and easy to implement in inexpensive system-on-a-chip components. As a result of this simplicity, however, ZigBee Pro can be susceptible to radio frequency (RF) interference. ISA100.11a, on the other hand, targets the industrial process control market, providing a robust, centrally-managed protocol capable of tolerating a significant amount of RF interference. To achieve these gains, a coordinated channel hopping mechanism is employed, which entails a greater computational complexity than ZigBee and requires more sophisticated and costly hardware. To guide future aerospace deployments, we must understand how well these standards relatively perform in analog environments under expected operating conditions. Specifically, we are interested in evaluating goodput -- application level throughput -- in a representative crewed environment

  2. Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports

    Science.gov (United States)

    Ahmad, Afandi; Roslan, Muhammad Faris; Amira, Abbes

    2017-09-01

    In high jump sports, approach take-off speed and force during the take-off are two (2) main important parts to gain maximum jump. To measure both parameters, wireless sensor network (WSN) that contains microcontroller and sensor are needed to describe the results of speed and force for jumpers. Most of the microcontroller exhibit transmission issues in terms of throughput, latency and cost. Thus, this study presents the comparison of wireless microcontrollers in terms of throughput, latency and cost, and the microcontroller that have best performances and cost will be implemented in high jump wearable device. In the experiments, three (3) parts have been integrated - input, process and output. Force (for ankle) and global positioning system (GPS) sensor (for body waist) acts as an input for data transmission. These data were then being processed by both microcontrollers, ESP8266 and Arduino Yun Mini to transmit the data from sensors to the server (host-PC) via message queuing telemetry transport (MQTT) protocol. The server acts as receiver and the results was calculated from the MQTT log files. At the end, results obtained have shown ESP8266 microcontroller had been chosen since it achieved high throughput, low latency and 11 times cheaper in term of prices compared to Arduino Yun Mini microcontroller.

  3. The Economic Value of Corporate Eco-Efficiency

    International Nuclear Information System (INIS)

    Guenster, N.; Derwall, J.; Bauer, R.; Koedijk, K.

    2006-08-01

    This study adds new insights to the long-running corporate environmental-financial performance debate by focusing on the concept of eco-efficiency. Using a new database of eco-efficiency ratings, we analyze the relation between eco-efficiency and financial performance from 1997 to 2004. We report that eco-efficiency relates positively to operating performance and market value. Moreover, our results suggest that the market's valuation of environmental performance has been time variant, which may indicate that the market incorporates environmental information with a drift. Although environmental leaders initially did not sell at a premium relative to laggards, the valuation differential increased significantly over time. Our results have implications for company managers, who evidently do not have to overcome a tradeoff between eco-efficiency and financial performance, and for investors, who can exploit environmental information for investment decisions

  4. Measurement of agricultural parameters using wireless sensor network (WSN)

    Science.gov (United States)

    Guaña-Moya, Javier; Sánchez-Almeida, Tarquino; Salgado-Reyes, Nelson

    2018-04-01

    The technological advances have allowed to create new applications in telecommunications, applying low power and reduced costs in their equipment, thus achieving the evolution of new wireless networks or also denominated Wireless Sensor Network. These technologies allow the generation of measurements and analysis of environmental parameter data and soil. Precision agriculture requires parameters for the improvement of production, obtained through WSN technologies. This research analyzes the climatic requirements and soil parameters in a rose plantation in a greenhouse at an altitude of 3,100 meters above sea level. In the present investigation, maximum parameters were obtained in the production of roses, which are in the optimum range of production, whereas the minimum parameters of temperature, humidity and luminosity, evidenced that these parameters can damage the plants, since temperatures less than 10 °C slow down the growth of the plant and allow the proliferation of diseases and fungi.

  5. An R&D Management Framework for Eco-Technology

    OpenAIRE

    Hideki Kobayashi; Masahiro Kato; Yukishige Maezawa; Kenji Sano

    2011-01-01

    Although research and development (R&D) affects new value-added creation, including that related to environmental aspects, there is little literature dealing with the integration of R&D management and eco-value. Here, eco-value of technology is defined as the advantage of environmental competitiveness in the market. This paper proposes a framework of R&D management of eco-technology (RDMOET), consisting of: (1) future research for sustainability; (2) making an original eco-theme p...

  6. Outside-In Signal Transmission by Conformational Changes in Integrin Mac-11

    Science.gov (United States)

    Lefort, Craig T.; Hyun, Young-Min; Schultz, Joanne B.; Law, Foon-Yee; Waugh, Richard E.; Knauf, Philip A.; Kim, Minsoo

    2010-01-01

    Intracellular signals associated with or triggered by integrin ligation can control cell survival, differentiation, proliferation, and migration. Despite accumulating evidence that conformational changes regulate integrin affinity to its ligands, how integrin structure regulates signal transmission from the outside to the inside of the cell remains elusive. Using fluorescence resonance energy transfer, we addressed whether conformational changes in integrin Mac-1 are sufficient to transmit outside-in signals in human neutrophils. Mac-1 conformational activation induced by ligand occupancy or activating Ab binding, but not integrin clustering, triggered similar patterns of intracellular protein tyrosine phosphorylation, including Akt phosphorylation, and inhibited spontaneous neutrophil apoptosis, indicating that global conformational changes are critical for Mac-1-dependent outside-in signal transduction. In neutrophils and myeloid K562 cells, ligand ICAM-1 or activating Ab binding promoted switchblade-like extension of the Mac-1 extracellular domain and separation of the αM and β2 subunit cytoplasmic tails, two structural hallmarks of integrin activation. These data suggest the primacy of global conformational changes in the generation of Mac-1 outside-in signals. PMID:19864611

  7. Mac OS X for Astronomy

    Science.gov (United States)

    Pierfederici, F.; Pirzkal, N.; Hook, R. N.

    Mac OS X is the new Unix based version of the Macintosh operating system. It combines a high performance DisplayPDF user interface with a standard BSD UNIX subsystem and provides users with simultaneous access to a broad range of applications which were not previously available on a single system such as Microsoft Office and Adobe Photoshop, as well as legacy X11-based scientific tools and packages like IRAF, SuperMongo, MIDAS, etc. The combination of a modern GUI layered on top of a familiar UNIX environment paves the way for new, more flexible and powerful astronomical tools to be developed while assuring compatibility with already existing, older programs. In this paper, we outline the strengths of the Mac OS X platform in a scientific environment, astronomy in particular, and point to the numerous astronomical software packages available for this platform; most notably the Scisoft collection which we have compiled.

  8. MacVEE - the intimate Macintosh-VME system

    International Nuclear Information System (INIS)

    Taylor, B.G.

    1986-01-01

    The marriage of a mass-produced personal computer with the versatile VMEbus and CAMAC systems creates a cost-effective solution to many laboratory small system requirements. This paper describes MacVEE (Microcomputer Applied to the Control of VME Electronic Equipment), a novel system in which an Apple Macintosh computer is equipped with a special interface which allows it direct memory-mapped access to single or multiple VME and CAMAC crates interconnected by a ribbon cable bus. The bus is driven by an electronics plinth called MacPlinth, which attaches to the computer and becomes an integral part of it. (Auth.)

  9. Novel Strategy to Improve the Performance of Localization in WSN

    Directory of Open Access Journals (Sweden)

    M. Vasim Babu

    2015-01-01

    Full Text Available A novel strategy of discrete energy consumption model for WSN based on quasi Monte Carlo and crude Monte Carlo method is developed. In our model the discrete hidden Markov process plays a major role in analyzing the node location in heterogeneous media. In this energy consumption model we use both static and dynamic sensor nodes to monitor the optimized energy of all sensor nodes in which every sensor state can be considered as the dynamic Bayesian network. By using this method the power is assigned in terms of dynamic manner to each sensor over discrete time steps to control the graphical structure of our network. The simulation and experiment result shows that our proposed methods are better in terms of localization accuracy and possess minimum computational time over existing localization method.

  10. A WSN based Environment and Parameter Monitoring System for Human Health Comfort: A Cloud Enabled Approach

    Directory of Open Access Journals (Sweden)

    Manohara Pai

    2014-05-01

    Full Text Available The number and type of sensors measuring physical and physiological parameters have seen dramatic increase due to progress in the MEMS and Nano Technology. The Wireless Sensor Networks (WSNs in turn is bringing new applications in environment monitoring and healthcare in order to improve the quality of service especially in hospitals. The adequacy of WSNs to gather critical information has provided solution but with limited storage, computation and scalability. This limitation is addressed by integrating WSN with cloud services. But, once the data enters the cloud the owner has no control over it. Hence confidentiality and integrity of the data being stored in the cloud are compromised. In this proposed work, secure sensor-cloud architecture for the applications in healthcare is implemented by integrating two different clouds. The sink node of WSN outsources data into the cloud after performing operations to secure the data. Since the SaaS and IaaS environments of Cloud Computing are provided by two different cloud service providers (CSPs, both the CSPs will not have complete information of the architecture. This provides inherent security as data storage and data processing are done on different clouds.

  11. A survey on bio inspired meta heuristic based clustering protocols for wireless sensor networks

    Science.gov (United States)

    Datta, A.; Nandakumar, S.

    2017-11-01

    Recent studies have shown that utilizing a mobile sink to harvest and carry data from a Wireless Sensor Network (WSN) can improve network operational efficiency as well as maintain uniform energy consumption by the sensor nodes in the network. Due to Sink mobility, the path between two sensor nodes continuously changes and this has a profound effect on the operational longevity of the network and a need arises for a protocol which utilizes minimal resources in maintaining routes between the mobile sink and the sensor nodes. Swarm Intelligence based techniques inspired by the foraging behavior of ants, termites and honey bees can be artificially simulated and utilized to solve real wireless network problems. The author presents a brief survey on various bio inspired swarm intelligence based protocols used in routing data in wireless sensor networks while outlining their general principle and operation.

  12. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    Science.gov (United States)

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (pimmobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. A MacWilliams Identity for Convolutional Codes : The General Case

    NARCIS (Netherlands)

    Gluesing-Luerssen, Heide; Schneider, Gert

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality

  14. ECO-SUSTAINABLE DEVELOPMENT AND ROMANIAN TOURISM

    Directory of Open Access Journals (Sweden)

    MARIANA BĂLAN

    2014-05-01

    Full Text Available In a changing world, the development of eco-sustainable tourism is manifested in the form of interaction of elements compatible with each other in various dimensions: economic, environmental, human, technological, environmental, ethical, etc. Through eco-sustainable tourism aims to satisfy the present needs of tourists in favor and not in detrimental to the interests of future generations, along with educating them in the spirit of reducing negative environmental impacts. This paper provides a brief overview of the tourism - ecology - sustainable development relationship, by highlighting the evolutionary theoretical considerations regarding the concept of tourism, the need for sustainable tourism development, the ecology as a priority in the development and integration of tourism activities within the coordinates the eco-sustainable development. It also discusses the main indicators used to characterize the tourism activities in Romania in the context of eco-sustainable development.

  15. The analysis of ink jet printed eco-font efficiency

    Directory of Open Access Journals (Sweden)

    Rastko Milošević

    2016-07-01

    Full Text Available Utilization of eco-font for office printing is one of sustainable, “green” printing concepts, which besides obvious economic benefits, as a result has a certain effect on environmental sustainability as well. The fundamental problem that this practice faces is decreased quality of text printed using eco-fonts comparing to those printed with regular fonts. The aim of this research is eco-font efficiency estimation, i.e. determination of toner usage reduction level of ink jet printed documents typed with this font type, as well as estimation of the extent humans perceive differences between text printed with eco-font and the one printed by its „non-eco“ equivalent. Combining instrumental measuring method and digital image analysis, it was found that this simple principle (eco-font utilization enables substantial toner usage reduction for an ink jet printing system, while visual test showed that visual experience of text printed using eco-font is sufficient. In addition, awareness of benefits that eco-font utilization brings, change users’ attitude towards eco-font quality.

  16. Eco-Labeled Seafood: Determinants for (Blue Green Consumption

    Directory of Open Access Journals (Sweden)

    Malin Jonell

    2016-09-01

    Full Text Available Eco-certification has become an increasingly popular market-based tool in the endeavor to reduce negative environmental impacts from fisheries and aquaculture. In this study, we aimed at investigating which psychological consumer characteristics influence demand for eco-labeled seafood by correlating consumers’ stated purchasing of eco-labeled seafood to nine variables: environmental knowledge regarding seafood production, familiarity with eco-labels, subjective knowledge, pro-environmental self-identification, sense of personal responsibility, concern for negative environmental impacts from seafood production, perceived consumer effectiveness, gender and education. Questionnaires were distributed to consumers in Stockholm, Sweden, and the data were tested with multiple regression analysis using linear modeling and model averaging (n = 371. Two variables were the best predictors of stated purchasing of eco-labeled seafood: (i recognition and understanding of eco-labels for seafood (Marine Stewardship Council, Fish for Life, Aquaculture Stewardship Council and KRAV; and (ii concern for negative environmental impacts associated with seafood production. Meanwhile, consumer environmental knowledge was a weaker predictor. Results from this study suggest that strengthening the emotional component of consumer decision-making and improving the level of consumer familiarity with seafood eco-labels could stimulate more pro-environmental seafood consumption.

  17. How To Develop Ngorongoro As An Eco Tourism Destination : Eco Tourism In Ngorongoro

    OpenAIRE

    Londo, Amwewa; Londo, Amwewa

    2008-01-01

    In the third World Countries there is a need to develop and promote Tourism industry. Tourism Sector needs to be promoted to push economic development and increase the number of employments This research aims to find out whether eco-tourism sector at Ngorongoro Conservation area generates suistanable profit to local people. Qualitative reasearch was used to analyze eco-tourism value that leads to better understanding of different supports methods being used by government to local peopl...

  18. Geochronology and petrogenesis of the Early Cretaceous A-type granite from the Feie'shan W-Sn deposit in the eastern Guangdong Province, SE China: Implications for W-Sn mineralization and geodynamic setting

    Science.gov (United States)

    Liu, Peng; Mao, Jingwen; Santosh, M.; Bao, Zhian; Zeng, Xiaojian; Jia, Lihui

    2018-02-01

    The Feie'shan greisen-type W-Sn deposit in the eastern Guangdong Province forms part of the Southeastern Coastal Metallogenic Belt (SCMB) in South China. Here we present zircon LA-ICP-MS U-Pb geochronology of the biotite granite which shows a weighted mean 206Pb/238U age of 134.7 ± 2.0 Ma, consistent with the zircon U-Pb, biotite 40Ar-39Ar and molybdenite Re-Os ages in the previous study. The biotite granite is peraluminous and belongs to high-K calc-alkaline type. It is characterized by high SiO2, K2O, F, K2O + Na2O and FeOt/(FeOt + MgO), and low CaO, MgO, TiO2 and P2O5 contents, enrichment in Rb, Cs, Th and U, and depletion in Ba, Sr, Zr, Ti and P, with flat REE patterns and distinctly negative Eu anomalies, showing an A2-type affinity. The rocks also display extremely low Ba, Sr and Ti concentrations and high Rb/Sr, Rb/Ba and low CaO/(Na2O + K2O) ratios, indicating high degree of fractionation. Zircon grains from the granite have low Eu/Eu* and Ce4 +/Ce3 + ratios, suggesting low oxygen fugacity. The highly fractionated and reduced features imply that the Feie'shan mineralization is genetically related to the biotite granite. The εNd(t) values and zircon εHf(t) values of the biotite granite range from - 2.96 to - 1.95 and - 5.69 to 0.62, with two-stage Nd and Hf model ages (TDM2) of 1083 to 1164 Ma and 1150 to 1552 Ma, indicating that they were derived from magma hybridization between anatectic granitic and mantle-derived mafic magmas. In combination with previous studies, we propose a geodynamic model for the 145―135 Ma W-Sn mineral system and related magmatism in the southwestern domain of the SCMB. After ca. 145 Ma, the subduction orientation of the Izanagi plate changed from oblique to parallel with respect to the continental margin resulting in large-scale lithosphere extension and thinning, which led to the upwelling of asthenosphere. The ascending mantle-derived mafic magmas provided not only supplied the heat for crustal remelting but also added

  19. Quicksilver Power Mac G4

    CERN Document Server

    2001-01-01

    A new generation with a reworked motherboard is launched on 2001 with however the same Graphite box. It also included a processor speed-bump, and brought the DVD-R "SuperDrive" to the mid-level model. The Quicksilver PowerMac was available in three configurations: The 733 MHz model, with 128 MB of RAM, a 40 GB hard drive, and a CD-RW drive, was 1,699 dollars, the 867 MHz configuration, with 128 MB of RAM, a 60 GB hard drive and a DVD-R drive, was 2,499 dollars, and the high-end dual-800 MHz model, with 256 MB of RAM, an 80 GB hard drive and a DVD-R drive, was 3,499 dollars. The 733 MHz model is the first personal computer to have a DVD burner, named SuperDrive at Apple. The design was updated on 2002 with 800 MHz, 933 MHz and dual 1 GHz configurations, becoming the first Mac to reach 1 GHz.

  20. Dolphin natures, human virtues: MacIntyre and ethical naturalism.

    Science.gov (United States)

    Glackin, Shane Nicholas

    2008-09-01

    Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.

  1. Multichannel wireless ECoG array ASIC devices.

    Science.gov (United States)

    DeMichele, Glenn A; Cogan, Stuart F; Troyk, Philip R; Chen, Hongnan; Hu, Zhe

    2014-01-01

    Surgical resection of epileptogenic foci is often a beneficial treatment for patients suffering debilitating seizures arising from intractable epilepsy [1], [2], [3]. Electrodes placed subdurally on the surface of the brain in the form of an ECoG array is one of the multiple methods for localizing epileptogenic zones for the purpose of defining the region for surgical resection. Currently, transcutaneous wires from ECoG grids limit the duration of time that implanted grids can be used for diagnosis. A wireless ECoG recording and stimulation system may be a solution to extend the diagnostic period. To avoid the transcutaneous connections, a 64-channel wireless silicon recording/stimulating ASIC was developed as the electronic component of a wireless ECoG array that uses SIROF electrodes on a polyimide substrate[4]. Here we describe two new ASIC devices that have been developed and tested as part of the on-going wireless ECoG system design.

  2. Eco-modernism, a third way for tomorrow's energy?

    International Nuclear Information System (INIS)

    Anon.

    2017-01-01

    Considering climate warming as an immediate threat for humanity, ecologists from the Eco-modernism movement not only approve but call for the presence of nuclear power in the energy mix. For them nuclear energy is a mature low-carbon energy that can be used to combine all renewable energies more efficiently. NGO like 'Environmental Progress', 'Energy for Humanity' or 'Save the Nukes' back the Eco-modernism movement. The Eco-modernism movement gathers unconventional ecologists who consider that modern technologies by using the eco-system more efficiently than previous technologies did, are a powerful tool to reduce the global impact of humane activities on the biosphere. The Eco-modernism movement is for agricultural intensification, the use of GMO, waste recycling and for increasing urbanization. (A.C.)

  3. Business sustainability performance measurement: Eco-ratio analysis

    Directory of Open Access Journals (Sweden)

    Collins C. Ngwakwe

    2016-12-01

    Full Text Available Eco-aware customers and stakeholders are demanding for a measurement that links environmental performance with other business operations. To bridge this seemingly measurement gap, this paper suggests ‘Eco-Ratio Analysis’ and proposes an approach for conducting eco-ratio analysis. It is argued that since accounting ratios function as a tool for evaluating corporate financial viability by management and investors, eco-ratio analysis should be brought to the fore to provide a succinct measurement about the linkage between environmental performance and conventional business performance. It is hoped that this suggestion will usher in a nuance debate and approach in the teaching, research and practice of environmental management and sustainability accounting

  4. Eco friendly expectations and limitations in daycare

    DEFF Research Database (Denmark)

    Husted, Mia

    This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University ...... College in Denmark. As part of the project they were asked to explore, elaborate and develop new pedagogical actions and perspectives related to future relationships between human beings and our common nature......This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University...

  5. Interference Analysis Status and Plans for Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Kerczewski, Robert J.; Wilson, Jeffrey D.

    2010-01-01

    Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.

  6. Mac OS X Snow Leopard pocket guide

    CERN Document Server

    Seiblod, Chris

    2009-01-01

    Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly. This book goes right to the heart of Snow Leopard, with details on system preferences, built-in applications, and utilities. You'll also find configuration tips, keyboard shortcuts, guides for troubleshooting, lots of step-by-step instructions, and more. Learn about new features and changes s

  7. A Compact Annular Ring Microstrip Antenna for WSN Applications

    Directory of Open Access Journals (Sweden)

    Daihua Wang

    2012-06-01

    Full Text Available A compact annular ring microstrip antenna was proposed for a wireless sensor network (WSN application in the 2.4 GHz band. In this paper the major considerations of the conformal antenna design were the compact size and the impact on antenna’s performance of a steel installation base. By using a chip resistor of large resistance (120 Ω the antenna size was reduced to 38% of that a conventional annular ring patch antenna. With the addition of the steel installation base the resonant frequency of the antenna increases about 4.2% and the bandwidth reduces from 17.5% to 11.7% by adjusting the load resistance simultaneously. Several key parameters were discussed and optimized, and the antenna was fabricated and its performance measured. The antenna is well matched at 2.4 GHz with 34.2 dB return loss and –2.5 dBi peak gain. Meanwhile, it exhibits excellent radiation patterns with very low cross-polarization levels.

  8. Energy Efficient Clustering Protocol to Enhance Performance of Heterogeneous Wireless Sensor Network: EECPEP-HWSN

    Directory of Open Access Journals (Sweden)

    Santosh V. Purkar

    2018-01-01

    Full Text Available Heterogeneous wireless sensor network (HWSN fulfills the requirements of researchers in the design of real life application to resolve the issues of unattended problem. But, the main constraint faced by researchers is the energy source available with sensor nodes. To prolong the life of sensor nodes and thus HWSN, it is necessary to design energy efficient operational schemes. One of the most suitable approaches to enhance energy efficiency is the clustering scheme, which enhances the performance parameters of WSN. A novel solution proposed in this article is to design an energy efficient clustering protocol for HWSN, to enhance performance parameters by EECPEP-HWSN. The proposed protocol is designed with three level nodes namely normal, advanced, and super, respectively. In the clustering process, for selection of cluster head we consider different parameters available with sensor nodes at run time that is, initial energy, hop count, and residual energy. This protocol enhances the energy efficiency of HWSN and hence improves energy remaining in the network, stability, lifetime, and hence throughput. It has been found that the proposed protocol outperforms than existing well-known LEACH, DEEC, and SEP with about 188, 150, and 141 percent respectively.

  9. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    Science.gov (United States)

    2003-04-01

    IP-HORNET, Metropolitan Optical Networks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION...OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500...Gemelos, and L. G. Kazovsky, “CSMA/CA MAC protocols for IP-HORNET: An IP over WDM metropolitan area ring netowrk ,” in Proceedings of GLOBE- COM’00

  10. The A.P.I. ECO Project. Pilot demonstration project in small and medium enterprises implementing the eco-management and audit scheme; Progetto A.P.I.ECO. Azioni pilota in favore dell`attuazione nelle piccole e medie industrie del sistema comunitario di ecogestione e audit

    Energy Technology Data Exchange (ETDEWEB)

    Brunetti, Nicola [ENEA, Centro Ricerche Casaccia, Rome (Italy). Dipt. Ambiente; Casciani, Michele; Galotti, Giorgio; Peruzzi, Augusto [IGEAM Srl, Rome (Italy)

    1997-09-01

    During a 18 months period in 1995/1996 a pilot demonstration project, on behalf of the Commission the European Communities, was undertaken to investigate the experience of 8 small and medium-sized enterprises (SMEs), in Lazio Region, implementing the Eco-management and audit scheme (EMAS). The promoters of A.P.I.ECO project are: IGEAM Srl (environmental consulting company); ENEA (the National Agency for New Technology, Energy and the Environment) and FEDERLAZIO (Regional SMEs association). The principal direct targets of the project have been: backing up 8 SMEs of different sectors and characteristics, by conducting a deep initial environmental review and implementing the EMAS, with the goal of leading them to the environmental certification according to the 1836/93 EC Regulation; preparation and utilization of guidelines, procedures and protocols for the several steps of EMAS; promoting and divulgating principles and techniques of environmental management and eco-auditing, as much as possible, especially on a regional scale via SMEs association; training and opportunity of a practical experience of environmental analysis and auditing in SMEs to a large group of technicians of different backgrounds in the environmental field. A step by step procedure program was utilized for implementing EMAS in the 8 SMEs: environmental review; policy, objectives and programmes; environmental management system (Organization and Personnel, Environmental Management Manual, Operating Systems and Controls and Register of Environmental Effects and Regulation, Environmental Audit); Environmental statement. The project has been completed with the drafting of guideline for environmental statement for each of the 8 companies and the disseminating the results achieved.

  11. ECO-INDUSTRIAL PARK - A TOOL FOR SUSTAINABLE DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    BUGNAR NICOLETA GEORGETA

    2013-07-01

    Full Text Available Local communities embracing the concept of Eco-industrial park are looking for some additional benefits for all the interested parties – both public and private: higher economic efficiency, the increase of competitivity by applying last minute technologies, generation of additional revenues through positive regulations at the community level, the creation of jobs, solving the conflict between economy and environment, diminishing the demand on the county infrastructure, decreasing the effects of pollution, using energy from regenerating sources and replacement materials. Communities and enterprises creating Eco-industrial parks will have common grounds for industrial development, which is much more competitive, more efficient and much cleaner than traditional industrial parks. Moreover, the new business niches will be open to recruitment or new incubators. Eco-industrial parks represent a special category compared to industrial parks, a category which is different from the classical ones due to the fact that they are designed in such a way so that they promote the collaboration between companies in order to reuse recyclable materials and green energy sources. A long-term vision must reflect the focus on the creation of collaboration networks between firms and the fact that an Eco-industrial park should be a business community, not only a mathematical sum of companies located in the same geographical area. The quality, continuity and interconnection of economic flows within the firms of an Eco-industrial park are important characteristics for the success of Eco-industrial networks. The following discussion tackles the way in which an Eco-industrial park is set-up: creating and implementing an Eco-industrial park in accordance with the principles of circular economy or transforming an already existing industrial park into an Eco- industrial park. The quality, the continuity, the number of interconnected firms, the flows of resources and the

  12. ECOS: sorption, dose, consumption and miscellaneous data values

    International Nuclear Information System (INIS)

    Kane, P.

    1984-10-01

    This report describes the nature of the data stored within the program ECOS, lists the values currently used and references the sources used. Also included are the element-specific equilibrium distribution coefficients (Ksub(D)) which are held in a data file external to ECOS. Nuclide-specific decay constants and dose factors are presented, as are certain plant- and animal-specific data not included in external files. Several miscellaneous items of data stored within ECOS are described. None of the data stored within ECOS are accessible to the user. (author)

  13. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  14. Optimization of some eco-energetic systems

    International Nuclear Information System (INIS)

    Purica, I.; Pavelescu, M.; Stoica, M.

    1976-01-01

    An optimization problem of two eco-energetic systems is described. The first one is close to the actual eco-energetic system in Romania, while the second is a new one, based on nuclear energy as primary source and hydrogen energy as secondary source. The optimization problem solved is to find the optimal structure of the systems so that the objective functions adopted, namely unitary energy cost C and total pollution P, to be minimum at the same time. The problem can be modelated with a bimatrix cooperative mathematical game without side payments. We demonstrate the superiority of the new eco-energetic system. (author)

  15. Shedding Light on Eco-Innovation in Tourism: A Critical Analysis

    Directory of Open Access Journals (Sweden)

    Maria-del-Mar Alonso-Almeida

    2016-12-01

    Full Text Available The recent global increase in the competitiveness of tourism has made the implementation of eco-innovations a differentiating element among both the destinations and companies in the sector, with quality management and contribution to sustainable development being increasingly valued. However, the eco-innovations that have been developed and implemented in tourist industries have rarely been studied. In this study, the eco-innovations that have been developed and implemented by 57 tourism businesses worldwide are analysed. The identified eco-innovations are classified by using different qualitative methodologies. The obtained results shed light on the limited development of eco-innovations in the tourism industry and the industry focuses mainly on product eco-innovations. Several examples by the tourist sub-industry and types of eco-innovation are analysed. Furthermore, this study provides practical information about measures that both businesses and governmental organisations can adopt to promote eco-innovation in the sector.

  16. Monitoring of ph, redox and turbidity in a water treatment plant using WSN with ZIGBEE technology

    Directory of Open Access Journals (Sweden)

    Gerson Fonseca-Gonzaléz

    2014-05-01

    Full Text Available This paper presents the design of a WSN using Zigbee technology (Standart IEEE 802.15.4, With the help of the XBee of Maxtream modules the communication is carried out between a remote water treatment plant towards a ccordinator node. The acqired data are entered to a microcontroller which takes care of the processing to be able to transmit and visualized under a graphical user interface in Matlab

  17. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  18. Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics

    Science.gov (United States)

    Wilson, Jeffrey D.

    2012-01-01

    AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.

  19. Field dynamic testing on a Cyprus concrete highway bridge using Wireless Sensor Network (WSN)

    Science.gov (United States)

    Votsis, Renos A.; Kyriakides, Nicholas; Tantele, Elia A.; Chrysostomou, Christis Z.; Onoufriou, Toula

    2014-08-01

    The aims of the bridge management authorities are to ensure that bridges fulfil their purpose and functionality during their design life. So, it is important to identify and quantify the deterioration of the structural condition early so that a timely application of an intervention will avoid more serious problems and increased costs at a later stage. A measure to enhance the effectiveness of the existing structural evaluation by visual inspection is instrumental monitoring using sensors. The activities performed in this process belong to the field of Structural Health Monitoring (SHM). The SHM offers opportunities for continuous or periodic monitoring on bridges and technological advances allow nowadays the employment of wireless sensors networks (WSN) for this task. A SHM application using WSN was implemented on a multi-span reinforced concrete (RC) highway bridge in Limassol with the objective to study its dynamic characteristics and performance. Part of the specific bridge will be replaced and this offered a unique opportunity for measurements before and after construction so that apparent changes in the dynamic characteristics of the bridge will be identified after the repairing work. The measurements provided indications on the frequencies and mode shapes of the bridge and the response amplitude during the passing of traffic. The latter enabled the investigation of the dependency of the bridge's structural damping to the amplitude of vibration induced by the passing of traffic. The results showed that as the excitation increases the magnitude of modal damping increases as well.

  20. An Improvement over PBOA MAC Protocol by Considering Link Quality in MANET

    OpenAIRE

    Shariati, Nafiseh; Shirazinia, Amirpasha

    2008-01-01

    We propose a methodology for improving theperformance of Progressive Back Off Algorithm (PBOA)which is a protocol that performs medium access controljointly with power control in Ad-hoc networks.Our method selects the optimum SNR thresholds based onlink quality. It adjusts the role of nodes’ mobility in network throughput. Simulation results show that the improvedprotocol outperforms PBOA without adaptation taken from link quality. Qc 20120131

  1. Enabling Eco-Friendly Choices by Relying on the Proportional-Thinking Heuristic

    Directory of Open Access Journals (Sweden)

    Cleotilde Gonzalez

    2013-01-01

    Full Text Available Ecological (eco taxes are promising mechanisms to enable eco-friendly decisions, but few people prefer them. In this study, we present a way in which eco-tax options may be communicated to general public to encourage their payment. Our implementation (called “information presentation” takes advantage of the non-linear relationship between eco-tax payments and CO2 emissions and the human reliance on the proportional-thinking heuristic. According to the proportional-thinking heuristic, people are likely to prefer a small eco-tax increase and judge larger eco-tax increases to cause proportionally greater CO2 emissions reductions. In an online study, participants were asked to choose between eco-tax increases in two problems: In one, a smaller eco-tax increase resulted in greater CO2 emissions reduction, while in the other, a smaller tax increase resulted in lesser CO2 emissions reduction. Although the larger eco-tax increase did not reduce CO2 emissions the most, across both problems, people judged larger eco-tax increases to cause proportionally greater reductions in CO2 emissions and preferred smaller tax increases. Thus, eco-tax policies would benefit by presenting information in terms of eco-tax increases, such that smaller eco-tax increases (which are more attractive and are likely to be chosen by people cause greater CO2 emissions reductions.

  2. A MacWilliams Identity for Convolutional Codes: The General Case

    OpenAIRE

    Gluesing-Luerssen, Heide; Schneider, Gert

    2008-01-01

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality appearing in the literature on convolutional coding theory.

  3. Evaluating Eco-Innovation of OECD Countries with Data Envelopment Analysis

    Science.gov (United States)

    Mavi, Reza Kiani; Standing, Craig

    2016-01-01

    Government regulations require businesses to improve their processes and products/services in a green and sustainable manner. For being environmentally friendly, businesses should invest more on eco-innovation practices. Firms eco-innovate to promote eco-efficiency and sustainability. This paper evaluates the eco-innovation performance of…

  4. ENTREPRENEURIAL ECO-SYSTEMS & REGIONAL ALLIANCES

    Directory of Open Access Journals (Sweden)

    Joe ENGLISH

    2015-05-01

    Full Text Available The study of universities and their role in enterprise development, support and education is very mature. However when Isenberg coined the term ‘entrepreneurial ecosystem’ and suggested that higher education was one of the key foundation blocks of a regional eco-system it threw open the concept of the university having a wider role in the overall business, economic and civic life of a region. What is this wider role, and how do the universities themselves view their place in this evolving entrepreneurial eco-system? How do they fit into Regional Alliances set up to build regional economic development? This paper introduces two pilot Alliances that have been recently formed using both the education institutes and the wider eco-system to drive Innovation and Graduate Employability (The SHIP and REAL Alliances.

  5. Triple helix interactions for eco-innovation

    DEFF Research Database (Denmark)

    Hermann, Roberto Rivas; Riisgaard, Henrik; Remmen, Arne

    the role of science parks in promoting eco-innovation. This study uses qualitative data gathered in two units of analysis: Panama Canal Authority and City of Knowledge Science Park. The study examines how Triple Helix interactions have built the regional system of eco-innovation at the Panama Canal...

  6. Evaluación de las topologías físicas de redes WSN para la medición de variables ambientales

    Directory of Open Access Journals (Sweden)

    S. F. Saigua Carvajal

    2015-12-01

    Full Text Available En este trabajo se presenta un estudio comparativo entre las topologías físicas que apoyan WSN con el fin de determinar la más eficaz aplicado a una red inalámbrica de sensores ambientales. La investigación se realizó mediante el apoyo del Network Simulator 2 (NS-2, que permite crear un entorno similar al real y simulado su funcionamiento, para determinar la mejor topología de un método inductivo se aplicó para evaluar los datos de NS-2 que se basaron en las métricas de rendimiento, tales como: el envío de paquetes, el consumo de energía y la cobertura. Como resultado se obtuvo que la topología física estrella es la mejor manera de aplicar una red WSN para las mediciones ambientales, que tiene una relación de Entrega de paquetes del 97,9%, el rendimiento de 0,7542 Kbps, un retraso de 0,0162 ms, un consumo de energía bajo y una mayor área de cobertura del sensor.   Abstract This paper presents a comparative study between physical topologies that support WSN in order to determine the most efficient applied to a wireless network of environmental sensors. The research was performed by the support of Network Simulator 2 (NS-2, it allows to create an environment similar to real and simulated its operation, to determine the best topology an inductive method was applied to evaluate the data from NS-2 that were based on the performance metrics such as: sending packages, energy consumption and coverage. As a result it was obtained that the star physical topology is the best to implement a WSN network for environmental measurements, that has Packet Delivery Ratio of 97,9 %, Throughput of 0,7542 Kbps, a delay of 0,0162 ms, a low energy consumption and a greater sensor coverage area.

  7. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  8. SUSTAINABLE ECONOMIC GROWTH AND ECO-EFFICIENCY

    Directory of Open Access Journals (Sweden)

    Mariana\tLUPAN

    2015-06-01

    Full Text Available The current economic and social contexts have brought forth the issues regarding growth and sustainability. The concept of growth has always been linked to an increase in consumption levels, and this inevitably led to pressures on the environment and on the resources that support human activity. Given these circumstances, the question whether we can avoid an environmental disaster while maintaining economic growth, has become more stringent. We chose to approach this aspect by examining the concept of eco-efficiency, a concept that embodies aspects of both economic efficiency and environmental efficiency. Eco-efficiency can be regarded as the effectiveness with which resources are used in order to create products and services that satisfy human needs. Based on this idea, the last decade has produced an increasing number of studies on eco-efficiency and how it can be measured and implemented in the production of goods and services, but also in the field regarding demand patterns. An analysis regarding the aspects of eco-efficiency at the macro level of the Romanian economy is in line with the current environmental concerns, thus I have chosen to cover these questions, as well as the evolution of the locale economy towards a more sustainable development. The outcome of the examined aspects shows that, in spite of an increase in eco-efficiency levels, energy and material consumption and emissions have increased. This raises the question if measuring economic and environmental efficiency by reporting to the GDP value is becoming obsolete and if there is a need to revaluate eco-efficiency indicators in order to measure the transition to a greener and more sustainable development from different points of view.

  9. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs

    Directory of Open Access Journals (Sweden)

    Dinesh Shetty

    2014-12-01

    Full Text Available Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs. A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria.

  10. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs)

    Science.gov (United States)

    Shetty, Dinesh; Kim, Yong Joon; Shim, Hyunsuk; Snyder, James P.

    2015-01-01

    Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs). A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK) profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria. PMID:25547726

  11. EcoMark: Evaluating Models of Vehicular Environmental Impact

    DEFF Research Database (Denmark)

    Guo, Chenjuan; Ma, Mike; Yang, Bin

    2012-01-01

    The reduction of greenhouse gas (GHG) emissions from transporta- tion is essential for achieving politically agreed upon emissions re- duction targets that aim to combat global climate change. So-called eco-routing and eco-driving are able to substantially reduce GHG emissions caused by vehicular...... the vehicle travels in. We develop an evaluation framework, called EcoMark, for such environmental impact models. In addition, we survey all eleven state-of-the-art impact models known to us. To gain insight into the capabilities of the models and to understand the effectiveness of the EcoMark, we apply...

  12. Water mediated eco-friendly green protocol for one-pot synthesis of ...

    Indian Academy of Sciences (India)

    the synthesis of important products, we describe here a simple, elegant and high yielding protocol for the syn- thesis of α-aminophosphonates in ..... In order to prove the involvement of water in the reac- tion mechanism unambiguously, the ...

  13. Eco-Material Selection for Auto Bodies

    Energy Technology Data Exchange (ETDEWEB)

    Mayyas, Ahmad T [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Omar, Mohammed [Masdar Institute of Science & Technology; Hayajneh, Mohammed T. [Jordan University of Science and Technology

    2017-09-25

    In the last decades, majority of automakers started to include lightweight materials in their vehicles to meet hard environmental regulations and to improve fuel efficiency of their vehicles. As a result, eco-material selection for vehicles emerged as a new discipline under design for environment. This chapter will summarize methods of eco-material selections for automotive applications with more emphasis into auto-bodies. A set of metrics for eco-material selection that takes into account all economic, environmental and social factors will be developed using numerical and qualitative methods. These metrics cover products' environmental impact, functionality and manufacturability, in addition to the economic and societal factors.

  14. Visualization of integrin Mac-1 in vivo.

    Science.gov (United States)

    Lim, Kihong; Hyun, Young-Min; Lambert-Emo, Kris; Topham, David J; Kim, Minsoo

    2015-11-01

    β2 integrins play critical roles in migration of immune cells and in the interaction with other cells, pathogens, and the extracellular matrix. Among the β2 integrins, Mac-1 (Macrophage antigen-1), composed of CD11b and CD18, is mainly expressed in innate immune cells and plays a major role in cell migration and trafficking. In order to image Mac-1-expressing cells both in live cells and mouse, we generated a knock-in (KI) mouse strain expressing CD11b conjugated with monomeric yellow fluorescent protein (mYFP). Expression of CD11b-mYFP protein was confirmed by Western blot and silver staining of CD11b-immunoprecipitates and total cell lysates from the mouse splenocytes. Mac-1-mediated functions of the KI neutrophils were comparable with those in WT cells. The fluorescence intensity of CD11b-mYFP was sufficient to image CD11b expressing cells in live mice using intravital two-photon microscopy. In vitro, dynamic changes in the intracellular localization of CD11b molecules could be measured by epifluorescent microscopy. Finally, CD11b-expressing immune cells from tissue were easily detected by flow cytometry without anti-CD11b antibody staining. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. MAC Version 3.2, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Conversion to 4.0 ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The test primarily concentrated on verifying that MAC and MBA software would run properly in the Paradox 4.0 environment. Changes in the MAC and MBA programs were basically limited to superficial items needed to accommodate the enhanced method of execution

  16. Umberto Eco : olemise piire kombates / Marina Grishakova

    Index Scriptorium Estoniae

    Grišakova, Marina, 1961-

    2004-01-01

    Arvustus: Eco, Umberto. Eilse päeva saar / tõlkinud Merike Pau. Tallinn : Eesti Raamat, 2003 ; Eco, Umberto. Baudolino / itaalia keelest tõlkinud [ja järelsõna:] Ülar Ploom. Tallinn : Varrak, 2003

  17. Geochemistry and petrography of the MacAlpine Hills lunar meteorites

    Science.gov (United States)

    Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.

    1991-01-01

    MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).

  18. Paradox applications integration ATP's for MAC and mass balance programs

    International Nuclear Information System (INIS)

    Russell, V.K.; Mullaney, J.E.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system were set up to run under one common applications program. This Acceptance Test Plan (ATP) describes how the code was to be tested to verify its correctness. The scope of the tests is minimal, since both MAC and MBA have already been tested in detail as stand-alone programs

  19. Eco2 Cities : Ecological Cities as Economic Cities

    OpenAIRE

    Suzuki, Hiroaki; Dastur, Arish; Moffatt, Sebastian; Yabuki, Nanae; Maruyama, Hinako

    2010-01-01

    This book provides an overview of the World Bank's Eco2 cities : ecological cities as economic cities initiative. The objective of the Eco2 cities initiative is to help cities in developing countries achieve a greater degree of ecological and economic sustainability. The book is divided into three parts. Part one describes the Eco2 cities initiative framework. It describes the approach, be...

  20. An Interview with Peter MacDonald.

    Science.gov (United States)

    American Indian Journal, 1979

    1979-01-01

    Peter MacDonald, Chairman of the Navajo Nation, the largest tribe in the United States speaks to such issues as energy development/management, oil companies, Navajo-Hopi relocation legislation, traditionalism, and the role of the Council of Energy Resource Tribes. (RTS)

  1. Snapshots from a leading eco-city

    DEFF Research Database (Denmark)

    Mehlsen, Camilla

    2009-01-01

    The government of Singapore wants to make Singapore the leading Eco-city in Asia. Professor Kim Chuan Goh explains why this might be an achievable goal.......The government of Singapore wants to make Singapore the leading Eco-city in Asia. Professor Kim Chuan Goh explains why this might be an achievable goal....

  2. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ranjeeth Kumar Sundararajan

    2015-01-01

    Full Text Available In wireless sensor network (WSN, the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

  3. Proposal for the Evaluation of Eco-Efficient Concrete

    Directory of Open Access Journals (Sweden)

    Taehyoung Kim

    2016-07-01

    Full Text Available The importance of environmental consequences due to diverse substances that are emitted during the production of concrete is recognized, but environmental performance tends to be evaluated separately from the economic performance and durability performance of concrete. In order to evaluate concrete from the perspective of sustainable development, evaluation technologies are required for comprehensive assessment of environmental performance, economic performance, and durability performance based on a concept of sustainable development called the triple bottom line (TBL. Herein, an assessment method for concrete eco-efficiency is developed as a technique to ensure the manufacture of highly durable and eco-friendly concrete, while minimizing both the load on the ecological environment and manufacturing costs. The assessment method is based on environmental impact, manufacturing costs, and the service life of concrete. According to our findings, eco-efficiency increased as the compressive strength of concrete increased from 21 MPa to 40 MPa. The eco-efficiency of 40 MPa concrete was about 50% higher than the eco-efficiency of 24 MPa concrete. Thus eco-efficiency is found to increase with an increasing compressive strength of concrete because the rate of increase in the service life of concrete is larger than the rate of increase in the costs. In addition, eco-efficiency (KRW/year was shown to increase for all concrete strengths as mixing rates of admixtures (Ground Granulated Blast furnace Slag increased to 30% during concrete mix design. However, when the mixing rate of admixtures increased to 40% and 60%, the eco-efficiency dropped due to rapid reduction in the service life values of concrete to 74 (year/m3 and 44 (year/m3, respectively.

  4. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  5. Teaching a Classic for All Ages: Fairy Tales and Stories of George MacDonald.

    Science.gov (United States)

    Sadler, Glenn Edward

    1995-01-01

    Discusses the life and writings of George MacDonald (1824-1905). Suggests that the most striking feature of MacDonald's children's books is his sensitivity toward spiritual values and the power of change within the lives of his characters. Appends a list of questions to stimulate student response to MacDonald's writings. (RS)

  6. Are hamburgers harmless? : the Big Mac Index in the twenty-first century

    OpenAIRE

    Soo, Kwok Tong

    2016-01-01

    We make use of The Economist’s Big Mac Index (BMI) to investigate the Law of One Price (LOP) and whether the BMI can be used to predict future exchange rate and price changes. Deviations from Big Mac parity decay quickly, in approximately 1 year. The BMI is a better predictor of relative price changes than of exchange rate changes, and performs best when predicting a depreciation of a currency relative to the US dollar. Convergence to Big Mac parity occurs more rapidly for currencies with som...

  7. GENETIC FINGERPRINTING OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS ISOLATED FROM HOSPITAL PATIENTS AND THE ENVIRONMENT

    Science.gov (United States)

    A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...

  8. Eco-design pilot project in China - Monsoon offer 2 upgrade

    Science.gov (United States)

    Thai, Roselyne; Liu, Guoguo

    2017-11-01

    During COP21, Schneider Electric has committed that 100% of our new products would be eco-designed to tackle climate change. Launched in 2015, this initiative ecoDesign WayTM was tested on some pilot projects. This project covers the first ecoDesign WayTM pilot in China on an overvoltage or under voltage protective device used in both residential and industrial sectors, called Monsoon. Under the name ecoDesign WayTM, a method and a process have been deployed. The 3 main ecoDesign WayTM phases are: phase 1 - Marketing & Technique handshake, Phase 2 - ecoDesign WayTM follow-up and Phase 3 - Marketing communication. During the project, EIME from Bureau Veritas CODDE and ecoDesign WayTM scorecard from EVEA consulting are two core tools for eco-design implementation. They are respectively used for life cycle assessment and eco-design performance comparison. Thanks to the approach, compared to previous range, pollution emissions and resource depletion along the whole life cycle of product have decreased (reduction of 55% for energy depletion and 85% for water depletion). Global warming potential has dramatically decreased by 98.4% and air pollution by 33%. Meanwhile, the recycling rate has been improved by 18%, and recycled PA is used. The ecoDesign WayTM scorecard is stored as referent document for any customer request. Moreover, customers can access RoHS certificate, REACh declaration, PEP and EoLI in Check a product, an online environmental data repository, available 24/7.

  9. MacIntyre, Managerialism and Universities

    Science.gov (United States)

    Stolz, Steven A.

    2017-01-01

    MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…

  10. Eco Logic signs deal to destroy Japanese PCB stocks

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    According to a recent announcement, Eco Logic of Rockwood, Ontario, has entered into a partnership with the Japanese companies Tokyo Boeki and Nippon Sharyo for the destruction of stockpiled PCB materials in Japan, using Eco Logic's non-incineration technology. The deal is reported to be worth about $50 million in revenues to Eco Logic, spread over the next few years. The agreement includes provisions for the Japanese companies to purchase, or manufacture under licence, a number of Eco Logic's gas phase chemical reduction processing units to serve the Japanese market. In exchange for exclusive rights to the Japanese market, Eco Logic will receive license fees and royalties of up to nine per cent for the use of its process. Eco Logic is currently building a demonstration unit under contract with the two Japanese companies. The Japanese PCB waste destruction market is estimated to be worth as much as $400 million. Incineration, the conventional form of disposal, is strongly opposed by local governments

  11. Millisecond timing on PCs and Macs.

    Science.gov (United States)

    MacInnes, W J; Taylor, T L

    2001-05-01

    A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.

  12. MAP, MAC, and vortex-rings configurations in the Weinberg-Salam model

    Science.gov (United States)

    Teh, Rosy; Ng, Ban-Loong; Wong, Khai-Ming

    2015-11-01

    We report on the presence of new axially symmetric monopoles, antimonopoles and vortex-rings solutions of the SU(2)×U(1) Weinberg-Salam model of electromagnetic and weak interactions. When the ϕ-winding number n = 1, and 2, the configurations are monopole-antimonopole pair (MAP) and monopole-antimonopole chain (MAC) with poles of alternating sign magnetic charge arranged along the z-axis. Vortex-rings start to appear from the MAP and MAC configurations when the winding number n = 3. The MAP configurations possess zero net magnetic charge whereas the MAC configurations possess net magnetic charge of 4 πn / e. In the MAP configurations, the monopole-antimonopole pair is bounded by the Z0 field flux string and there is an electromagnetic current loop encircling it. The monopole and antimonopole possess magnetic charges ± 4πn/e sin2θW respectively. In the MAC configurations there is no string connecting the monopole and the adjacent antimonopole and they possess magnetic charges ± 4 πn/e respectively. The MAC configurations possess infinite total energy and zero magnetic dipole moment whereas the MAP configurations which are actually sphalerons possess finite total energy and magnetic dipole moment. The configurations were investigated for varying values of Higgs self-coupling constant 0 ≤ λ ≤ 40 at Weinberg angle θW = π/4.

  13. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  14. Windowsista Mac-maailmaan

    OpenAIRE

    Sirkiä, Noora-Maria

    2010-01-01

    Nykyään yhä useampi harkitsee erilaisista syistä käyttöjärjestelmän vaihtamista tutusta Windowsista johonkin muuhun käyttöjärjestelmään. Applen Macintosh-tietokoneiden mukana tuleva Mac OS X -käyttöjärjestelmä on hyvä vaihtoehto Windowsille. Ihmiset siirtyvät siihen mm. tietoturvaseikkojen, luotettavuuden, ohjelmiston sekä Applen koneiden ja käyttöjärjestelmän ulkomuodon takia. Microsoftin tuotteista ei myöskään tarvitse luopua kokonaan, sillä monista tutuista Microsoftin ohjelmista (esim. Mi...

  15. TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal Saud Yousef

    2011-07-31

    We propose TMAC, a timestamp-ordered MAC protocol for Wireless Mesh Networks (WMNs). TMAC extends CSMA/CA by scheduling data packets based on their age. Prior to transmitting a data packet, a transmitter broadcasts a request control message appended with a timestamp to a selected list of neighbors. It can proceed with the transmission only if it receives a sufficient number of grant control messages from these neighbors. A grant message indicates that the associated data packet has the lowest timestamp of all the packets pending transmission at the local transmit queue. We demonstrate that a loose ordering of timestamps among neighboring nodes is sufficient for enforcing local fairness, subsequently leading to flow rate fairness in a multi-hop WMN. We show that TMAC can be implemented using the control frames in IEEE 802.11 stack, and thus can be easily integrated in existing 802.11-based WMNs. Our simulation results show that TMAC achieves excellent resource allocation fairness while maintaining over 90% of maximum link capacity in parking lot and large grid topologies.

  16. Who needs cream and sugar when there is eco-labeling? Taste and willingness to pay for "eco-friendly" coffee.

    Science.gov (United States)

    Sörqvist, Patrik; Hedblom, Daniel; Holmgren, Mattias; Haga, Andreas; Langeborg, Linda; Nöstl, Anatole; Kågström, Jonas

    2013-01-01

    Participants tasted two cups of coffee, decided which they preferred, and then rated each coffee. They were told (in lure) that one of the cups contained "eco-friendly" coffee while the other did not, although the two cups contained identical coffee. In Experiments 1 and 3, but not in Experiment 2, the participants were also told which cup contained which type of coffee before they tasted. The participants preferred the taste of, and were willing to pay more for, the "eco-friendly" coffee, at least those who scored high on a questionnaire on attitudes toward sustainable consumer behavior (Experiment 1). High sustainability consumers were also willing to pay more for "eco-friendly" coffee, even when they were told, after their decision, that they preferred the non-labeled alternative (Experiment 2). Moreover, the eco-label effect does not appear to be a consequence of social desirability, as participants were just as biased when reporting the taste estimates and willingness to pay anonymously (Experiment 3). Eco labels not only promote a willingness to pay more for the product but also lead to a more favorable perceptual experience of it.

  17. Who needs cream and sugar when there is eco-labeling? Taste and willingness to pay for "eco-friendly" coffee.

    Directory of Open Access Journals (Sweden)

    Patrik Sörqvist

    Full Text Available Participants tasted two cups of coffee, decided which they preferred, and then rated each coffee. They were told (in lure that one of the cups contained "eco-friendly" coffee while the other did not, although the two cups contained identical coffee. In Experiments 1 and 3, but not in Experiment 2, the participants were also told which cup contained which type of coffee before they tasted. The participants preferred the taste of, and were willing to pay more for, the "eco-friendly" coffee, at least those who scored high on a questionnaire on attitudes toward sustainable consumer behavior (Experiment 1. High sustainability consumers were also willing to pay more for "eco-friendly" coffee, even when they were told, after their decision, that they preferred the non-labeled alternative (Experiment 2. Moreover, the eco-label effect does not appear to be a consequence of social desirability, as participants were just as biased when reporting the taste estimates and willingness to pay anonymously (Experiment 3. Eco labels not only promote a willingness to pay more for the product but also lead to a more favorable perceptual experience of it.

  18. Development of Eco-Industry Sector

    OpenAIRE

    Mariana Ioviţu

    2012-01-01

    Measures to encourage development of Eco-industries represent an important part of the programs of many countries; analyses of different international organisms reveal a series of advantages of this sector for economy. According to OCDE “The environmental goods and services industry consists of activities which produce goods and services to measure, prevent, limit, minimize or correct environmental damage to water, air and soil, as well as problems related to waste, noise and Eco-systems”. Th...

  19. DCE: A Distributed Energy-Efficient Clustering Protocol for Wireless Sensor Network Based on Double-Phase Cluster-Head Election.

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; Wang, Yipeng; You, Kaiming

    2017-05-01

    Clustering is an effective technique used to reduce energy consumption and extend the lifetime of wireless sensor network (WSN). The characteristic of energy heterogeneity of WSNs should be considered when designing clustering protocols. We propose and evaluate a novel distributed energy-efficient clustering protocol called DCE for heterogeneous wireless sensor networks, based on a Double-phase Cluster-head Election scheme. In DCE, the procedure of cluster head election is divided into two phases. In the first phase, tentative cluster heads are elected with the probabilities which are decided by the relative levels of initial and residual energy. Then, in the second phase, the tentative cluster heads are replaced by their cluster members to form the final set of cluster heads if any member in their cluster has more residual energy. Employing two phases for cluster-head election ensures that the nodes with more energy have a higher chance to be cluster heads. Energy consumption is well-distributed in the proposed protocol, and the simulation results show that DCE achieves longer stability periods than other typical clustering protocols in heterogeneous scenarios.

  20. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.