WorldWideScience

Sample records for zigbee-based mobile ad

  1. The Embedded Smart Home Control System Based on GPRS and Zigbee

    Directory of Open Access Journals (Sweden)

    Zhang Wanli

    2015-01-01

    Full Text Available With the development of the Internet of Things and mobile Internet, smart home appeared a new opportunity, the development of wireless communication, ad-hoc network technique, high reliable connection, large scale networking, repair itself as a new developing direction of smart home. This paper discussed hardware and software design of the embedded smart home control system based on GPRS transmission network and Zigbee technology. This paper also expounds the composition structure and working principle of the system. Through the Zigbee technology to realize the ad-hoc network among the main controller and Zigbee terminal nodes, realizes the branch node information acquisition and command transmission. Through the GPRS network mobile client can realize information collection and remote monitoring of household facilities.

  2. Design of Zigbee-Based Wireless Sensor suitable for Radiation Detection and Monitoring

    International Nuclear Information System (INIS)

    Madian, A.A.

    2012-01-01

    This paper presents a design for a wireless sensor nuclear radiation monitoring and detection based on Zigbee. The system consists of transmitter and receiver modules. The wireless sensor installed at transmitter whiles the receiver processing data. The communication between Tx and Rx done through Zigbee module using the protocol of CSMA/CA. The Zigbee has the advantages of reliable, power-efficient, and low-latency communications between low-cost Tx/Rx.The wireless sensor implementation can easily be deployed to discover unusual or abnormal radioactivity. The sensors are convenient to be installed indoors or outdoors, as well as to be mounted on mobile equipment's. All wireless nuclear detection sensors are designed using micro controller and other integrated systems

  3. Nuclear data transmission based on zigbee

    International Nuclear Information System (INIS)

    Cui Yan; Fang Fang; Chen Wei; Jiang Zancheng

    2007-01-01

    Zigbee, a new wireless communication protocol, which is an important technology supporting wireless sensor networks. We introduce a solution of nuclear data transmission based on zigbee, the cc2420 build up the core of the data acquisition module and the wireless transceive module, and realized remote monitor and nuclear data quickly analysis. (authors)

  4. Exploration and design of smart home circuit based on ZigBee

    Science.gov (United States)

    Luo, Huirong

    2018-05-01

    To apply ZigBee technique in smart home circuit design, in the hardware design link of ZigBee node, TI Company's ZigBee wireless communication chip CC2530 was used to complete the design of ZigBee RF module circuit and peripheral circuit. In addition, the function demand and the overall scheme of the intelligent system based on smart home furnishing were proposed. Finally, the smart home system was built by combining ZigBee network and intelligent gateway. The function realization, reliability and power consumption of ZigBee network were tested. The results showed that ZigBee technology was applied to smart home system, making it have some advantages in terms of flexibility, scalability, power consumption and indoor aesthetics. To sum up, the system has high application value.

  5. ZIL: An Energy-Efficient Indoor Localization System Using ZigBee Radio to Detect WiFi Fingerprints

    OpenAIRE

    Niu, Jianwei; Wang, Bowei; Shu, Lei; Duong, Trung Q.; Chen, Yuanfang

    2015-01-01

    In existing WiFi-based localization methods, smart mobile devices consume quite a lot of power as WiFi interfaces need to be used for frequent AP scanning during the localization process. In this work, we design an energy-efficient indoor localization system called ZigBee assisted indoor localization (ZIL) based on WiFi fingerprints via ZigBee interference signatures. ZIL uses ZigBee interfaces to collect mixed WiFi signals, which include non-periodic WiFi data and periodic beacon signals. Ho...

  6. A Novel Fuzzing Method for Zigbee Based on Finite State Machine

    OpenAIRE

    Baojiang Cui; Shurui Liang; Shilei Chen; Bing Zhao; Xiaobing Liang

    2014-01-01

    With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier test records, the majority of defects were exposed due to a series of testing cases. However, the context of malformed inputs is not taken account into the previous algorithms. In this paper, we propose a refined structure-based fuzzing algorithm for Zigbee based on FSM, FSM-fuzzing. Any malformed input in FSM-Fuzzing is injected to the t...

  7. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  8. Design of Remote Monitoring System of Irrigation based on GSM and ZigBee Technology

    Science.gov (United States)

    Xiao xi, Zheng; Fang, Zhao; Shuaifei, Shao

    2018-03-01

    To solve the problems of low level of irrigation and waste of water resources, a remote monitoring system for farmland irrigation based on GSM communication technology and ZigBee technology was designed. The system is composed of sensors, GSM communication module, ZigBee module, host computer, valve and so on. The system detects and closes the pump and the electromagnetic valve according to the need of the system, and transmits the monitoring information to the host computer or the user’s Mobile phone through the GSM communication network. Experiments show that the system has low power consumption, friendly man-machine interface, convenient and simple. It can monitor agricultural environment remotely and control related irrigation equipment at any time and place, and can better meet the needs of remote monitoring of farmland irrigation.

  9. Design of smart home gateway based on Wi-Fi and ZigBee

    Science.gov (United States)

    Li, Yang

    2018-04-01

    With the increasing demand for home lifestyle, the traditional smart home products have been unable to meet the needs of users. Aim at the complex wiring, high cost and difficult operation problems of traditional smart home system, this paper designs a home gateway for smart home system based on Wi-Fi and ZigBee. This paper first gives a smart home system architecture base on cloud server, Wi-Fi and ZigBee. This architecture enables users to access the smart home system remotely from Internet through the cloud server or through Wi-Fi at home. It also offers the flexibility and low cost of ZigBee wireless networking for home equipment. This paper analyzes the functional requirements of the home gateway, and designs a modular hardware architecture based on the RT5350 wireless gateway module and the CC2530 ZigBee coordinator module. Also designs the software of the home gateway, including the gateway master program and the ZigBee coordinator program. Finally, the smart home system and home gateway are tested in two kinds of network environments, internal network and external network. The test results show that the designed home gateway can meet the requirements, support remote and local access, support multi-user, support information security technology, and can timely report equipment status information.

  10. The design of the CMOS wireless bar code scanner applying optical system based on ZigBee

    Science.gov (United States)

    Chen, Yuelin; Peng, Jian

    2008-03-01

    The traditional bar code scanner is influenced by the length of data line, but the farthest distance of the wireless bar code scanner of wireless communication is generally between 30m and 100m on the market. By rebuilding the traditional CCD optical bar code scanner, a CMOS code scanner is designed based on the ZigBee to meet the demands of market. The scan system consists of the CMOS image sensor and embedded chip S3C2401X, when the two dimensional bar code is read, the results show the inaccurate and wrong code bar, resulted from image defile, disturber, reads image condition badness, signal interference, unstable system voltage. So we put forward the method which uses the matrix evaluation and Read-Solomon arithmetic to solve them. In order to construct the whole wireless optics of bar code system and to ensure its ability of transmitting bar code image signals digitally with long distances, ZigBee is used to transmit data to the base station, and this module is designed based on image acquisition system, and at last the wireless transmitting/receiving CC2430 module circuit linking chart is established. And by transplanting the embedded RTOS system LINUX to the MCU, an applying wireless CMOS optics bar code scanner and multi-task system is constructed. Finally, performance of communication is tested by evaluation software Smart RF. In broad space, every ZIGBEE node can realize 50m transmission with high reliability. When adding more ZigBee nodes, the transmission distance can be several thousands of meters long.

  11. The Design of Wireless Sensor Network System Based on ZigBee Technology for Greenhouse

    International Nuclear Information System (INIS)

    Zhu, Y W; Zhong, X X; Shi, J F

    2006-01-01

    Wireless sensor network is a new research field. It can be used in some special situation for signal collection, processing and transmitting. Zigbee is a new Wireless sensor network technology characteristic of less distance and low speed. It is a new wireless network protocol stack of IEEE 802.15.4. Lately traditional system to collects parameters for Greenhouse is widely used in agriculture. The traditional system adopts wired way wiring, which makes the system complex and expensive. Generally modern Greenhouse has hundreds of square meters and they may plant variety of plants depending on different seasons. So we need to adjust the sensors which collect parameters for Greenhouse to a better place to work more efficient. Adopting wireless way wiring is convenient and economical. This paper developed a wireless sensor network system based on ZigBee technology for greenhouse. It offers flexibility and mobility to save cost and energy spent on wiring. The framework hardware and software structure, related programming are also discussed in this paper. Comparing the system which uses ZigBee technology with traditional wired network system for greenhouse, it has advantage of low cost..low power and wider coverage. Additionally it complies with IEEE802.15.4 protocol, which makes it convenient to communicate with other products that comply with the protocol too

  12. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    OpenAIRE

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  13. ZigBee-2007 Security Essentials

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2008-01-01

    ZigBee is a fairly new but promising standard for wireless networks due to its low resource requirements. As in other wireless network standards, security is an important issue and each new version of the ZigBee Specification enhances the level of the ZigBee security. In this paper, we present...... the security essentials of the latest ZigBee Specification, ZigBee-2007. We explain the key concepts, protocols, and computations. In addition, we formulate the protocols using standard protocol narrations. Finally, we identify the key challenges to be considered for consolidating ZigBee....

  14. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  15. The Design of Smart Home for the Elderly Based on ZigBee

    Directory of Open Access Journals (Sweden)

    He Junhan

    2016-01-01

    Full Text Available In recent years, as the pace of people’s life is speeding up, more young people working far from their parents, the elderly have to live alone. With the increase of age, they tend to forget things which may create safety accidents. Therefore, a smart home system for the elderly will have good application prospects. In this paper, a smart system based on ZigBee wireless network is proposed. This system uses wireless network for transmitting information between sensor nodes and uses embedded technology to analyse the data. Once an emergency occurs, the system will send an alarm to notify the elderly. At the same time, the young people can know the situation of the house through mobile phone

  16. Design of smart home terminal controller based on ZigBee

    Science.gov (United States)

    Li, Biqing; Li, Zhao; Zhang, Hongyan

    2018-04-01

    With the development in scienc and technology, and the improvement of living conditions, people pay more and more attention to the comfort of household life. Therefore, smart home has become the development trend of the future furniture. This design is composed of three blocks: transmitting module, receiving module and data acquisition module. ZigBee and STC89C52 belong to launch module as well as belong to receive module. Launch module contains ZigBee, serial communication module and monolithic STC89C52. The receiving module contains light control parts, curtain control part, ZigBee and microcontroller STC89C52. Data acquisition module includes temperature and humidity detection.

  17. Research of home energy management system based on technology of PLC and ZigBee

    Science.gov (United States)

    Wei, Qi; Shen, Jiaojiao

    2015-12-01

    In view of the problem of saving effectively energy and energy management in home, this paper designs a home energy intelligent control system based on power line carrier communication and wireless ZigBee sensor networks. The system is based on ARM controller, power line carrier communication and wireless ZigBee sensor network as the terminal communication mode, and realizes the centralized and intelligent control of home appliances. Through the combination of these two technologies, the advantages of the two technologies complement each other, and provide a feasible plan for the construction of energy-efficient, intelligent home energy management system.

  18. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  19. Network Signaling Channel for Improving ZigBee Performance in Dynamic Cluster-Tree Networks

    Directory of Open Access Journals (Sweden)

    D. Hämäläinen

    2008-03-01

    Full Text Available ZigBee is one of the most potential standardized technologies for wireless sensor networks (WSNs. Yet, sufficient energy-efficiency for the lowest power WSNs is achieved only in rather static networks. This severely limits the applicability of ZigBee in outdoor and mobile applications, where operation environment is harsh and link failures are common. This paper proposes a network channel beaconing (NCB algorithm for improving ZigBee performance in dynamic cluster-tree networks. NCB reduces the energy consumption of passive scans by dedicating one frequency channel for network beacon transmissions and by energy optimizing their transmission rate. According to an energy analysis, the power consumption of network maintenance operations reduces by 70%–76% in dynamic networks. In static networks, energy overhead is negligible. Moreover, the service time for data routing increases up to 37%. The performance of NCB is validated by ns-2 simulations. NCB can be implemented as an extension on MAC and NWK layers and it is fully compatible with ZigBee.

  20. ZigBee test framework

    NARCIS (Netherlands)

    Bui Tat Minh, B.

    2015-01-01

    This project aims to build up a common ZigBee test framework. The common test framework can be used by teams developing devices using ZigBee. The objective is to reuse of the test infrastructure, test xtures as well as to simplify the exchange of test engineers between teams. In this project, we

  1. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  2. An Analysis of QoS in ZigBee Network Based on Deviated Node Priority

    Directory of Open Access Journals (Sweden)

    Md. Jaminul Haque Biddut

    2016-01-01

    Full Text Available ZigBee is an IEEE 802.15.4 standardized communication protocol. It forms a flawless Wireless Sensor Network (WSN standard for interoperability at all levels of the network, particularly the application level which most closely touches the user. A large number of devices from different vendors can work seamlessly. These devices act as a network and send huge data traffic to the Coordinator. End devices at different zones have different roles in communication with each other. There has been a lack in executing their requests in a synchronized way based on task priority. This lack leads to massive data traffic loss and degrades the Quality of Service (QoS. One of the challenges is to analyze the QoS parameters in ZigBee network that help to detect the overall network performance. The contribution of this paper is twofold; first, a ZigBee Network is implemented based on node priority. It demonstrates a method to generate a new priority of devices with respect to their existing priority and zones’ priority as well. Second, the QoS is analyzed based on the new priority status for tasks preference purposes. The outcome of this paper shows that the QoS of the network is more conspicuous than non-priority based network.

  3. HomePort ZigBee Adapter

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Smedegaard, Jacob Haubach; Hansen, Rene

    the existing tool, Homeport, to act as a middleware and bridge between ConLAN's existing network and the ZigBee network. This report primarily discusses three possible solutions for constructing this bridge and current status on the implementation of a Develco SmartAMM and Zigbee stack for HomePort....

  4. Wireless Patient Monitoring System Using Point to Multi Point Zigbee Technology

    Directory of Open Access Journals (Sweden)

    Aung Soe Phyo

    2015-06-01

    Full Text Available ABSTRACT A ZigBee sensor network for data acquisition and monitoring is presented in this paper. A ZigBee module is connected via a USB interface to a Microsoft Windows PC which works as a base station in the network. Data collected by sensor devices are sent to the base station PC which is set as Wireless sensorNetwork WSN. ZigBee is low power consumption built-in security method and ratified specifications make it very suitable to be used with medical sensor devices.This application of Zigbee based network consists of two transmitter sections and a receiver section.Each transmitter section consists of heartbeat sensor body temperature sensor microcontroller Zigbee and LCD module.In the proposed system the patients health is continuously monitored and theacquired data is analyzed at a personal computer using Graphical User InterfaceGUI. If a particular patients health parameter is higher or lower the threshold values an alarm system is used to alert the doctor. The aim of this system is to know the condition of patients health by the doctor immediately and to reduce the load of the staff taking care of the patient in the hospitals. In this paper wireless point to multipoint system is used between doctor and patient.

  5. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  6. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  7. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  8. Smart Home Energy Management Based on Zigbee

    OpenAIRE

    E.Mallikarjuna

    2015-01-01

    Today organizations use IEEE 802.15&Zigbee to effectively deliver solutions for a variety of areas including consumer electronic device control, energy management and efficiency home and commercial building automation as well as industrial plant management. The smart home energy network has gained widespread attentions due to its flexible integrati- ion into everyday life. This next generation green home system transparently unifies various home appliances smart sensors &wireless communicati...

  9. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  10. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  11. ZigBee wireless sensor network for environmental monitoring system

    Science.gov (United States)

    Chai, Shun-qi; Ji, Lei; Wu, Hong

    2009-11-01

    ZigBee is a new close-up, low-complexity, low-power, low data rate, low-cost wireless networking technology, mainly used for short distance wireless transmission. It is based on IEEE802.15.4 standards, thousands of tiny sensors form a network through mutual coordination to communications. This paper introduces the ZigBee wireless sensor networks in environmental monitoring applications. The hardware design, including microprocessor, data acquisition, antenna and peripheral circuits of the chips, and through software design composed ZigBee mesh network that can make data acquisition and communication. This network has low power consumption, low cost, the effective area is big, and information transfers reliable merits. And have confirmed the network's communication applicability by the Serial Com Assistant, also testified the network have very good pragmatism by the NS2 emulation the network's operation.

  12. Dedicated real-time monitoring system for health care using ZigBee.

    Science.gov (United States)

    Alwan, Omar S; Prahald Rao, K

    2017-08-01

    Real-time monitoring systems (RTMSs) have drawn considerable attentions in the last decade. Several commercial versions of RTMS for patient monitoring are available which are used by health care professionals. Though they are working satisfactorily on various communication protocols, their range, power consumption, data rate and cost are really bothered. In this study, the authors present an efficient embedded system based wireless health care monitoring system using ZigBee. Their system has a capability to transmit the data between two embedded systems through two transceivers over a long range. In this, wireless transmission has been applied through two categories. The first part which contains Arduino with ZigBee will send the signals to the second device, which contains Raspberry with ZigBee. The second device will measure the patient data and send it to the first device through ZigBee transceiver. The designed system is demonstrated on volunteers to measure the body temperature which is clinically important to monitor and diagnose for fever in the patients.

  13. Fault Tolerance in ZigBee Wireless Sensor Networks

    Science.gov (United States)

    Alena, Richard; Gilstrap, Ray; Baldwin, Jarren; Stone, Thom; Wilson, Pete

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 PRO Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. This technology is supported by System-on-a-Chip solutions, resulting in extremely small and low-power nodes. The Wireless Connections in Space Project addresses the aerospace flight domain for both flight-critical and non-critical avionics. WSNs provide the inherent fault tolerance required for aerospace applications utilizing such technology. The team from Ames Research Center has developed techniques for assessing the fault tolerance of ZigBee WSNs challenged by radio frequency (RF) interference or WSN node failure.

  14. Anchor-Free Localization Method for Mobile Targets in Coal Mine Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiao Xu

    2009-04-01

    Full Text Available Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes’ location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  15. Anchor-free localization method for mobile targets in coal mine wireless sensor networks.

    Science.gov (United States)

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes' location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  16. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  17. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  18. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  19. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    , we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic......ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report...

  20. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  1. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  2. Zigbee networking technology and its application in Lamost optical fiber positioning and control system

    Science.gov (United States)

    Jin, Yi; Zhai, Chao; Gu, Yonggang; Zhou, Zengxiang; Gai, Xiaofeng

    2010-07-01

    4,000 fiber positioning units need to be positioned precisely in LAMOST(Large Sky Area Multi-object Optical Spectroscopic Telescope) optical fiber positioning & control system, and every fiber positioning unit needs two stepper motors for its driven, so 8,000 stepper motors need to be controlled in the entire system. Wireless communication mode is adopted to save the installing space on the back of the focal panel, and can save more than 95% external wires compared to the traditional cable control mode. This paper studies how to use the ZigBee technology to group these 8000 nodes, explores the pros and cons of star network and tree network in order to search the stars quickly and efficiently. ZigBee technology is a short distance, low-complexity, low power, low data rate, low-cost two-way wireless communication technology based on the IEEE 802.15.4 protocol. It based on standard Open Systems Interconnection (OSI): The 802.15.4 standard specifies the lower protocol layers-the physical layer (PHY), and the media access control (MAC). ZigBee Alliance defined on this basis, the rest layers such as the network layer and application layer, and is responsible for high-level applications, testing and marketing. The network layer used here, based on ad hoc network protocols, includes the following functions: construction and maintenance of the topological structure, nomenclature and associated businesses which involves addressing, routing and security and a self-organizing-self-maintenance functions which will minimize consumer spending and maintenance costs. In this paper, freescale's 802.15.4 protocol was used to configure the network layer. A star network and a tree network topology is realized, which can build network, maintenance network and create a routing function automatically. A concise tree network address allocate algorithm is present to assign the network ID automatically.

  3. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  4. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  5. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  6. Design of the smart home system based on the optimal routing algorithm and ZigBee network.

    Directory of Open Access Journals (Sweden)

    Dengying Jiang

    Full Text Available To improve the traditional smart home system, its electric wiring, networking technology, information transmission and facility control are studied. In this paper, we study the electric wiring, networking technology, information transmission and facility control to improve the traditional smart home system. First, ZigBee is used to replace the traditional electric wiring. Second, a network is built to connect lots of wireless sensors and facilities, thanks to the capability of ZigBee self-organized network and Genetic Algorithm-Particle Swarm Optimization Algorithm (GA-PSOA to search for the optimal route. Finally, when the smart home system is connected to the internet based on the remote server technology, home environment and facilities could be remote real-time controlled. The experiments show that the GA-PSOA reduce the system delay and decrease the energy consumption of the wireless system.

  7. Design of the smart home system based on the optimal routing algorithm and ZigBee network.

    Science.gov (United States)

    Jiang, Dengying; Yu, Ling; Wang, Fei; Xie, Xiaoxia; Yu, Yongsheng

    2017-01-01

    To improve the traditional smart home system, its electric wiring, networking technology, information transmission and facility control are studied. In this paper, we study the electric wiring, networking technology, information transmission and facility control to improve the traditional smart home system. First, ZigBee is used to replace the traditional electric wiring. Second, a network is built to connect lots of wireless sensors and facilities, thanks to the capability of ZigBee self-organized network and Genetic Algorithm-Particle Swarm Optimization Algorithm (GA-PSOA) to search for the optimal route. Finally, when the smart home system is connected to the internet based on the remote server technology, home environment and facilities could be remote real-time controlled. The experiments show that the GA-PSOA reduce the system delay and decrease the energy consumption of the wireless system.

  8. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  9. Design and implementation of an IEEE 802.15.4/ZigBee based star network for data acquisition and monitoring

    International Nuclear Information System (INIS)

    Guha, S.K.; Nabhiraj, P.Y.; Bhaumik, T.K.; Mallik, C.

    2012-01-01

    ZigBee based wireless technology is used to provide a low cost, low power, secured, PAN solution for monitoring of parameters from several distributed vacuum pumping modules installed in the SCC injection line. The parameters include module's pump RPM, input current and pressure reading of different vacuum gauges. The ZigBee stack is written in a simplified form so that each node can create a network and can join to any established network when powered on. End nodes can be replaced through a little modification in the firmware codes. End node consists of sensors, signal conditioning circuits, microcontroller and ZigBee Transceiver whereas the Central node consists of microcontroller, Transceiver and UART interface. This paper highlights the future approach of utilizing this network for data acquisition related with environmental temperature, relative humidity, noise, water leakage from inaccessible areas of Cyclotron Vault, Pit, Basement and ECR Highbay for the ease of maintenance also the development of an environment monitoring system powered by solar cells covering a wide area. (author)

  10. Wireless ZigBee home automation system

    Science.gov (United States)

    Craciunescu, Razvan; Halunga, Simona; Fratu, Octavian

    2015-02-01

    The home automation system concept existed for many years but in the last decade, due to the rapid development of sensors and wireless technologies, a large number of various such "intelligent homes" have been developed. The purpose of the present paper is to demonstrate the flexibility, reliability and affordability of home automation projects, based on a simple and affordable implementation. A wireless sensing and control system have been developed and tested, having a number of basic functionalities such as switching on/off the light according to ambient lighting and turning on/off the central heating. The system has been built around low power microcontrollers and ZigBee modems for wireless communication, using a set of Vishay 640 thermistor sensors for temperature measurements and Vishay LDR07 photo-resistor for humidity measurements. A trigger is activated when the temperature or light measurements are above/below a given threshold and a command is transmitted to the central unit through the ZigBee radio module. All the data processing is performed by a low power microcontroller both at the sensing device and at the control unit.

  11. Wireless telemedicine systems for diagnosing sleep disorders with Zigbee star network topology

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyeokjun; Varadan, Vijay K.

    2012-10-01

    Good sleep is critical for one's overall physical and mental health but more than 50 million Americans have experienced or are suffering from sleep disorders. Nevertheless, 85% of them remain undiagnosed or untreated. They can lead to chronic diseases. Sleep disorders are diagnosed through polysomnography, also known as sleep study, performed in a sleep laboratory overnight. This perturbs his/her daily sleep routine, and consequently, an accurate diagnosis cannot be made. Many companies have been developing home sleep test systems to reduce the cost of sleep studies and provide a more convenience solution to patients. The category of the system varies as type II, type III and type IV according to the type of sleep study. Current systems cannot be easily extended from one type to include a higher type. A patient who has a type III system to diagnose sleep apnea should additionally purchase a type II system which has functions that overlap with a type III system, to evaluate sleep stages. In this paper, we propose a wireless telemedicine system for easy extension of channels using the start network topology of the Zigbee protocol. The HST system consists of two wireless HST devices with a Zigbee module, a wireless HST receiver with both a Zigbee and a Wi-Fi module, and a sever which monitors/saves the physiological signals. One transmitter provides 5 channels for 2x EOG, 2x EEG and EMG to evaluate sleep stages. The other transmitter provides 5 additional channels for ECG, nasal air flow, body position, abdominal/chest efforts and oxygen saturation to diagnose sleep apnea. These two transmitters, acting as routers, and the receiver as a coordinator form a Zigbee star network. The data from each transmitter in the receiver are retransmitted to the monitoring unit through Wi-Fi. By building a star network with Zigbee, channels can be easily extended so that low level systems can be upgraded to higher level systems by simply adding the necessary channels. In addition

  12. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  13. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  14. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  15. Comparison of ZigBee Replay Attacks Using a Universal Software Radio Peripheral and USB Radio

    Science.gov (United States)

    2014-03-27

    necessary for embedded devices. One such solution is the ZigBee protocol. ZigBee is commonly used in home automation , health care networks, and the smart...specific use of ZigBee. They include ZigBee Building Automation, Remote Control, Smart Energy, Smart Energy 4 Profile 2, Health Care, Home Automation , Input

  16. Application of ZigBee technology in the X fluorescence analyzer

    International Nuclear Information System (INIS)

    Wang Haibin; Yang Jian; Cao Bihua; Zhao Xiang

    2010-01-01

    In order to ensure safe and convenient measurement of nuclear radiation, a ZigBee- technology- based X- fluorescence analyzer is developed to be used in laboratories to make quantitative and qualitative analysis of radioactive samples. (authors)

  17. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  18. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  19. Rancang Bangun Instrumen Sistem Buoy Menggunakan A-Wsn Protokol Zigbee Untuk Pengamatan Ekosistem Pesisir (Development of Buoy System Instrument using A-WSN ZigBee Protocol for Coastal Ecosystem Monitoring

    Directory of Open Access Journals (Sweden)

    Acta Withamana

    2013-12-01

    Full Text Available Luasnya perairan dan lingkungan laut yang tidak bersahabat menimbulkan tantangan tersendiri untuk diobservasi. Aktivitas observasi secara konvensional di laut, yang menggunakan kapal sebagai wahana bergerak, membutuhkan biaya yang tinggi dan tidak efisien untuk memperoleh resolusi spasial dan temporal yang diinginkan. Buoy tertambat telah lama digunakan sebagai salah satu pilihan untuk aktivitas observasi laut. Namun ukuran yang besar dari rancangan buoy yang ada pada umumnya tidak cocok untuk pengamatan ekosistem pesisir. Perkembangan teknologi semikonduktor yang pesat melahirkan konsep wireless sensor network (WSN. Komunikasi protokol ZigBee memiliki kelebihan penggunaan energi yang efisien dan kemudahan pemasangan. Riset ini dilakukan untuk mengembangkan instrumen buoy tertambat dan menguji apakah WSN dapat diaplikasikan di wilayah pesisir. Buoy tertambat yang dikembangkan memiliki kinerja yang baik dan stabil sebagai wahana instrumen. Kinerja jaringan ZigBee menunjukan tingkat keberhasilan pengiriman data sebesar 100% pada uji coba statis. Menggunakan empat buah baterai NiMH, instrumen ini dapat bekerja selama kurang lebih 39 jam untuk coordinator dan router, serta 89 jam untuk end device. Pengujian di lapangan menunjukan hasil terburuk sebesar 84.94% keberhasilan pengiriman data pada E1, dan hasil terbaik sebesar 100% keberhasilan pengiriman data pada R1 dan E3. Data suhu permukaan laut yang diterima juga dapat menggambarkan sebaran suhu permukaan di Pulau Panggang. Hasil penelitian memberikan gambaran bahwa Instrumen Sistem Buoy Menggunakan A-Wsn Protokol Zigbee sangat berpotensi untuk digunakan dalam pengamatan ekosistem pesisir. Kata kunci: instrumen, buoy tertambat, ZigBee, suhu permukaan laut, observasi pesisir   Ocean observation has become a challenge due to its vast and rough condition. The conventional observation, for example using ship as a mobile platform, is very expensive and inefficient to obtain desired spatial and temporal

  20. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  1. The Design and Implementation of Smart Monitoring System for Large-Scale Railway Maintenance Equipment Cab Based on ZigBee Wireless Sensor Network

    OpenAIRE

    Hairui Wang; Junfu Yu

    2014-01-01

    In recent years, organizations use IEEE 802.15.4 and ZigBee technology to deliver solution in variety areas including home environment monitoring. ZigBee technology has advantages on low-cost, low power consumption and self-forming. With the rapid expansion of the Internet, there is the requirement for remote monitoring large-scale railway maintenance equipment cab. This paper discusses the disadvantages of the existing smart monitoring system, and proposes a solution. A ZigBee wireless senso...

  2. Modeling of current consumption in 802.15.4/ZigBee sensor motes.

    Science.gov (United States)

    Casilari, Eduardo; Cano-García, Jose M; Campos-Garrido, Gonzalo

    2010-01-01

    Battery consumption is a key aspect in the performance of wireless sensor networks. One of the most promising technologies for this type of networks is 802.15.4/ZigBee. This paper presents an empirical characterization of battery consumption in commercial 802.15.4/ZigBee motes. This characterization is based on the measurement of the current that is drained from the power source under different 802.15.4 communication operations. The measurements permit the definition of an analytical model to predict the maximum, minimum and mean expected battery lifetime of a sensor networking application as a function of the sensor duty cycle and the size of the sensed data.

  3. A Holistic Approach to ZigBee Performance Enhancement for Home Automation Networks

    Directory of Open Access Journals (Sweden)

    August Betzler

    2014-08-01

    Full Text Available Wireless home automation networks are gaining importance for smart homes. In this ambit, ZigBee networks play an important role. The ZigBee specification defines a default set of protocol stack parameters and mechanisms that is further refined by the ZigBee Home Automation application profile. In a holistic approach, we analyze how the network performance is affected with the tuning of parameters and mechanisms across multiple layers of the ZigBee protocol stack and investigate possible performance gains by implementing and testing alternative settings. The evaluations are carried out in a testbed of 57 TelosB motes. The results show that considerable performance improvements can be achieved by using alternative protocol stack configurations. From these results, we derive two improved protocol stack configurations for ZigBee wireless home automation networks that are validated in various network scenarios. In our experiments, these improved configurations yield a relative packet delivery ratio increase of up to 33.6%, a delay decrease of up to 66.6% and an improvement of the energy efficiency for battery powered devices of up to 48.7%, obtainable without incurring any overhead to the network.

  4. A Holistic Approach to ZigBee Performance Enhancement for Home Automation Networks

    Science.gov (United States)

    Betzler, August; Gomez, Carles; Demirkol, Ilker; Paradells, Josep

    2014-01-01

    Wireless home automation networks are gaining importance for smart homes. In this ambit, ZigBee networks play an important role. The ZigBee specification defines a default set of protocol stack parameters and mechanisms that is further refined by the ZigBee Home Automation application profile. In a holistic approach, we analyze how the network performance is affected with the tuning of parameters and mechanisms across multiple layers of the ZigBee protocol stack and investigate possible performance gains by implementing and testing alternative settings. The evaluations are carried out in a testbed of 57 TelosB motes. The results show that considerable performance improvements can be achieved by using alternative protocol stack configurations. From these results, we derive two improved protocol stack configurations for ZigBee wireless home automation networks that are validated in various network scenarios. In our experiments, these improved configurations yield a relative packet delivery ratio increase of up to 33.6%, a delay decrease of up to 66.6% and an improvement of the energy efficiency for battery powered devices of up to 48.7%, obtainable without incurring any overhead to the network. PMID:25196004

  5. A holistic approach to ZigBee performance enhancement for home automation networks.

    Science.gov (United States)

    Betzler, August; Gomez, Carles; Demirkol, Ilker; Paradells, Josep

    2014-08-14

    Wireless home automation networks are gaining importance for smart homes. In this ambit, ZigBee networks play an important role. The ZigBee specification defines a default set of protocol stack parameters and mechanisms that is further refined by the ZigBee Home Automation application profile. In a holistic approach, we analyze how the network performance is affected with the tuning of parameters and mechanisms across multiple layers of the ZigBee protocol stack and investigate possible performance gains by implementing and testing alternative settings. The evaluations are carried out in a testbed of 57 TelosB motes. The results show that considerable performance improvements can be achieved by using alternative protocol stack configurations. From these results, we derive two improved protocol stack configurations for ZigBee wireless home automation networks that are validated in various network scenarios. In our experiments, these improved configurations yield a relative packet delivery ratio increase of up to 33.6%, a delay decrease of up to 66.6% and an improvement of the energy efficiency for battery powered devices of up to 48.7%, obtainable without incurring any overhead to the network.

  6. Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device

    Directory of Open Access Journals (Sweden)

    Xiang He

    2015-12-01

    Full Text Available Nowadays, smart mobile devices include more and more sensors on board, such as motion sensors (accelerometer, gyroscope, magnetometer, wireless signal strength indicators (WiFi, Bluetooth, Zigbee, and visual sensors (LiDAR, camera. People have developed various indoor positioning techniques based on these sensors. In this paper, the probabilistic fusion of multiple sensors is investigated in a hidden Markov model (HMM framework for mobile-device user-positioning. We propose a graph structure to store the model constructed by multiple sensors during the offline training phase, and a multimodal particle filter to seamlessly fuse the information during the online tracking phase. Based on our algorithm, we develop an indoor positioning system on the iOS platform. The experiments carried out in a typical indoor environment have shown promising results for our proposed algorithm and system design.

  7. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  8. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist...

  9. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  10. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  11. PM2.5 monitoring system based on ZigBee wireless sensor network

    Science.gov (United States)

    Lin, Lukai; Li, Xiangshun; Gu, Weiying

    2017-06-01

    In the view of the haze problem, aiming at improving the deficiency of the traditional PM2.5 monitoring methods, such as the insufficient real-time monitoring, limited transmission distance, high cost and the difficulty to maintain, the atmosphere PM2.5 monitoring system based on ZigBee technology is designed. The system combines the advantages of ZigBee’s low cost, low power consumption, high reliability and GPRS/Internet’s capability of remote transmission of data. Furthermore, it adopts TI’s Z-Stack protocol stack, and selects CC2530 chip and TI’s MSP430 microcontroller as the core, which establishes the air pollution monitoring network that is helpful for the early prediction of major air pollution disasters.

  12. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  13. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee

    Science.gov (United States)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Wireless Sensor Networks (WSNs) can provide a substantial benefit in spacecraft systems, reducing launch weight and providing unprecedented flexibility by allowing instrumentation capabilities to grow and change over time. Achieving data transport reliability on par with that of wired systems, however, can prove extremely challenging in practice. Fortunately, much progress has been made in developing standard WSN radio protocols for applications from non-critical home automation to mission-critical industrial process control. The relative performances of candidate protocols must be compared in representative aerospace environments, however, to determine their suitability for spaceflight applications. In this paper, we will present the results of a rigorous laboratory analysis of the performance of two standards-based, low power, low data rate WSN protocols: ZigBee Pro and ISA100.11a. Both are based on IEEE 802.15.4 and augment that standard's specifications to build complete, multi-hop networking stacks. ZigBee Pro targets primarily the home and office automation markets, providing an ad-hoc protocol that is computationally lightweight and easy to implement in inexpensive system-on-a-chip components. As a result of this simplicity, however, ZigBee Pro can be susceptible to radio frequency (RF) interference. ISA100.11a, on the other hand, targets the industrial process control market, providing a robust, centrally-managed protocol capable of tolerating a significant amount of RF interference. To achieve these gains, a coordinated channel hopping mechanism is employed, which entails a greater computational complexity than ZigBee and requires more sophisticated and costly hardware. To guide future aerospace deployments, we must understand how well these standards relatively perform in analog environments under expected operating conditions. Specifically, we are interested in evaluating goodput -- application level throughput -- in a representative crewed environment

  14. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  15. FPGA implementation of a ZigBee wireless network control interface to transmit biomedical signals

    International Nuclear Information System (INIS)

    López, M A Gómez; Goy, C B; Bolognini, P C; Herrera, M C

    2011-01-01

    In recent years, cardiac hemodynamic monitors have incorporated new technologies based on wireless sensor networks which can implement different types of communication protocols. More precisely, a digital conductance catheter system recently developed adds a wireless ZigBee module (IEEE 802.15.4 standards) to transmit cardiac signals (ECG, intraventricular pressure and volume) which would allow the physicians to evaluate the patient's cardiac status in a noninvasively way. The aim of this paper is to describe a control interface, implemented in a FPGA device, to manage a ZigBee wireless network. ZigBee technology is used due to its excellent performance including simplicity, low-power consumption, short-range transmission and low cost. FPGA internal memory stores 8-bit signals with which the control interface prepares the information packets. These data were send to the ZigBee END DEVICE module that receives and transmits wirelessly to the external COORDINATOR module. Using an USB port, the COORDINATOR sends the signals to a personal computer for displaying. Each functional block of control interface was assessed by means of temporal diagrams. Three biological signals, organized in packets and converted to RS232 serial protocol, were successfully transmitted and displayed in a PC screen. For this purpose, a custom-made graphical software was designed using LabView.

  16. FPGA implementation of a ZigBee wireless network control interface to transmit biomedical signals

    Science.gov (United States)

    Gómez López, M. A.; Goy, C. B.; Bolognini, P. C.; Herrera, M. C.

    2011-12-01

    In recent years, cardiac hemodynamic monitors have incorporated new technologies based on wireless sensor networks which can implement different types of communication protocols. More precisely, a digital conductance catheter system recently developed adds a wireless ZigBee module (IEEE 802.15.4 standards) to transmit cardiac signals (ECG, intraventricular pressure and volume) which would allow the physicians to evaluate the patient's cardiac status in a noninvasively way. The aim of this paper is to describe a control interface, implemented in a FPGA device, to manage a ZigBee wireless network. ZigBee technology is used due to its excellent performance including simplicity, low-power consumption, short-range transmission and low cost. FPGA internal memory stores 8-bit signals with which the control interface prepares the information packets. These data were send to the ZigBee END DEVICE module that receives and transmits wirelessly to the external COORDINATOR module. Using an USB port, the COORDINATOR sends the signals to a personal computer for displaying. Each functional block of control interface was assessed by means of temporal diagrams. Three biological signals, organized in packets and converted to RS232 serial protocol, were sucessfully transmitted and displayed in a PC screen. For this purpose, a custom-made graphical software was designed using LabView.

  17. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  18. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  19. Modeling of Current Consumption in 802.15.4/ZigBee Sensor Motes

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2010-06-01

    Full Text Available Battery consumption is a key aspect in the performance of wireless sensor networks. One of the most promising technologies for this type of networks is 802.15.4/ZigBee. This paper presents an empirical characterization of battery consumption in commercial 802.15.4/ZigBee motes. This characterization is based on the measurement of the current that is drained from the power source under different 802.15.4 communication operations. The measurements permit the definition of an analytical model to predict the maximum, minimum and mean expected battery lifetime of a sensor networking application as a function of the sensor duty cycle and the size of the sensed data.

  20. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  1. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  2. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  3. A Study of RF Link and Coverage in ZigBee

    Directory of Open Access Journals (Sweden)

    Doru Suciu

    2010-06-01

    Full Text Available To implement a ZigBee network, wave propagation models are necessary to determine propagation characteristics for installation of these short-range networks of industrial, scientific, and medical (ISM applications but also consumer electronics and smart home appliances. Most applications are deployed indoor, so a very large variety of situations will be met. Using propagations models for indoor environment, the distances between nodes for a reliable RF link, using standard ZigBee devices were determined.

  4. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  5. Design and analysis of environmental information monitoring system based on ZigBee technology

    Science.gov (United States)

    Liu, Kenan; Zhou, Bing; Yang, Qiliang; Guo, Hao; Ge, Zhenyang

    Farm field data information timely access is an important foundation of the modern precise management. A environmental information monitoring system was proposed based on Zigbee wireless sensor networks and field characteristics of environmental monitoring data information in this paper. The data acquisition by the sensor nodes of the monitoring regional, and a wireless network was constitute by multiple sensor node and network structure using a star topology, network coordinator is responsible for data collection and complete on-site data collection, processing, transmission and storage by RS232 interface connecting to a PC-side data management center. Practical application shows: the system has basically reached the design requirements provided some advantages with data transmission reliability and performance stability.

  6. Online Expansion Technology for Dynamic Topology Changing ZigBee Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Md. Emdadul Haque

    2014-03-01

    Full Text Available In ZigBee, the router capable devices have restriction to accept a number of devices as children devices. A router capable device can not allow any new device to join as a child device if it reaches to the maximum capacity of children or depth limit. According to ZigBee specification each device has a permanent 64-bit MAC address. If a device joins a ZigBee network, it receives a short 16-bit MAC address from the parent device. If a device can not join a network, it isolates from the network and becomes an orphan node even though address spaces are available in the network. The orphan problem becomes worse when the topology of the network changes dynamically. In this paper we propose an online expansion technology to connect the maximum number of devices specially for dynamic topology changing ZigBee wireless sensor networks. The proposed technology shares available address spaces of the router devices to reduce the number of orphan nodes in the network.

  7. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  8. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  9. Shipboard Wireless Sensor Networks Utilizing Zigbee Technology

    National Research Council Canada - National Science Library

    Zacot, Chimi

    2006-01-01

    .... The tests included range, reliability, and a battery life tests. In the second portion, a prototype pressure sensor was created by matching reliable low power pressure transducer to a Zigbee enabled mote via an integrated DAQ unit...

  10. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  11. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  12. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  13. Especificación de Perfil Zigbee para Monitoreo y Control de Plantas Industriales

    Directory of Open Access Journals (Sweden)

    Sergio Serna

    2009-12-01

    Full Text Available The use of ZigBee wireless technology in many applications is currently increasing due its short-range, low power consumption, low data transmision and high security. ZigBee profiles allow use this technology for specific systems, in order to develop of distributed applications to be easily implemented in any domain of interest. This paper presents the formal specification of a ZigBee profile for monitoring and control of industrial plants, which is implemented by use of cutting-edge tools for 8-bits microcontrollers. The network is deployed in a controlled environment using the specified profile, achieving the development of personal applications and higher confiability in the data transmission.

  14. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  15. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  16. Implementasi Jaringan Sensor Nirkabel Menggunakan Zigbee pada Monitoring Tabung Inkubator Bayi

    OpenAIRE

    Fathur Zaini Rachman

    2016-01-01

    Implementation of wireless sensor networks using zigbee to facilitate communication between users (nurse) with systems that operate on tube baby incubator. In addition, nurses can always monitor the condition of tube baby incubator at the nursing station. In this study consists of three main parts, the first sensor module using SHT11 as detection of temperature and humidity tube baby incubator, the second wireless network using ZigBee as a medium of communication between the sensor module wit...

  17. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  18. Design of Wireless Point of Sale Based on ZigBee Technology

    Directory of Open Access Journals (Sweden)

    Xiaoning Jiang

    2014-02-01

    Full Text Available With the rapid development of Point of Sale technology and modern communication technology, financial Point of Sale terminal system has been started from wired to wireless. Wireless payment technology can used where can’t rely on or even no cable network. As one of the most important technologies in the information era, Wireless Sensor Network has been widely used in banking business and other various modem business fields. This paper describes a kind of simple portable Point of Sale terminal based on the ZigBee wireless network 1, which is a low power, low cost, flexible, safe and reliable network. This Point of Sale system can be applied gas stations, liquefied petroleum gas stations and other complex sales environment, and it improves safety of gas station and personnel safety. Simple and user-friendly, this formula design and optimization method greatly improves efficiency and thus has much value for practical application.

  19. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  20. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  1. Operación de un PLC Mediante un PDA Vía ZIGBEE

    Directory of Open Access Journals (Sweden)

    Juan Zuluaga-Botero

    2015-07-01

    Full Text Available En este artículo se muestra la parte preliminar de interconexión de un módulo ZigBee con un Asistente Digital Personal (PDA a través de la red del Sistema de telefonía Móvil Global (GSM, para aplicación futura de comunicación con un Controlador Lógico Programable (PLC. Esta aplicación permite realizar monitoreo y control del sistema, de manera remota y con dispositivos móviles siendo el alcance del proyecto de investigación. Para este proyecto inicialmente se realizan comunicaciones que permiten empalmar las tecnologías de las redes de telefonía móvil celular con la red ZigBee, haciendo una interfaz transparente para el usuario, presentando dichos resultados en este artículo. Para esto se trabaja con tramas de datos básicas a través de la red de telefonía móvil celular, mediante mensajería corta recibida por el puerto serial del Zigbee remoto, utilizando microcontroladores para el control de los módulos que conforman esta parte del sistema de comunicación, estableciendo la interfaz con el dispositivo móvil o Smartphone vía Zigbee.

  2. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  3. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  4. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  5. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  6. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  7. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  8. Greenhouse irrigation control system design based on ZigBee and fuzzy PID technology

    Science.gov (United States)

    Zhou, Bing; Yang, Qiliang; Liu, Kenan; Li, Peiqing; Zhang, Jing; Wang, Qijian

    In order to achieve the water demand information accurately detect of the greenhouse crop and its precision irrigation automatic control, this article has designed a set of the irrigated control system based on ZigBee and fuzzy PID technology, which composed by the soil water potential sensor, CC2530F256 wireless microprocessor, IAR Embedded Workbench software development platform. And the time of Irrigation as the output .while the amount of soil water potential and crop growth cycle as the input. The article depended on Greenhouse-grown Jatropha to verify the object, the results show that the system can irrigate timely and appropriately according to the soil water potential and water demend of the different stages of Jatropha growth , which basically meet the design requirements. Therefore, the system has broad application prospects in the amount of greenhouse crop of fine control irrigation.

  9. The Design and Implementation of Smart Monitoring System for Large-Scale Railway Maintenance Equipment Cab Based on ZigBee Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hairui Wang

    2014-06-01

    Full Text Available In recent years, organizations use IEEE 802.15.4 and ZigBee technology to deliver solution in variety areas including home environment monitoring. ZigBee technology has advantages on low-cost, low power consumption and self-forming. With the rapid expansion of the Internet, there is the requirement for remote monitoring large-scale railway maintenance equipment cab. This paper discusses the disadvantages of the existing smart monitoring system, and proposes a solution. A ZigBee wireless sensor network smart monitoring system and Wi-Fi network is integrated through a home gateway to increase the system flexibility. At the same time the home gateway cooperated with a pre- processing system provide a flexible user interface, and the security and safety of the smart monitoring system. To testify the efficiency of the proposed system, the temperature and humidity sensors and light sensors have developed and evaluated in the smart monitoring system.

  10. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  11. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  12. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  13. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  14. Transmisión de audio usando redes Zigbee

    Directory of Open Access Journals (Sweden)

    David Delgado León

    2011-03-01

    Full Text Available Normal 0 21 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} Normal 0 21 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} Zigbee es un protocolo de comunicaciones basado en el estándar para redes inalámbricas IEEE_802.15.4. Concebido para el control y la monitorización de redes de sensores tanto en entornos industriales, médicos, como domóticos, ha existido un creciente interés por evaluarlo en aplicaciones de multimedia. Aun sin garantizar QoS (Quality of service por su limitado ancho de banda existen un conjunto de aplicaciones para vigilancia, grupos de rescate y salvamento, seguridad en entornos domóticos, grupos desplegados en un área limitada con necesidad de comunicación donde un sistema de audio y video en tiempo real de bajo costo basado en tecnología Zigbee es una idea sumamente atractiva.   Se presenta el diseño de un sistema que permita la comunicación de un grupo de usuarios desplegadas en un área limitada. Utiliza Microcontroladores RISC y tecnología Zigbee. Se investiga la factibilidad de usar la tecnología Zigbee para la transmisión de audio, se analizan

  15. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  16. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  17. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  18. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  19. Research on Environmental real-time γ-radiation monitoring systems based on ZigBee

    International Nuclear Information System (INIS)

    Chen Wei; Cui Yan; Fang Fang; Zhou Wei

    2008-01-01

    The system makes use of ZigBee wireless network technology to realize the continuous monitoring the the environmental γ radiation around the nuclear power plant with the most economic cost and the most reliable performance. In order to improve the reliability of data transmission, the system is made up of three tiered network architecture which is composed of center-node, monitoring relay station and monitoring substation. This paper introduces the establish of each network in monitoring network, the design of each terminal monitoring node and the implementation method of host computer data processing system in detail. (authors)

  20. Air-Sense: indoor environment monitoring evaluation system based on ZigBee network

    Science.gov (United States)

    Huang, Yang; Hu, Liang; Yang, Disheng; Liu, Hengchang

    2017-08-01

    In the modern life, people spend most of their time indoors. However, indoor environmental quality problems have always been affecting people’s social activities. In general, indoor environmental quality is also related to our indoor activities. Since most of the organic irritants and volatile gases are colorless, odorless and too tiny to be seen, because we have been unconsciously overlooked indoor environment quality. Consequently, our body suffer a great health problem. In this work, we propose Air-Sense system which utilizes the platform of ZigBee Network to collect and detect the real-time indoor environment quality. What’s more, Air-Sense system can also provide data analysis, and visualizing the results of the indoor environment to the user.

  1. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  2. A SMART MONITORING SYSTEM FOR CAMPUS USING ZIGBEE WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2018-02-01

    Full Text Available The wireless sensor networks are autonomous sensors that are distributed to monitor environmental and physical conditions and pass them across the network to other areas, which is considered one of the key elements that are used in the applications of smart cities. Therefore, this paper aims to provide a design to add more smart applications to the sanctuary and other compounds based on wireless sensor networks using ZigBee technology. The transition from reliance on the style of surveillance and controlled manually by staff to apply the principles of smart applications through wireless sensor network which provides the ability to getting all the necessary information and capabilities of controlling and monitoring are required to automatically and thus saving the time, effort, and money. The system proposed in this paper to design a smart monitoring system at the campus to control the opening and closing of the doors of many halls and the possibility of including lighting systems and appliances. The results obtained from OPNET program show that the network topology, which used within a ZigBee network vary in terms of performance, thus giving options for designers to build their network and choose technologies that suit their project.

  3. Anchor-Free Localization Method for Mobile Targets in Coal Mine Wireless Sensor Networks

    OpenAIRE

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes’ location. Fi...

  4. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  5. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  6. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  7. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  8. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  9. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  10. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  11. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  12. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  13. Vehicles In Highway Communication System Using ZigBee And Bluetooth Network

    Directory of Open Access Journals (Sweden)

    EiThuzarKhin

    2015-06-01

    Full Text Available Abstract Globally many vehicle types operate on the highway system. And highway infrastructure stakeholders have developed a number of products intended to facilitate the identification of critical assets and provide guidance for conductiong security planning. Many of these productsare conducted as joint efforts between the state highway agencies.The main aim of the system is to have a network between Roadside Unit RSU and On-Board Unit OBU and between On-Board Unit OBU and another On-Board Unit OBU . ZigBee is a consortium of software hardware and services companies having improved a common standard for wireless networking of sensors and microcontrollers.Bluetooth is a technology of wireless standard for exchanging data for short distances. In this article we point out sending data to the drivers via not only ZigBee module but also Bluetooth module.

  14. Scheduled Collision Avoidance in wireless sensor network using Zigbee

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Transmission reliability and energy consumptions are two critical concerns associated with wireless sensor network (WSN) design for a long time and continuous operation. With the increase in reliability of the transmission, the energy consumption increases by affecting the efficiency of the network....... This paper proposes the Schedule based Collision Avoidance (SCA) algorithm for finding the tradeoff between reliability and energy efficiency by fusion of CSMA/CA and TDMA techniques in Zigbee/ IEEE802.15.4. It uses the multi-path data propagation for collision avoidance and effective utilization...... of the channel providing efficient energy consumption. It analyses different scheduling schemes to provide an appropriate solution for reducing collisions and improving network lifetime....

  15. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  16. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  17. IEEE 802154 and ZigBee as enabling technologies for low-power wireless systems with quality-of-service constraints

    CERN Document Server

    Tennina, Stefano; Daidone, Roberta; Alves, Mário; Jurčík, Petr; Severino, Ricardo; Tiloca, Marco; Hauer, Jan-Hinrich; Pereira, Nuno; Dini, Gianluca; Bouroche, Mélanie; Tovar, Eduardo

    2013-01-01

    This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.

  18. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  19. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee Pro

    Science.gov (United States)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Standards-based wireless sensor network (WSN) protocols are promising candidates for spacecraft avionics systems, offering unprecedented instrumentation flexibility and expandability. Ensuring reliable data transport is key, however, when migrating from wired to wireless data gathering systems. In this paper, we conduct a rigorous laboratory analysis of the relative performances of the ZigBee Pro and ISA100.11a protocols in a representative crewed aerospace environment. Since both operate in the 2.4 GHz radio frequency (RF) band shared by systems such as Wi-Fi, they are subject at times to potentially debilitating RF interference. We compare goodput (application-level throughput) achievable by both under varying levels of 802.11g Wi-Fi traffic. We conclude that while the simpler, more inexpensive ZigBee Pro protocol performs well under moderate levels of interference, the more complex and costly ISA100.11a protocol is needed to ensure reliable data delivery under heavier interference. This paper represents the first published, rigorous analysis of WSN protocols in an aerospace environment that we are aware of and the first published head-to-head comparison of ZigBee Pro and ISA100.11a.

  20. Design of intelligent house system based on Yeelink

    Directory of Open Access Journals (Sweden)

    Lin Zhi-Huang

    2016-01-01

    Full Text Available In order to monitor the security situation of house in real time, an intelligent house remote monitoring system is designed based on Yeelink cloud services and ZigBee wireless communication technology. This system includes three parts, ZigBee wireless sensor networks, intelligent house gateway and Yeelink Cloud Services. Users can access Yeelink website or APP to get real time information in the house, receiving information including gas concentration, temperature. Also, remote commands can be sent from mobile devices to control the household appliances. The user who can monitor and control the house effectively through a simple and convenient user interface, will feel much more safe and comfortable.

  1. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  2. Recovery Act: Water Heater ZigBee Open Standard Wireless Controller

    Energy Technology Data Exchange (ETDEWEB)

    Butler, William P. [Emerson Electric Co., St. Louis, MO (United States); Buescher, Tom [Emerson Electric Co., St. Louis, MO (United States)

    2014-04-30

    The objective of Emerson's Water Heater ZigBee Open Standard Wireless Controller is to support the DOE's AARA priority for Clean, Secure Energy by designing a water heater control that levels out residential and small business peak electricity demand through thermal energy storage in the water heater tank.

  3. Implementation of a wireless ECG acquisition SoC for IEEE 802.15.4 (ZigBee) applications.

    Science.gov (United States)

    Wang, Liang-Hung; Chen, Tsung-Yen; Lin, Kuang-Hao; Fang, Qiang; Lee, Shuenn-Yuh

    2015-01-01

    This paper presents a wireless biosignal acquisition system-on-a-chip (WBSA-SoC) specialized for electrocardiogram (ECG) monitoring. The proposed system consists of three subsystems, namely, 1) the ECG acquisition node, 2) the protocol for standard IEEE 802.15.4 ZigBee system, and 3) the RF transmitter circuits. The ZigBee protocol is adopted for wireless communication to achieve high integration, applicability, and portability. A fully integrated CMOS RF front end containing a quadrature voltage-controlled oscillator and a 2.4-GHz low-IF (i.e., zero-IF) transmitter is employed to transmit ECG signals through wireless communication. The low-power WBSA-SoC is implemented by the TSMC 0.18-μm standard CMOS process. An ARM-based displayer with FPGA demodulation and an RF receiver with analog-to-digital mixed-mode circuits are constructed as verification platform to demonstrate the wireless ECG acquisition system. Measurement results on the human body show that the proposed SoC can effectively acquire ECG signals.

  4. Wireless Zigbee strain gage sensor system for structural health monitoring

    Science.gov (United States)

    Ide, Hiroshi; Abdi, Frank; Miraj, Rashid; Dang, Chau; Takahashi, Tatsuya; Sauer, Bruce

    2009-05-01

    A compact cell phone size radio frequency (ZigBee) wireless strain measurement sensor system to measure the structural strain deformation was developed. The developed system provides an accurate strain measurement data stream to the Internet for further Diagnostic and Prognostic (DPS) correlation. Existing methods of structural measurement by strain sensors (gauges) do not completely satisfy problems posed by continuous structural health monitoring. The need for efficient health monitoring methods with real-time requirements to bidirectional data flow from sensors and to a commanding device is becoming critical for keeping our daily life safety. The use of full-field strain measurement techniques could reduce costly experimental programs through better understanding of material behavior. Wireless sensor-network technology is a monitoring method that is estimated to grow rapidly providing potential for cost savings over traditional wired sensors. The many of currently available wireless monitoring methods have: the proactive and constant data rate character of the data streams rather than traditional reactive, event-driven data delivery; mostly static node placement on structures with limited number of nodes. Alpha STAR Electronics' wireless sensor network system, ASWN, addresses some of these deficiencies, making the system easier to operate. The ASWN strain measurement system utilizes off-the-shelf sensors, namely strain gauges, with an analog-to-digital converter/amplifier and ZigBee radio chips to keep cost lower. Strain data is captured by the sensor, converted to digital form and delivered to the ZigBee radio chip, which in turn broadcasts the information using wireless protocols to a Personal Data Assistant (PDA) or Laptop/Desktop computers. From here, data is forwarded to remote computers for higher-level analysis and feedback using traditional cellular and satellite communication or the Ethernet infrastructure. This system offers a compact size, lower cost

  5. Design and Implementation of a Web-based Greenhouse Remote Monitoring System with Zigbee Protocol and GSM Network

    Directory of Open Access Journals (Sweden)

    Abdolhamid Tabatabaeifar

    2014-10-01

    Full Text Available In modern and big greenhouses, it is necessary to measure several climate parameters to automate and control the greenhouse properly. Monitoring and transmitting by cable may lead to an expensive and stiff measurement system. Since, Wireless Sensor Network (WSN is a distributed system that consists of small-size wireless sensor nodes equipped with radio and one or several sensors; it is a low cost option to build the required monitoring system. In this paper, we introduce and implement an intelligent monitoring system based on WSN by using Xbee modules. The Xbee Series 2 hardware uses a microchip from Ember Networks that enables several different flavors of standards-based ZigBee mesh networking. All gathered information by sensors, are sent to a remote center in form of GPRS packets through a GSM network and viewed by monitoring software. The proposed system has low power consumption, low cost and simple driver circuits. Furthermore, it can support various types of digital and analog sensors.

  6. Implementasi Jaringan Sensor Nirkabel Menggunakan Zigbee pada Monitoring Tabung Inkubator Bayi

    Directory of Open Access Journals (Sweden)

    Fathur Zaini Rachman

    2016-07-01

    Full Text Available Implementation of wireless sensor networks using zigbee to facilitate communication between users (nurse with systems that operate on tube baby incubator. In addition, nurses can always monitor the condition of tube baby incubator at the nursing station. In this study consists of three main parts, the first sensor module using SHT11 as detection of temperature and humidity tube baby incubator, the second wireless network using ZigBee as a medium of communication between the sensor module with a computer, a third HMI (Human Machine Interface on the computer as a data processor which received from each sensor module scattered. The results of this study found that the system can work properly with a star topology, so communication was very good when applied to the scope of which is still to reach by the end device and the coordinator. As for the broader scope can use a mesh topology to add a router at the point range.

  7. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  8. Avaliação da propagação de sinais de radiofrequência para tecnologia Zigbee em granja de frango de corte Evaluation of radiofrequency signals for Zigbee technology in poultry housing

    Directory of Open Access Journals (Sweden)

    Eduardo F. Nunes

    2011-01-01

    Full Text Available Visou-se, neste trabalho, realizar a predição de sinais de radiofrequência para a aplicação de Rede de Sensores Sem Fio (RSSF de monitoramento e controle em uma granja de frango de corte. A tecnologia de comunicação sem fio utilizada foi a Zigbee, com o padrão IEEE 802.15.4 compondo a camada física e de enlace. Desenvolveu-se, para automatizar a leitura de potências, um aplicativo em linguagem Delphi e, para a predição de sinais de RF (Radiofrequência, utilizou-se o modelo Shadowing adaptado. Todos os testes foram realizados em granja comercial, no Município de Tuiuti, estado de São Paulo, Brasil. Os resultados obtidos demonstraram boas condições de transmissão até 131 m, indicando que a tecnologia Zigbee é adequada, segundo a perspectiva de propagação de sinais, para a implementação de RSSF em granjas de frango de corte.This study aimed to conduct an evaluation for the implementation of Wireless Sensors Network (WSN of tracking and control in a poultry farm. The wireless technology used was Zigbee, with the IEEE 802.15.4 standard forming the physical layer and link layer. To automate the power measurement a DELPHI language software was developed and, for the prediction of RF signals, an adjusted model of the shadowing was used. All tests were performed in a commercial broiler farm, in the city of Tuiuti in the State of São Paulo, Brazil. The results of this study indicate that Zigbee technology is appropriate, from the perspective of signal propagation, to implement WSN in poultry housing.

  9. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  10. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  11. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  12. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  13. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  14. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  15. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  16. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  17. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  18. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  19. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  20. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  1. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  2. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  3. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  4. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  5. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  6. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  7. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  8. UAV telemetry communications using ZigBee protocol

    Science.gov (United States)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  9. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  10. Smart Agent Based Mobile Tutoring and Querying System

    Directory of Open Access Journals (Sweden)

    Suresh Sankaranarayanan

    2012-08-01

    Full Text Available With our busy schedules today and the rising cost of education there is a need to find a convenient and cost effective means of maximizing our educational/training experiences. New trends in the delivery/access of information are becoming more technology based in all areas of society with education being no exception. The ubiquitous use of mobile devices has led to a boom in m-commerce. Mobile devices provide many services in commercial environments such as mobile banking, mobile purchasing, mobile learning, etc. It is therefore fitting that we seek to use mobile devices as a platform in delivering our convenient and cost effective solution. The proposed agent based Mobile tutoring system seeks to provide a student with a rich learning experience that will provide them with the relevant reading material based on their stage of development which allows them to move at their own pace. The system will allow the user to be able to ask certain questions and get explanations as if they were interacting with a human tutor but with the added benefit of being able to do this anytime in any location via their mobile phone.

  11. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  12. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  13. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  14. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  15. Template-based education toolkit for mobile platforms

    Science.gov (United States)

    Golagani, Santosh Chandana; Esfahanian, Moosa; Akopian, David

    2012-02-01

    Nowadays mobile phones are the most widely used portable devices which evolve very fast adding new features and improving user experiences. The latest generation of hand-held devices called smartphones is equipped with superior memory, cameras and rich multimedia features, empowering people to use their mobile phones not only as a communication tool but also for entertainment purposes. With many young students showing interest in learning mobile application development one should introduce novel learning methods which may adapt to fast technology changes and introduce students to application development. Mobile phones become a common device, and engineering community incorporates phones in various solutions. Overcoming the limitations of conventional undergraduate electrical engineering (EE) education this paper explores the concept of template-based based education in mobile phone programming. The concept is based on developing small exercise templates which students can manipulate and revise for quick hands-on introduction to the application development and integration. Android platform is used as a popular open source environment for application development. The exercises relate to image processing topics typically studied by many students. The goal is to enable conventional course enhancements by incorporating in them short hands-on learning modules.

  16. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  17. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  18. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  19. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  20. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  1. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  2. Mechanism design for mobile geo-location advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  3. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  4. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  5. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  6. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  7. A Skeleton Based Programming Paradigm for Mobile Multi-Agents on Distributed Systems and Its Realization within the MAGDA Mobile Agents Platform

    Directory of Open Access Journals (Sweden)

    R. Aversa

    2008-01-01

    Full Text Available Parallel programming effort can be reduced by using high level constructs such as algorithmic skeletons. Within the MAGDA toolset, supporting programming and execution of mobile agent based distributed applications, we provide a skeleton-based parallel programming environment, based on specialization of Algorithmic Skeleton Java interfaces and classes. Their implementation include mobile agent features for execution on heterogeneous systems, such as clusters of WSs and PCs, and support reliability and dynamic workload balancing. The user can thus develop a parallel, mobile agent based application by simply specialising a given set of classes and methods and using a set of added functionalities.

  8. Application of Elliptic Curve Cryptography in ZigBee Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Feng Xu

    2013-05-01

    Full Text Available An encryption algorithm is the core of network security, but for ZigBee wireless sensor network (WSN, the complexity of this algorithm directly affects the cost and energy consumption in MCU hardware storage resources, which results in confliction between data protection and overhead. In this paper, a contradiction simple elliptic curve cryptosystem (ECC is proposed to use for terminal nodes and host computer for data encryption and authentication, the purpose is to save the hardware cost and enhanced data security.

  9. USAR Robot Communication Using ZigBee Technology

    Science.gov (United States)

    Tsui, Charles; Carnegie, Dale; Pan, Qing Wei

    This paper reports the successful development of an automatic routing wireless network for USAR (urban search and rescue) robots in an artificial rubble environment. The wireless network was formed using ZigBee modules and each module was attached to a micro-controller in order to model a wireless USAR robot. Proof of concept experiments were carried out by deploying the networked robots into artificial rubble. The rubble was simulated by connecting holes and trenches that were dug in 50 cm deep soil. The simulated robots were placed in the bottom of the holes. The holes and trenches were then covered up by various building materials and soil to simulate a real rubble environment. Experiments demonstrated that a monitoring computer placed 10 meters outside the rubble can establish proper communication with all robots inside the artificial rubble environment.

  10. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  11. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  12. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  13. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  14. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  15. WIRELESS HOME AUTOMATION SYSTEM BASED ON MICROCONTROLLER

    Directory of Open Access Journals (Sweden)

    MUNA H. SALEH

    2017-11-01

    Full Text Available This paper presents the development of Global System Mobile (GSM-based control home air-conditioner for home automation system. The main aim of the prototype development is to reduce electricity wastage. GSM module was used for receiving Short Message Service (SMS from the user’s mobile phone that automatically enable the controller to take any further action such as to switch ON and OFF the home air-conditioner. The system controls the air-conditioner based on the temperature reading through the sensor. Every period temperature sensor sends the degree to Micro Controller Unit (MCU through ZigBee. Based on temperature degree MCU send ON or OFF signal to switch. Additionally, system allows user to operate or shut down the airconditioner remotely through SMS.

  16. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  17. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  18. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  19. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  20. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  1. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  2. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  3. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  4. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  5. Entropy-Based Privacy against Profiling of User Mobility

    Directory of Open Access Journals (Sweden)

    Alicia Rodriguez-Carrion

    2015-06-01

    Full Text Available Location-based services (LBSs flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose sensitive data, such as work or home locations. The classic concept of entropy is widely used to evaluate privacy in these scenarios, where the information is represented as a sequence of independent samples of categorized data. However, since the LBS queries might be sent very frequently, location profiles can be improved by adding temporal dependencies, thus becoming mobility profiles, where location samples are not independent anymore and might disclose the user’s mobility patterns. Since the time dimension is factored in, the classic entropy concept falls short of evaluating the real privacy level, which depends also on the time component. Therefore, we propose to extend the entropy-based privacy metric to the use of the entropy rate to evaluate mobility profiles. Then, two perturbative mechanisms are considered to preserve locations and mobility profiles under gradual utility constraints. We further use the proposed privacy metric and compare it to classic ones to evaluate both synthetic and real mobility profiles when the perturbative methods proposed are applied. The results prove the usefulness of the proposed metric for mobility profiles and the need for tailoring the perturbative methods to the features of mobility profiles in order to improve privacy without completely loosing utility.

  6. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  7. Disentangling location-based advertising: The effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; Riet, J.P. van 't; Hühn, A.E.; Woudenberg, T.J. van; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  8. Disentangling location-based advertising: the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; van't Riet, J.; Hühn, A.E.; van Woudenberg, T.J.; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  9. Disentangling location-based advertising : the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, Paul; Bernritter, Stefan; van 't Riet, Jonathan; Huhn, Arief Ernst; van Woudenberg, Thabo; Muller, Barbara; Janssen, Loes

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  10. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  11. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    Science.gov (United States)

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  12. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    Directory of Open Access Journals (Sweden)

    Fabio Leccese

    2014-12-01

    Full Text Available A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  13. REDISTRIBUTION OF BASE STATIONS LOAD IN MOBILE COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Igor Ruban

    2017-09-01

    Full Text Available The subject matter of the article is the processes of load distribution in mobile communication networks. The object of research is the handover. The goal is to develop a method for redistributing the load between neighboring areas for mobile nodes. The considered base stations are supposed to have the signal-to-noise ratios that are equal or close. The methods that are used: methods of system analysis, methods of digital signal processing. The following results are obtained. The method that allows mobile nodes, whose signal-to-noise ratios are equal or close, to switch to a less loaded base station. This method allows the base station to launch the handover process enabling more even distribution of the load from mobile nodes among neighboring base stations in wireless and mobile networks. In the suggested modification of the method, the function assessing the bandwidth of the uplink channel is added to the base stations, as well a threshold value for using its bandwidth. Thus, when the current value of bandwidth reaches the threshold, the base station starts sending out a message to all mobile nodes and verifies free neighboring areas for switching over mobile nodes. If there are adjacent areas with a lower load, the base station notifies all potential candidates about the necessity of their switching over. The handover process is launched when the available bandwidth of the base station decreases below a certain threshold. Therefore, it is possible to optimize the operation of the WiMAX network with respect to the criterion of the total bandwidth capacity of the base stations. Besides, the results of the comparative analysis of the handover process in networks based on the WiMAX technology that are obtained using the OpNet simulation environment are presented. Conclusions.The suggested approach can be used to improve the basic software of mobile communication networks. When moving a node from one area to another one in access servers, the

  14. Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2009-01-01

    The reliability of ad-hoc networks is gaining popularity in two areas: as a topic of academic interest and as a key performance parameter for defense systems employing this type of network. The ad-hoc network is dynamic and scalable and these descriptions are what attract its users. However, these descriptions are also synonymous for undefined and unpredictable when considering the impacts to the reliability of the system. The configuration of an ad-hoc network changes continuously and this fact implies that no single mathematical expression or graphical depiction can describe the system reliability-wise. Previous research has used mobility and stochastic models to address this challenge successfully. In this paper, the authors leverage the stochastic approach and build upon it a probabilistic solution discovery (PSD) algorithm to optimize the topology for a cluster-based mobile ad-hoc wireless network (MAWN). Specifically, the membership of nodes within the back-bone network or networks will be assigned in such as way as to maximize reliability subject to a constraint on cost. The constraint may also be considered as a non-monetary cost, such as weight, volume, power, or the like. When a cost is assigned to each component, a maximum cost threshold is assigned to the network, and the method is run; the result is an optimized allocation of the radios enabling back-bone network(s) to provide the most reliable network possible without exceeding the allowable cost. The method is intended for use directly as part of the architectural design process of a cluster-based MAWN to efficiently determine an optimal or near-optimal design solution. It is capable of optimizing the topology based upon all-terminal reliability (ATR), all-operating terminal reliability (AoTR), or two-terminal reliability (2TR)

  15. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks

  16. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  17. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  18. Context-Aware Mobile Sensors for Sensing Discrete Events in Smart Environment

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2016-01-01

    Full Text Available Over the last few decades, several advancements in the field of smart environment gained importance, so the experts can analyze ideas for smart building based on embedded systems to minimize the expense and energy conservation. Therefore, propelling the concept of smart home toward smart building, several challenges of power, communication, and sensors’ connectivity can be seen. Such challenges distort the interconnectivity between different technologies, such as Bluetooth and ZigBee, making it possible to provide the continuous connectivity among different objects such as sensors, actuators, home appliances, and cell phones. Therefore, this paper presents the concept of smart building based on embedded systems that enhance low power mobile sensors for sensing discrete events in embedded systems. The proposed scheme comprises system architecture that welcomes all the mobile sensors to communicate with each other using a single platform service. The proposed system enhances the concept of smart building in three stages (i.e., visualization, data analysis, and application. For low power mobile sensors, we propose a communication model, which provides a common medium for communication. Finally, the results show that the proposed system architecture efficiently processes, analyzes, and integrates different datasets efficiently and triggers actions to provide safety measurements for the elderly, patients, and others.

  19. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  20. Interoperable End-to-End Remote Patient Monitoring Platform Based on IEEE 11073 PHD and ZigBee Health Care Profile.

    Science.gov (United States)

    Clarke, Malcolm; de Folter, Joost; Verma, Vivek; Gokalp, Hulya

    2018-05-01

    This paper describes the implementation of an end-to-end remote monitoring platform based on the IEEE 11073 standards for personal health devices (PHD). It provides an overview of the concepts and approaches and describes how the standard has been optimized for small devices with limited resources of processor, memory, and power that use short-range wireless technology. It explains aspects of IEEE 11073, including the domain information model, state model, and nomenclature, and how these support its plug-and-play architecture. It shows how these aspects underpin a much larger ecosystem of interoperable devices and systems that include IHE PCD-01, HL7, and BlueTooth LE medical devices, and the relationship to the Continua Guidelines, advocating the adoption of data standards and nomenclature to support semantic interoperability between health and ambient assisted living in future platforms. The paper further describes the adaptions that have been made in order to implement the standard on the ZigBee Health Care Profile and the experiences of implementing an end-to-end platform that has been deployed to frail elderly patients with chronic disease(s) and patients with diabetes.

  1. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  2. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  3. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  4. A low power 2.4 GHz transceiver for ZigBee applications

    International Nuclear Information System (INIS)

    Liu Weiyang; Chen Jingjing; Wang Haiyong; Wu Nanjian

    2013-01-01

    This paper presents a low power 2.4 GHz transceiver for ZigBee applications. This transceiver adopts low power system architecture with a low-IF receiver and a direct-conversion transmitter. The receiver consists of a new low noise amplifier (LNA) with a noise cancellation function, a new inverter-based variable gain complex filter (VGCF) for image rejection, a passive quadrature mixer, and a decibel linear programmable gain amplifier (PGA). The transmitter adopts a quadrature mixer and a class-B mode variable gain power amplifier (PA) to reduce power consumption. This transceiver is implemented in 0.18 μm CMOS technology. The receiver achieves −95 dBm of sensitivity, 28 dBc of image rejection, and −8 dBm of third-order input intercept point (IIP3). The transmitter can deliver a maximum of +3 dBm output power with PA efficiency of 30%. The whole chip area is less than 4.32 mm 2 . It only consumes 12.63 mW in receiving mode and 14.22 mW in transmitting mode, respectively. (semiconductor integrated circuits)

  5. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  6. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  7. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  8. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  9. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  10. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  11. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  14. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  15. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  16. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  17. Mobile Inquiry Based Learning

    NARCIS (Netherlands)

    Specht, Marcus

    2012-01-01

    Specht, M. (2012, 8 November). Mobile Inquiry Based Learning. Presentation given at the Workshop "Mobile inquiry-based learning" at the Mobile Learning Day 2012 at the Fernuniversität Hagen, Hagen, Germany.

  18. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  19. Nationwide impact and vehicle to grid application of electric vehicles mobility using an activity based model

    OpenAIRE

    Álvaro, Roberto; González, Jairo; Fraile Ardanuy, José Jesús; Knapen, Luk; Janssens, Davy

    2013-01-01

    This paper describes the impact of electric mobility on the transmission grid in Flanders region (Belgium), using a micro-simulation activity based models. These models are used to provide temporal and spatial estimation of energy and power demanded by electric vehicles (EVs) in different mobility zones. The increment in the load demand due to electric mobility is added to the background load demand in these mobility areas and the effects over the transmission substations are analyzed. From t...

  20. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  1. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  2. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  3. Introduction to Mobile Trajectory Based Services: A New Direction in Mobile Location Based Services

    Science.gov (United States)

    Khokhar, Sarfraz; Nilsson, Arne A.

    The mandate of E911 gave birth to the idea of Location Based Services (LBS) capitalizing on the knowledge of the mobile location. The underlying estimated location is a feasible area. There is yet another class of mobile services that could be based on the mobility profiling of a mobile user. The mobility profile of a mobile user is a set of the routine trajectories of his or her travel paths. We called such services as Mobile Trajectory Based Services (MTBS). This paper introduces MTBS and functional architecture of an MTBS system. Suitability of different location estimation technologies for MTBS has been discussed and supported with simulation results.

  4. Monitoring of ph, redox and turbidity in a water treatment plant using WSN with ZIGBEE technology

    Directory of Open Access Journals (Sweden)

    Gerson Fonseca-Gonzaléz

    2014-05-01

    Full Text Available This paper presents the design of a WSN using Zigbee technology (Standart IEEE 802.15.4, With the help of the XBee of Maxtream modules the communication is carried out between a remote water treatment plant towards a ccordinator node. The acqired data are entered to a microcontroller which takes care of the processing to be able to transmit and visualized under a graphical user interface in Matlab

  5. Testing ZigBee Motes for Monitoring Refrigerated Vegetable Transportation under Real Conditions

    Directory of Open Access Journals (Sweden)

    Luis Ruiz-Garcia

    2010-05-01

    Full Text Available Quality control and monitoring of perishable goods during transportation and delivery services is an increasing concern for producers, suppliers, transport decision makers and consumers. The major challenge is to ensure a continuous ‘cold chain’ from producer to consumer in order to guaranty prime condition of goods. In this framework, the suitability of ZigBee protocol for monitoring refrigerated transportation has been proposed by several authors. However, up to date there was not any experimental work performed under real conditions. Thus, the main objective of our experiment was to test wireless sensor motes based in the ZigBee/IEEE 802.15.4 protocol during a real shipment. The experiment was conducted in a refrigerated truck traveling through two countries (Spain and France which means a journey of 1,051 kilometers. The paper illustrates the great potential of this type of motes, providing information about several parameters such as temperature, relative humidity, door openings and truck stops. Psychrometric charts have also been developed for improving the knowledge about water loss and condensation on the product during shipments.

  6. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  7. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  8. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  9. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  10. Decision Tree-Based Contextual Location Prediction from Mobile Device Logs

    Directory of Open Access Journals (Sweden)

    Linyuan Xia

    2018-01-01

    Full Text Available Contextual location prediction is an important topic in the field of personalized location recommendation in LBS (location-based services. With the advancement of mobile positioning techniques and various sensors embedded in smartphones, it is convenient to obtain massive human mobile trajectories and to derive a large amount of valuable information from geospatial big data. Extracting and recognizing personally interesting places and predicting next semantic location become a research hot spot in LBS. In this paper, we proposed an approach to predict next personally semantic place with historical visiting patterns derived from mobile device logs. To address the problems of location imprecision and lack of semantic information, a modified trip-identify method is employed to extract key visit points from GPS trajectories to a more accurate extent while semantic information are added through stay point detection and semantic places recognition. At last, a decision tree model is adopted to explore the spatial, temporal, and sequential features in contextual location prediction. To validate the effectiveness of our approach, experiments were conducted based on a trajectory collection in Guangzhou downtown area. The results verified the feasibility of our approach on contextual location prediction from continuous mobile devices logs.

  11. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  12. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  13. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  14. Mobile object retrieval in server-based image databases

    Science.gov (United States)

    Manger, D.; Pagel, F.; Widak, H.

    2013-05-01

    The increasing number of mobile phones equipped with powerful cameras leads to huge collections of user-generated images. To utilize the information of the images on site, image retrieval systems are becoming more and more popular to search for similar objects in an own image database. As the computational performance and the memory capacity of mobile devices are constantly increasing, this search can often be performed on the device itself. This is feasible, for example, if the images are represented with global image features or if the search is done using EXIF or textual metadata. However, for larger image databases, if multiple users are meant to contribute to a growing image database or if powerful content-based image retrieval methods with local features are required, a server-based image retrieval backend is needed. In this work, we present a content-based image retrieval system with a client server architecture working with local features. On the server side, the scalability to large image databases is addressed with the popular bag-of-word model with state-of-the-art extensions. The client end of the system focuses on a lightweight user interface presenting the most similar images of the database highlighting the visual information which is common with the query image. Additionally, new images can be added to the database making it a powerful and interactive tool for mobile contentbased image retrieval.

  15. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  16. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  17. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  18. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  19. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  20. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  1. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  2. Mobility-Aware and Load Balancing Based Clustering Algorithm for Energy Conservation in MANET

    Institute of Scientific and Technical Information of China (English)

    XU Li; ZHENG Bao-yu; GUO Gong-de

    2005-01-01

    Mobile ad hoc network (MANET) is one of wireless communication network architecture that has received a lot of attention. MANET is characterized by dynamic network topology and limited energy. With mobility-aware and load balancing based clustering algorithm (MLCA), this paper proposes a new topology management strategy to conserve energy. Performance simulation results show that the proposed MLCA strategy can balances the traffic load inside the whole network, so as to prolong the network lifetime, meanly, at the same time, achieve higher throughput ratio and network stability.

  3. Design of intelligent gateway control system based on AllJoyn and FC-3180

    Directory of Open Access Journals (Sweden)

    Chen Yanzhong

    2017-02-01

    Full Text Available To simplify interconnection of distributed household equipment,this design creates a spontaneous,movable,safe and configurable equipment management system and smart home layout with the open-source software framework AllJoyn,the embedded microprocessor FC-3180,the low power wireless transmission network ZigBee and mobile application platform Android.

  4. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  5. Study on Communication Methods for Electric Power High-voltage Equipment Monitoring System

    Directory of Open Access Journals (Sweden)

    Jia Yu Chen

    2018-02-01

    Full Text Available Real-time monitoring of high-voltage equipment in substations is beneficial for early detection of faults. The use of wireless sensor networks to build monitoring system is an effective way, but the data collection is a difficult task. The author introduces a real-time monitoring system based on ZIGBEE and mobile communication technology. The system includes multiple monitoring points and terminal platforms. Each monitoring point consists of a number of sensor nodes to form a ZIGBEE network, detecting relevant parameters, coordinator node data collected one by one, known as linear transmission, and finally to the monitoring platform through the mobile communication network. This paper presents a fusion algorithm for monitoring cell data acquisition to reduce the amount of data uploaded to the base station. In addition, multi-hop routing algorithm based on opportunistic routing is proposed to balance network energy and improve network transmission rate and efficiency.

  6. A cloud-based multimodality case file for mobile devices.

    Science.gov (United States)

    Balkman, Jason D; Loehfelm, Thomas W

    2014-01-01

    Recent improvements in Web and mobile technology, along with the widespread use of handheld devices in radiology education, provide unique opportunities for creating scalable, universally accessible, portable image-rich radiology case files. A cloud database and a Web-based application for radiologic images were developed to create a mobile case file with reasonable usability, download performance, and image quality for teaching purposes. A total of 75 radiology cases related to breast, thoracic, gastrointestinal, musculoskeletal, and neuroimaging subspecialties were included in the database. Breast imaging cases are the focus of this article, as they best demonstrate handheld display capabilities across a wide variety of modalities. This case subset also illustrates methods for adapting radiologic content to cloud platforms and mobile devices. Readers will gain practical knowledge about storage and retrieval of cloud-based imaging data, an awareness of techniques used to adapt scrollable and high-resolution imaging content for the Web, and an appreciation for optimizing images for handheld devices. The evaluation of this software demonstrates the feasibility of adapting images from most imaging modalities to mobile devices, even in cases of full-field digital mammograms, where high resolution is required to represent subtle pathologic features. The cloud platform allows cases to be added and modified in real time by using only a standard Web browser with no application-specific software. Challenges remain in developing efficient ways to generate, modify, and upload radiologic and supplementary teaching content to this cloud-based platform. Online supplemental material is available for this article. ©RSNA, 2014.

  7. Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender

    methods and techniques in different areas and brings them together to create an efficient verification system. The overall ambition is to provide a wide range of powerful techniques for analyzing models with quantitative and qualitative security information. We stated a new approach that first verifies...... applications, home automation, and traffic control. The challenges for research in this area are due to the unique features of wireless sensor devices such as low processing power and associated low energy. On top of this, wireless sensor networks need secure communication as they operate in open fields...... low level security protocol s in a qualitative manner and guarantees absolute security, and then takes these verified protocols as actions of scenarios to be verified in a quantitative manner. Working on the emerging ZigBee wireless sensor networks, we used probabilistic verification that can return...

  8. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  9. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Directory of Open Access Journals (Sweden)

    Neil A Switz

    Full Text Available The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  10. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Science.gov (United States)

    Switz, Neil A; D'Ambrosio, Michael V; Fletcher, Daniel A

    2014-01-01

    The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  11. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  12. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  13. Applications of ZigBee Technology in the Safety Monitoring System of Low Gas Pipeline Transportation

    Directory of Open Access Journals (Sweden)

    Wei Deyu

    2015-01-01

    Full Text Available The existing safety monitoring system of low gas pipeline transportation establishes a wired communication network monitoring system mainly on the basis of industrial bus. It has problems such as large transmission signal attenuation, complex wiring, high-labor intensity, inconvenient installation and maintenance, high maintenance cost, and so on. Featuring low cost, power-saving, reliability, stability and flexibility, the wireless sensor network established by ZigBee wireless communication technology can realize the real-time all-dimensional dynamic monitoring on parameters of low gas pipeline transportation system and overcome the shortcomings and deficiencies of wired network system.

  14. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  15. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  16. ZigBee-Based Telemetry System

    Directory of Open Access Journals (Sweden)

    L. Khriji

    2010-12-01

    Full Text Available Nowadays, there is a significant improvement in technology regarding healthcare. Real-time monitoring systems improve the quality of life of patients as well as the performance of hospitals and healthcare centers. In this paper, we present an implementation of a designed framework of a telemetry system using ZigBee technology for automatic and real-time monitoring of Biomedical signals. These signals are collected and processed using 2-tiered subsystems. The first subsystem is the mobile device which is carried on the body and runs a number of biosensors. The second subsystem performs further processing by a local base station using the raw data which is transmitted on-request by the mobile device. The processed data as well as its analysis are then continuously monitored and diagnosed through a human-machine interface. The system should possess low power consumption, low cost and advanced configuration possibilities. This paper accelerates the digital convergence age through continual research and development of technologies related to healthcare.

  17. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  18. Mobile monitoring and embedded control system for factory environment.

    Science.gov (United States)

    Lian, Kuang-Yow; Hsiao, Sung-Jung; Sung, Wen-Tsai

    2013-12-17

    This paper proposes a real-time method to carry out the monitoring of factory zone temperatures, humidity and air quality using smart phones. At the same time, the system detects possible flames, and analyzes and monitors electrical load. The monitoring also includes detecting the vibrations of operating machinery in the factory area. The research proposes using ZigBee and Wi-Fi protocol intelligent monitoring system integration within the entire plant framework. The sensors on the factory site deliver messages and real-time sensing data to an integrated embedded systems via the ZigBee protocol. The integrated embedded system is built by the open-source 32-bit ARM (Advanced RISC Machine) core Arduino Due module, where the network control codes are built in for the ARM chipset integrated controller. The intelligent integrated controller is able to instantly provide numerical analysis results according to the received data from the ZigBee sensors. The Android APP and web-based platform are used to show measurement results. The built-up system will transfer these results to a specified cloud device using the TCP/IP protocol. Finally, the Fast Fourier Transform (FFT) approach is used to analyze the power loads in the factory zones. Moreover, Near Field Communication (NFC) technology is used to carry out the actual electricity load experiments using smart phones.

  19. Mobile Monitoring and Embedded Control System for Factory Environment

    Science.gov (United States)

    Lian, Kuang-Yow; Hsiao, Sung-Jung; Sung, Wen-Tsai

    2013-01-01

    This paper proposes a real-time method to carry out the monitoring of factory zone temperatures, humidity and air quality using smart phones. At the same time, the system detects possible flames, and analyzes and monitors electrical load. The monitoring also includes detecting the vibrations of operating machinery in the factory area. The research proposes using ZigBee and Wi-Fi protocol intelligent monitoring system integration within the entire plant framework. The sensors on the factory site deliver messages and real-time sensing data to an integrated embedded systems via the ZigBee protocol. The integrated embedded system is built by the open-source 32-bit ARM (Advanced RISC Machine) core Arduino Due module, where the network control codes are built in for the ARM chipset integrated controller. The intelligent integrated controller is able to instantly provide numerical analysis results according to the received data from the ZigBee sensors. The Android APP and web-based platform are used to show measurement results. The built-up system will transfer these results to a specified cloud device using the TCP/IP protocol. Finally, the Fast Fourier Transform (FFT) approach is used to analyze the power loads in the factory zones. Moreover, Near Field Communication (NFC) technology is used to carry out the actual electricity load experiments using smart phones. PMID:24351642

  20. Mobile Monitoring and Embedded Control System for Factory Environment

    Directory of Open Access Journals (Sweden)

    Kuang-Yow Lian

    2013-12-01

    Full Text Available This paper proposes a real-time method to carry out the monitoring of factory zone temperatures, humidity and air quality using smart phones. At the same time, the system detects possible flames, and analyzes and monitors electrical load. The monitoring also includes detecting the vibrations of operating machinery in the factory area. The research proposes using ZigBee and Wi-Fi protocol intelligent monitoring system integration within the entire plant framework. The sensors on the factory site deliver messages and real-time sensing data to an integrated embedded systems via the ZigBee protocol. The integrated embedded system is built by the open-source 32-bit ARM (Advanced RISC Machine core Arduino Due module, where the network control codes are built in for the ARM chipset integrated controller. The intelligent integrated controller is able to instantly provide numerical analysis results according to the received data from the ZigBee sensors. The Android APP and web-based platform are used to show measurement results. The built-up system will transfer these results to a specified cloud device using the TCP/IP protocol. Finally, the Fast Fourier Transform (FFT approach is used to analyze the power loads in the factory zones. Moreover, Near Field Communication (NFC technology is used to carry out the actual electricity load experiments using smart phones.

  1. Topology Control with Anisotropic and Sector Turning Antennas in Ad-hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    V. Černý

    2011-01-01

    Full Text Available During the last several years, technological advances have allowed the development of small, cheap, embedded, independent and rather powerful radio devices that can self-organise into data networks. Such networks are usually called ad-hoc networks or, sometimes, depending on the application field, sensor networks. One of the first standards for ad-hoc networks to impose itself as a fully industrial framework for data gathering and control over such devices is IEEE 802.15.4 and, on top of it, its pair network architecture: ZigBee. In the case of multiple radio devices clamped into a small geographical area, the lack of radio bandwidth becomes a major problem, leading to multiple data losses and unnecessary power drain from the batteries of these small devices. This problem is usually perceived as interference. The deployment of appropriate topology control mechanisms (TC can solve interference. All of these algorithms calculate TC on the basis of isotropic antenna radiation patterns in the horizontal plane.

  2. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  3. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  4. A qualitative analysis of coronary heart disease patient views of dietary adherence and web-based and mobile-based nutrition tools.

    Science.gov (United States)

    Yehle, Karen S; Chen, Aleda M H; Plake, Kimberly S; Yi, Ji Soo; Mobley, Amy R

    2012-01-01

    Dietary adherence can be challenging for patients with coronary heart disease (CHD), as they may require multiple dietary changes. Choosing appropriate food items may be difficult or take extensive amounts of time without the aid of technology. The objective of this project was to (1) examine the dietary challenges faced by patients with CHD, (2) examine methods of coping with dietary challenges, (3) explore the feasibility of a Web-based food decision support system, and (4) explore the feasibility of a mobile-based food decision support system. Food for the Heart (FFH), a Web site-based food decision support system, and Mobile Magic Lens (MML), a mobile-based system, were developed to aid in daily dietary choices. Three CHD patient focus groups were conducted and focused on CHD-associated dietary changes as well as the FFH and MML prototypes. A total of 20 CHD patients and 7 informal caregivers participated. Qualitative, content analysis was performed to find themes grounded in the responses. Five predominant themes emerged: (1) decreasing carbohydrate intake and portion control are common dietary challenges, (2) clinician and social support makes dietary adherence easier, (3) FFH could make meal-planning and dietary adherence less complicated, (4) MML could save time and assist with healthy choices, and (5) additional features need to be added to make both tools more comprehensive. Food for the Heart and MML may be tools that CHD patients would value in making food choices and adhering to dietary recommendations, especially if additional features are added to assist patients with changes.

  5. Multi-objective Search-based Mobile Testing

    OpenAIRE

    Mao, K.

    2017-01-01

    Despite the tremendous popularity of mobile applications, mobile testing still relies heavily on manual testing. This thesis presents mobile test automation approaches based on multi-objective search. We introduce three approaches: Sapienz (for native Android app testing), Octopuz (for hybrid/web JavaScript app testing) and Polariz (for using crowdsourcing to support search-based mobile testing). These three approaches represent the primary scientific and technical contributions of the thesis...

  6. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.

    Science.gov (United States)

    Hong, Zhiling; Lin, Fan; Xiao, Bin

    2017-01-01

    Based on the traditional Fast Retina Keypoint (FREAK) feature description algorithm, this paper proposed a Gravity-FREAK feature description algorithm based on Micro-electromechanical Systems (MEMS) sensor to overcome the limited computing performance and memory resources of mobile devices and further improve the reality interaction experience of clients through digital information added to the real world by augmented reality technology. The algorithm takes the gravity projection vector corresponding to the feature point as its feature orientation, which saved the time of calculating the neighborhood gray gradient of each feature point, reduced the cost of calculation and improved the accuracy of feature extraction. In the case of registration method of matching and tracking natural features, the adaptive and generic corner detection based on the Gravity-FREAK matching purification algorithm was used to eliminate abnormal matches, and Gravity Kaneda-Lucas Tracking (KLT) algorithm based on MEMS sensor can be used for the tracking registration of the targets and robustness improvement of tracking registration algorithm under mobile environment.

  7. A CONTEXT AWARE BASED PRE-HANDOFF SUPPORT APPROACH TO PROVIDE OPTIMAL QOS FOR STREAMING APPLICATIONS OVER VEHICULAR AD HOC NETWORKS – HOSA

    Directory of Open Access Journals (Sweden)

    K. RAMESH BABU

    2015-06-01

    Full Text Available Large variations in network Quality of Service (QoS such as bandwidth, latency, jitter, and reliability may occur during media transfer over vehicular ad hoc networks (VANET. Usage of VANET over mobile and wireless computing applications experience “bursty” QoS behavior during the execution over distributed network scenarios. Applications such as streaming media services need to adapt their functionalities to any change in network status. Moreover, an enhanced software platform is necessary to provide adaptive network management services to upper software components. HOSA, a handoff service broker based architecture for QoS adaptation over VANET supports in providing awareness. HOSA is structured as a middleware platform both to provide QoS awareness to streaming applications as well to manage dynamic ad hoc network resources with support over handoff in an adaptive fashion. HOSA is well analyzed over routing schemes such as TIBSCRPH, SIP and ABSRP where performance of HOSA was measured using throughput, traffic intensity and end to end delay. HOSA has been analyzed using JXTA development toolkit over C++ implemented classes to demonstrate its performance over varying node mobility established using vehicular mobility based conference application.

  8. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  9. A Low Power Consumption Algorithm for Efficient Energy Consumption in ZigBee Motes.

    Science.gov (United States)

    Vaquerizo-Hdez, Daniel; Muñoz, Pablo; R-Moreno, María D; F Barrero, David

    2017-09-22

    Wireless Sensor Networks (WSNs) are becoming increasingly popular since they can gather information from different locations without wires. This advantage is exploited in applications such as robotic systems, telecare, domotic or smart cities, among others. To gain independence from the electricity grid, WSNs devices are equipped with batteries, therefore their operational time is determined by the time that the batteries can power on the device. As a consequence, engineers must consider low energy consumption as a critical objective to design WSNs. Several approaches can be taken to make efficient use of energy in WSNs, for instance low-duty-cycling sensor networks (LDC-WSN). Based on the LDC-WSNs, we present LOKA, a LOw power Konsumption Algorithm to minimize WSNs energy consumption using different power modes in a sensor mote. The contribution of the work is a novel algorithm called LOKA that implements two duty-cycling mechanisms using the end-device of the ZigBee protocol (of the Application Support Sublayer) and an external microcontroller (Cortex M0+) in order to minimize the energy consumption of a delay tolerant networking. Experiments show that using LOKA, the energy required by the sensor device is reduced to half with respect to the same sensor device without using LOKA.

  10. A Low Power Consumption Algorithm for Efficient Energy Consumption in ZigBee Motes

    Directory of Open Access Journals (Sweden)

    Daniel Vaquerizo-Hdez

    2017-09-01

    Full Text Available Wireless Sensor Networks (WSNs are becoming increasingly popular since they can gather information from different locations without wires. This advantage is exploited in applications such as robotic systems, telecare, domotic or smart cities, among others. To gain independence from the electricity grid, WSNs devices are equipped with batteries, therefore their operational time is determined by the time that the batteries can power on the device. As a consequence, engineers must consider low energy consumption as a critical objective to design WSNs. Several approaches can be taken to make efficient use of energy in WSNs, for instance low-duty-cycling sensor networks (LDC-WSN. Based on the LDC-WSNs, we present LOKA, a LOw power Konsumption Algorithm to minimize WSNs energy consumption using different power modes in a sensor mote. The contribution of the work is a novel algorithm called LOKA that implements two duty-cycling mechanisms using the end-device of the ZigBee protocol (of the Application Support Sublayer and an external microcontroller (Cortex M0+ in order to minimize the energy consumption of a delay tolerant networking. Experiments show that using LOKA, the energy required by the sensor device is reduced to half with respect to the same sensor device without using LOKA.

  11. REST based mobile applications

    Science.gov (United States)

    Rambow, Mark; Preuss, Thomas; Berdux, Jörg; Conrad, Marc

    2008-02-01

    Simplicity is the major advantage of REST based webservices. Whereas SOAP is widespread in complex, security sensitive business-to-business aplications, REST is widely used for mashups and end-user centric applicatons. In that context we give an overview of REST and compare it to SOAP. Furthermore we apply the GeoDrawing application as an example for REST based mobile applications and emphasize on pros and cons for the use of REST in mobile application scenarios.

  12. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  13. Predictors of Playing Augmented Reality Mobile Games While Walking Based on the Theory of Planned Behavior: Web-Based Survey.

    Science.gov (United States)

    Koh, Hyeseung Elizabeth; Oh, Jeeyun; Mackert, Michael

    2017-12-11

    There has been a sharp increase in the number of pedestrians injured while using a mobile phone, but little research has been conducted to explain how and why people use mobile devices while walking. Therefore, we conducted a survey study to explicate the motivations of mobile phone use while walking. The purpose of this study was to identify the critical predictors of behavioral intention to play a popular mobile game, Pokemon Go, while walking, based on the theory of planned behavior (TPB). In addition to the three components of TPB, automaticity, immersion, and enjoyment were added to the model. This study is a theory-based investigation that explores the underlying mechanisms of mobile phone use while walking focusing on a mobile game behavior. Participants were recruited from a university (study 1; N=262) and Amazon Mechanical Turk (MTurk) (study 2; N=197) in the United States. Participants completed a Web-based questionnaire, which included measures of attitude, subjective norms, perceived behavioral control (PBC), automaticity, immersion, and enjoyment. Participants also answered questions regarding demographic items. Hierarchical regression analyses were conducted to examine hypotheses. The model we tested explained about 41% (study 1) and 63% (study 2) of people's intention to play Pokemon Go while walking. The following 3 TPB variables were significant predictors of intention to play Pokemon Go while walking in study 1 and study 2: attitude (Pmobile use while walking. To sum up, younger users who are habitual, impulsive, and less immersed players are more likely to intend to play a mobile game while walking. ©Hyeseung Elizabeth Koh, Jeeyun Oh, Michael Mackert. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 11.12.2017.

  14. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  15. Mobility Model for Self-Organizing and Cooperative MSN and MANET Systems

    Directory of Open Access Journals (Sweden)

    Andrzej Sikora

    2012-03-01

    Full Text Available Self-organization mechanisms are used for building scalable systems consisting of a huge number of subsystems. In computer networks, self-organizing is especially important in ad hoc networking. A self-organizing ad hoc network is a collection of wireless devices that collaborate with each other to form a network system that adapts to achieve a goal or goals. Such network is often built from mobile devices that may spontaneously create a network and dynamically adapted to changes in an unknown environment. Mobility pattern is a critical element that influences the performance characteristics of mobile sensor networks (MSN and mobile ad hoc networks (MANET. In this paper, we survey main directions to mobility modeling. We describe a novel algorithm for calculating mobility patterns for mobile devices that is based on a cluster formation and an artificial potential function. Finally, we present the simulation results of its application to a rescue mission planning.

  16. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  17. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks.

    Science.gov (United States)

    Aadil, Farhan; Raza, Ali; Khan, Muhammad Fahad; Maqsood, Muazzam; Mehmood, Irfan; Rho, Seungmin

    2018-05-03

    Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  18. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Farhan Aadil

    2018-05-01

    Full Text Available Flying ad-hoc networks (FANETs are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  19. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.

    Directory of Open Access Journals (Sweden)

    Zhiling Hong

    Full Text Available Based on the traditional Fast Retina Keypoint (FREAK feature description algorithm, this paper proposed a Gravity-FREAK feature description algorithm based on Micro-electromechanical Systems (MEMS sensor to overcome the limited computing performance and memory resources of mobile devices and further improve the reality interaction experience of clients through digital information added to the real world by augmented reality technology. The algorithm takes the gravity projection vector corresponding to the feature point as its feature orientation, which saved the time of calculating the neighborhood gray gradient of each feature point, reduced the cost of calculation and improved the accuracy of feature extraction. In the case of registration method of matching and tracking natural features, the adaptive and generic corner detection based on the Gravity-FREAK matching purification algorithm was used to eliminate abnormal matches, and Gravity Kaneda-Lucas Tracking (KLT algorithm based on MEMS sensor can be used for the tracking registration of the targets and robustness improvement of tracking registration algorithm under mobile environment.

  20. Quiz Lounge Game-Based Learning on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Bettina Harriehausen-Mühlbauer

    2013-08-01

    Full Text Available The Quiz Lounge project is a collaboration between Hochschule Darmstadt and Lufthansa AG. The goal of the project was the development of a mobile learning application. With the application, the Lufthansa managers should be able to learn about data privacy topics playfully and interactively. The application is based on a quiz concept and asks the user for answers to a series of ten questions which increase in difficulty level. While playing the game the user can use two "lifeline" helpers, the audience- and the 50-50-helper. Furthermore, the user has the ability to browse a glossary of related terms if he or she has the need of more detailed knowledge. New questions and also new games can be added with a web-based authoring tool. The authoring tool was uniquely developed for the Quiz Lounge application and conforms to the specific needs of its architecture.

  1. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  2. Fuzzy-Based Sensor Fusion for Cognitive Radio-Based Vehicular Ad Hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammad Jalil Piran

    2015-01-01

    Full Text Available In wireless sensor networks, sensor fusion is employed to integrate the acquired data from diverse sensors to provide a unified interpretation. The best and most salient advantage of sensor fusion is to obtain high-level information in both statistical and definitive aspects, which cannot be attained by a single sensor. In this paper, we propose a novel sensor fusion technique based on fuzzy theory for our earlier proposed Cognitive Radio-based Vehicular Ad Hoc and Sensor Networks (CR-VASNET. In the proposed technique, we considered four input sensor readings (antecedents and one output (consequent. The employed mobile nodes in CR-VASNET are supposed to be equipped with diverse sensors, which cater to our antecedent variables, for example, The Jerk, Collision Intensity, and Temperature and Inclination Degree. Crash_Severity is considered as the consequent variable. The processing and fusion of the diverse sensory signals are carried out by fuzzy logic scenario. Accuracy and reliability of the proposed protocol, demonstrated by the simulation results, introduce it as an applicable system to be employed to reduce the causalities rate of the vehicles’ crashes.

  3. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  4. A FSA Model for Performance Evaluation over Mobile Ad Hoc Networks with Low Traffic Volume

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-07-01

    Full Text Available A Mobile Ad hoc network (MANET, which is composed of nodes that are able to move arbitrarily, differs from a direct connection network in the way that it is multi-hopping and self- organizing and thus able to operate without the help of prefixed infrastructures. However, problems such as unfavorable wireless links and dynamic topology are challenging, resulting in the proposal of a collection of routing protocols for MANETs. Nevertheless the performance of protocols may deteriorate dramatically as deployment scenario changes due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and is explored and a novel performance ranking model, termed FSA, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies. The FSA is able to rank the performance of DSDV and DSR depending on the average value and standard deviation results. Extensive simulations show that an overall 20.74 %, at most, gain may be achieved based on the FSA model.

  5. Gender-related model for mobile-based learning

    Science.gov (United States)

    Simanjuntak, R. R.; Dewi, U. P.; Rifai, I.

    2018-03-01

    The study investigates gender influence on mobile-based learning. This case study of university students in Jakarta involved 235 students (128 male, 97 female). Results of this qualitative study showed 96% preference for mobile-based learning. A further 94% showed the needs for collaboration and authenticity for 92%. Hofstede’s cultural dimensions were used to identify the gender aspects of MALL. Preference for Masculinity (65%) was showed rather than Femininity (35%), even among the female respondents (70% of the population). Professions and professionalism received strongest preference (70%) while Individuality and Collectivism had equal preferences among students. Both female and male respondents requested Indulgence (84%) for mobile-based learning with more male respondents opted for Indulgence. The study provided a model for this gender sensitive mobile-based learning. Implications of implementing mobile-based learning as an ideal alternative for well-accommodated education are is also discussed.

  6. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  7. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  8. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  9. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  10. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  11. Fuzzy Logic Based Behavior Fusion for Navigation of an Intelligent Mobile Robot

    Institute of Scientific and Technical Information of China (English)

    李伟; 陈祖舜; 等

    1996-01-01

    This paper presents a new method for behavior fusion control of a mobile robot in uncertain environments.Using behavior fusion by fuzzy logic,a mobile robot is able to directly execute its motion according to range information about environments,acquired by ultrasonic sensors,without the need for trajectory planning.Based on low-level behavior control,an efficient strategy for integrating high-level global planning for robot motion can be formulated,since,in most applications,some information on environments is prior knowledge.A global planner,therefore,only to generate some subgoal positions rather than exact geometric paths.Because such subgoals can be easily removed from or added into the plannes,this strategy reduces computational time for global planning and is flexible for replanning in dynamic environments.Simulation results demonstrate that the proposed strategy can be applied to robot motion in complex and dynamic environments.

  12. Android Based Mobile Environment for Moodle Users

    Science.gov (United States)

    de Clunie, Gisela T.; Clunie, Clifton; Castillo, Aris; Rangel, Norman

    2013-01-01

    This paper is about the development of a platform that eases, throughout Android based mobile devices, mobility of users of virtual courses at Technological University of Panama. The platform deploys computational techniques such as "web services," design patterns, ontologies and mobile technologies to allow mobile devices communicate…

  13. Predictors of Playing Augmented Reality Mobile Games While Walking Based on the Theory of Planned Behavior: Web-Based Survey

    Science.gov (United States)

    Oh, Jeeyun; Mackert, Michael

    2017-01-01

    Background There has been a sharp increase in the number of pedestrians injured while using a mobile phone, but little research has been conducted to explain how and why people use mobile devices while walking. Therefore, we conducted a survey study to explicate the motivations of mobile phone use while walking Objective The purpose of this study was to identify the critical predictors of behavioral intention to play a popular mobile game, Pokemon Go, while walking, based on the theory of planned behavior (TPB). In addition to the three components of TPB, automaticity, immersion, and enjoyment were added to the model. This study is a theory-based investigation that explores the underlying mechanisms of mobile phone use while walking focusing on a mobile game behavior. Methods Participants were recruited from a university (study 1; N=262) and Amazon Mechanical Turk (MTurk) (study 2; N=197) in the United States. Participants completed a Web-based questionnaire, which included measures of attitude, subjective norms, perceived behavioral control (PBC), automaticity, immersion, and enjoyment. Participants also answered questions regarding demographic items. Results Hierarchical regression analyses were conducted to examine hypotheses. The model we tested explained about 41% (study 1) and 63% (study 2) of people’s intention to play Pokemon Go while walking. The following 3 TPB variables were significant predictors of intention to play Pokemon Go while walking in study 1 and study 2: attitude (P<.001), subjective norms (P<.001), and PBC (P=.007 in study 1; P<.001 in study 2). Automaticity tendency (P<.001), immersion (P=.02), and enjoyment (P=.04) were significant predictors in study 1, whereas enjoyment was the only significant predictor in study 2 (P=.01). Conclusions Findings from this study demonstrated the utility of TPB in predicting a new behavioral domain—mobile use while walking. To sum up, younger users who are habitual, impulsive, and less immersed players

  14. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  15. Active and separate secretion of fiber and penton base during the early phase of Ad2 or Ad5 infection

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Yuhua; Zhang, Bo; Hou, Weihong; Lin, Hongyu [Beijing Key Laboratory of Gene Resource and Molecular Development, Beijing Normal University, Beijing (China); Rebetz, Johan [The Rausing Laboratory, Department of Neurosurgery, Lund University, Lund (Sweden); Hong, Saw-See [Viral Infections & Comparative Pathology, UMR-754 UCBL-INRA-EPHE, Université Lyon 1, Lyon Cedex 07 (France); Wang, Youjun; Ran, Liang [Beijing Key Laboratory of Gene Resource and Molecular Development, Beijing Normal University, Beijing (China); Fan, Xiaolong, E-mail: XFan@bnu.edu.cn [Beijing Key Laboratory of Gene Resource and Molecular Development, Beijing Normal University, Beijing (China)

    2017-05-15

    Fiber and penton base overproduced in adenovirus (Ad) infected cells can be secreted prior to progeny release and thereby regulate progeny spread. We aimed to investigate the mechanisms of fiber and penton base secretion in Ad2- or Ad5-infected A549 cells. Our flow cytometry analyses detected abundant surface fiber molecules, but little penton base molecules at 12 h post infection. Immunogold staining combined with transmission electron microscopic analyses revealed separate, non-co-localized release of fiber and penton base in the proximity of the plasma membrane. Depolymerization of microtubule and actin cytoskeletons, and inhibition of Rock kinase and myosin II activity together demonstrated cytoskeletal network-dependent fiber secretion. Inhibition of intracellular calcium [Ca{sup 2+}]{sub i} signaling caused diminished fiber secretion, which was associated with diminished progeny production. Thus, fiber and penton base are actively and separately secreted during the early stages of Ad2 or Ad5 infection, their secretion may play important role in Ad life cycle. - Highlights: •Excessive production of structural proteins is common to viral infection, which may regulate the host-virus equilibrium and the spreading of viruses. •The adenovirus (Ad) structural proteins, fiber and penton base, are respectively important for Ad binding to its receptor and subsequent internalization in host cells. In Ad infected cells, these two structural proteins are excessively produced. •The mechanisms underlying the release of fiber and penton base molecules at the early phase of Ad infection is yet poorly understood. •Our studies show that in Ad5 or Ad2 infected A549 cells, fiber and penton base molecules are actively and separately secreted. •Fiber secretion is dependent on cytoskeleton-mediated protein traffic. •Inhibition of myosin II motor and Ca{sup 2+} signaling activity significantly diminishes fiber secretion. •These findings could contribute to our

  16. Active and separate secretion of fiber and penton base during the early phase of Ad2 or Ad5 infection

    International Nuclear Information System (INIS)

    Yan, Yuhua; Zhang, Bo; Hou, Weihong; Lin, Hongyu; Rebetz, Johan; Hong, Saw-See; Wang, Youjun; Ran, Liang; Fan, Xiaolong

    2017-01-01

    Fiber and penton base overproduced in adenovirus (Ad) infected cells can be secreted prior to progeny release and thereby regulate progeny spread. We aimed to investigate the mechanisms of fiber and penton base secretion in Ad2- or Ad5-infected A549 cells. Our flow cytometry analyses detected abundant surface fiber molecules, but little penton base molecules at 12 h post infection. Immunogold staining combined with transmission electron microscopic analyses revealed separate, non-co-localized release of fiber and penton base in the proximity of the plasma membrane. Depolymerization of microtubule and actin cytoskeletons, and inhibition of Rock kinase and myosin II activity together demonstrated cytoskeletal network-dependent fiber secretion. Inhibition of intracellular calcium [Ca 2+ ] i signaling caused diminished fiber secretion, which was associated with diminished progeny production. Thus, fiber and penton base are actively and separately secreted during the early stages of Ad2 or Ad5 infection, their secretion may play important role in Ad life cycle. - Highlights: •Excessive production of structural proteins is common to viral infection, which may regulate the host-virus equilibrium and the spreading of viruses. •The adenovirus (Ad) structural proteins, fiber and penton base, are respectively important for Ad binding to its receptor and subsequent internalization in host cells. In Ad infected cells, these two structural proteins are excessively produced. •The mechanisms underlying the release of fiber and penton base molecules at the early phase of Ad infection is yet poorly understood. •Our studies show that in Ad5 or Ad2 infected A549 cells, fiber and penton base molecules are actively and separately secreted. •Fiber secretion is dependent on cytoskeleton-mediated protein traffic. •Inhibition of myosin II motor and Ca 2+ signaling activity significantly diminishes fiber secretion. •These findings could contribute to our understanding of Ad

  17. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  18. Patients’ Heart Monitoring System Based on Wireless Sensor Network

    Science.gov (United States)

    Sollu, T. S.; Alamsyah; Bachtiar, M.; Sooai, A. G.

    2018-04-01

    Wireless sensor network (WSN) has been utilized to support the health field such as monitoring the patient’s heartbeat. Heart health monitoring is essential in maintaining health, especially in the elderly. Such an arrangement is needed to understand the patient’s heart characteristics. The increasing number of patients certainly will enhance the burdens of doctors or nurses in dealing with the condition of the patients. Therefore, required a solution that could help doctors or nurses in monitoring the progress of patients’ health at a real time. This research proposes a design and application of a patient heart monitoring system based on WSN. This system with using electrocardiograph (ECG) mounted on the patients’ body and sent to the server through the ZigBee. The results indicated that the retrieval of data for 15 seconds in male patients, with the age of 25 years was 17 times rate or equal to 68 bpm. For 884 data packets sent for 15 minutes using ZigBee produce a data as much as 4488 bytes, throughput of 2.39 Kbps, and 0.24486 seconds of average delay. The measurement of the communication coverage based on the open space conditions within 15 seconds through ZigBee resulting throughput value of 4.19 Kbps, packet loss of 0 %, and 6.667 seconds of average delay. While, the measurement of communication range based on closed space condition through ZigBee resulting throughput of 4.27 Kbps, packet loss of 0 %, and 6.55 seconds of average delay.

  19. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  20. Consumer value of context aware and location based mobile services

    NARCIS (Netherlands)

    De Vos, Henny; Haaker, Timber; Teerling, Marije; Kleijnen, M.H.P.

    2008-01-01

    Context aware services have the ability to utilize information about the user's context to adapt services to the user's current situation and needs. In this paper we consider users' perceptions of the added value of location awareness and presence information in mobile services. We use an

  1. Viseu Mobile: A location based Augmented Reality tour guide for mobile devices

    Directory of Open Access Journals (Sweden)

    M.L. Martins

    2015-11-01

    Full Text Available This article reports on the project "Viseu na Palma da Mão", which is based on a Augmented Reality app for mobile devices, whose main purpose is to maximise the tourists’ experience when visiting the town of Viseu. The paper starts by presenting a reflection on Augmented Reality and its potential and applications, with a special emphasis on the tourism industry. The increasing possibility to access the Internet anytime, anywhere, together with the unprecedented growth of mobile device penetration has boosted the development of specific applications that seek to respond to the increasing demands of tourists. It is on this premise that the app Viseu Mobile emerges, seeking to enhance the constant use of mobile devices, and making them act as a personal tour guide, based on location based information. The different stages of development and different features of the application are also explained

  2. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  3. Real time control “es-dawet” mixer using dasboard based on PLC and WSN

    Science.gov (United States)

    Siagian, Pandapotan; Hutauruk, Sindak; Kisno

    2017-09-01

    The aim of this study is to monitor and acquire the remote parameters like Speed control a DC Motor, IR Sensor, Temperature of pasteurize mix of ice cream, and send these real values over wireless network. A proposed system is dashboard monitoring system for PLC based system wirelessly using ZigBee protocol. To implement this a ZigBee model is connected to a programmed digital signal controller which would transmit the data to Zigbee coordinator which is connected to a PC through RS232 serial communication. Person can need only to send the reply about the process that is to be carried out and PLC will check the status of the web base sent by person and take the action according to it where wired communication is either more expensive or impossible due to physical conditions. A low cost system for measured the parameters of motor such as IR Sensor, Speed control a DC Motor by PWM and temperature with Zigbee protocol connectivity. A database is built to execute monitoring and to save the motor parameters received by radio frequency (RF) data acquisition system. Experimental results show that the proposed system is less costly, provides higher accuracy as well as safe and gives visual environment.

  4. FRAMEWORK FOR AD HOC NETWORK COMMUNICATION IN MULTI-ROBOT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Khilda Slyusar

    2016-11-01

    Full Text Available Assume a team of mobile robots operating in environments where no communication infrastructure like routers or access points is available. The robots have to create a mobile ad hoc network, in that case, it provides communication on peer-to-peer basis. The paper gives an overview of existing solutions how to route messages in such ad hoc networks between robots that are not directly connected and introduces a design of a software framework for realization of such communication. Feasibility of the proposed framework is shown on the example of distributed multi-robot exploration of an a priori unknown environment. Testing of developed functionality in an exploration scenario is based on results of several experiments with various input conditions of the exploration process and various sizes of a team and is described herein.

  5. Mobile English learning: an evidence-based study with fifth graders

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; de Geus, K.

    2011-01-01

    Three groups participated in a study on the added value of mobile technology for learning English as a second language for primary school students. The first group had classroom lessons in English about zoo animals and their characteristics. The second group took classroom lessons and worked with a

  6. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....

  7. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  8. Heterogeneous Community-based mobility model for human opportunistic network

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    a heterogeneous community-based random way-point (HC-RWP) mobility model that captures the four important properties of real human mobility. These properties are based on both intuitive observations of daily human mobility and analysis of empirical mobility traces. By discrete event simulation, we show HC...

  9. Leveraging Mobile Games for Place-Based Language Learning

    Science.gov (United States)

    Holden, Christopher L.; Sykes, Julie M.

    2011-01-01

    This paper builds on the emerging body of research aimed at exploring the educational potential of mobile technologies, specifically, how to leverage place-based, augmented reality mobile games for language learning. Mentira is the first place-based, augmented reality mobile game for learning Spanish in a local neighborhood in the Southwestern…

  10. LBS Mobile Learning System Based on Android Platform

    Directory of Open Access Journals (Sweden)

    Zhang Ya-Li

    2017-01-01

    Full Text Available In the era of mobile internet, PC-end internet services can no long satisfy people’s demands, needs for App and services on mobile phones are more urgent than ever. With increasing social competition, the concept of lifelong learning becomes more and more popular and accepted, making full use of spare time to learn at any time and any place meets updating knowledge desires of modern people, Location Based System (LBS mobile learning system based on Android platform was created under such background. In this Paper, characteristics of mobile location technology and intelligent terminal were introduced and analyzed, mobile learning system which will fulfill personalized needs of mobile learners was designed and developed on basis of location information, mobile learning can be greatly promoted and new research ideas can be expanded for mobile learning.

  11. Environmental mobile robot based on artificial intelligence and visual perception for weed elimination

    Directory of Open Access Journals (Sweden)

    Nabeel Kadim Abid AL-SAHIB

    2012-12-01

    Full Text Available This research presents a new editing design for the pioneer p3-dx mobile robot by adding a mechanical gripper for eliminating the weed and a digital camera for capturing the image of the field. Also, a wireless kit that makes control on the motor's gripper is envisaged. This work consists of two parts. The theoretical part contains a program to read the image and discover the weed coordinates which will be sent to the path planning software to discover the locations of weed, green plant and sick plant. These positions are sent then to the mobile robot navigation software. Then the wireless signal is sent to the gripper. The experimental part is represented as a digital camera that takes an image of the agricultural field, and then sends it to the computer for processing. After that the weeds coordinates are sent to the mobile robots by mobile robot navigation software. Next, the wireless signal is sent to the wireless kit controlling the motor gripper by the computer interface program; the first trial on the agricultural field shows that the mobile robot can discriminate the green plant, from weed and sick plant and can take the right decision with respect to treatment or elimination. The experimental work shows that the environmental mobile robot can detect successfully the weed, sick plant and the hale plant. The mobile robot also travels from base to the target point represented by the weed and sick plants in the optimum path. The experimental work also shows that the environmental mobile robot can eliminate the weed and cure the sick plants in a correctly way.

  12. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Science.gov (United States)

    2014-09-18

    bands: fIS M=315, 433, 868, or 915 MHz. The CC1000 devices are used in home automation and Automatic Meter Reading (AMR) applications, each of which...topologies will be challenging for similar reasons. Nodes are largely stationary in ZigBee applications used in Smart Energy, Building Automation, and Home ... Automation , which will simplify required air monitor coverage. However, ZigBee applications requiring mobile ZEDs, such as those commonly used in

  13. Map-based mobile services design, interaction and usability

    CERN Document Server

    Meng, Liqiu; Winter, Stephan; Popovich, Vasily

    2008-01-01

    This book reports the newest research and technical achievements on the following theme blocks: Design of mobile map services and its constraints; Typology and usability of mobile map services; Visualization solutions on small displays for time-critical tasks; Mobile map users; Interaction and adaptation in mobile environments; and Applications of map-based mobile services.

  14. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  15. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  16. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  17. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  18. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  19. Perception of mobile phone and base station risks.

    Science.gov (United States)

    Siegrist, Michael; Earle, Timothy C; Gutscher, Heinz; Keller, Carmen

    2005-10-01

    Perceptions of risks associated with mobile phones, base stations, and other sources of electromagnetic fields (EMF) were examined. Data from a telephone survey conducted in the German- and French-speaking parts of Switzerland are presented (N = 1,015). Participants assessed both risks and benefits associated with nine different sources of EMF. Trust in the authorities regulating these hazards was assessed as well. In addition, participants answered a set of questions related to attitudes toward EMF and toward mobile phone base stations. According to respondents' assessments, high-voltage transmission lines are the most risky source of EMF. Mobile phones and mobile phone base stations received lower risk ratings. Results showed that trust in authorities was positively associated with perceived benefits and negatively associated with perceived risks. People who use their mobile phones frequently perceived lower risks and higher benefits than people who use their mobile phones infrequently. People who believed they lived close to a base station did not significantly differ in their level of risks associated with mobile phone base stations from people who did not believe they lived close to a base station. Regarding risk regulation, a majority of participants were in favor of fixing limiting values based on the worst-case scenario. Correlations suggest that belief in paranormal phenomena is related to level of perceived risks associated with EMF. Furthermore, people who believed that most chemical substances cause cancer also worried more about EMF than people who did not believe that chemical substances are that harmful. Practical implications of the results are discussed.

  20. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  1. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  2. Cross-Platform Mobile Application Development: A Pattern-Based Approach

    Science.gov (United States)

    2012-03-01

    TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Cross-Platform Mobile Application Development: A Pattern-Based Approach 5. FUNDING...for public release; distribution is unlimited CROSS-PLATFORM MOBILE APPLICATION DEVELOPMENT: A PATTERN-BASED APPROACH Christian G. Acord...occurring design problems. We then discuss common approaches to mobile development, including common aspects of mobile application development, including

  3. Open Source Based Sensor Platform for Mobile Environmental Monitoring and Data Acquisition

    Science.gov (United States)

    Schima, Robert; Goblirsch, Tobias; Misterek, René; Salbach, Christoph; Schlink, Uwe; Francyk, Bogdan; Dietrich, Peter; Bumberger, Jan

    2016-04-01

    The impact of global change, urbanization and complex interactions between humans and the environment show different effects on different scales. However, the desire to obtain a better understanding of ecosystems and process dynamics in nature accentuates the need for observing these processes in higher temporal and spatial resolutions. Especially with regard to the process dynamics and heterogeneity of urban areas, a comprehensive monitoring of these effects remains to be a challenging issue. Open source based electronics and cost-effective sensors are offering a promising approach to explore new possibilities of mobile data acquisition and innovative strategies and thereby support a comprehensive ad-hoc monitoring and the capturing of environmental processes close to real time. Accordingly, our project aims the development of new strategies for mobile data acquisition and real-time processing of user-specific environmental data, based on a holistic and integrated process. To this end, the concept of our monitoring system covers the data collection, data processing and data integration as well as the data provision within one infrastructure. This ensures a consistent data stream and a rapid data processing. However, the overarching goal is the provision of an integrated service instead of lengthy and arduous data acquisition by hand. Therefore, the system also serves as a data acquisition assistant and gives guidance during the measurements. In technical terms, our monitoring system consists of mobile sensor devices, which can be controlled and managed by a smart phone app (Android). At the moment, the system is able to acquire temperature and humidity in space (GPS) and time (real-time clock) as a built in function. In addition, larger system functionality can be accomplished by adding further sensors for the detection of e.g. fine dust, methane or dissolved organic compounds. From the IT point of view, the system includes a smart phone app and a web service for

  4. 44 CFR 321.3 - Maintaining the mobilization base.

    Science.gov (United States)

    2010-10-01

    ... base. 321.3 Section 321.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME ADMINISTRATION) § 321.3 Maintaining the mobilization base. (a) Facilities...

  5. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  6. Intelligent Smoke Alarm System with Wireless Sensor Network Using ZigBee

    Directory of Open Access Journals (Sweden)

    Qin Wu

    2018-01-01

    Full Text Available The conflagration of fire is still a serious problem caused by humans, and houses are at a high risk of fire. Recently, people have used smoke alarms which only have one sensor to detect fire. Smoke is emitted in several forms in daily life. A single sensor is not a reliable way to detect fire. With the rapid advancement in Internet technology, people can monitor their houses remotely to determine the current condition of the house. This paper introduces an intelligent smoke alarm system that uses ZigBee transmission technology to build a wireless network, uses random forest to identify smoke, and uses E-charts for data visualization. By combining the real-time dynamic changes of various environmental factors, compared to the traditional smoke alarm, the accuracy and controllability of the fire warning are increased, and the visualization of the data enables users to monitor the room environment more intuitively. The proposed system consists of a smoke detection module, a wireless communication module, and intelligent identification and data visualization module. At present, the collected environmental data can be classified into four statuses, that is, normal air, water mist, kitchen cooking, and fire smoke. Reducing the frequency of miscalculations also means improving the safety of the person and property of the user.

  7. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  8. Collaboration and decision making tools for mobile groups

    International Nuclear Information System (INIS)

    Abrahamyan, S.; Balyan, S.; Degtyarev, A.; Ter-Minasyan, H.

    2017-01-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment dependence create difficulties and decelerate development and integration of such technologies. Also, mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with the help of ad hoc wireless local networks could eliminate hardware attachment and be also useful in terms of scientific approach. Solutions from basic internet messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decision-making and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  9. Collaboration and decision making tools for mobile groups

    Science.gov (United States)

    Abrahamyan, Suren; Balyan, Serob; Ter-Minasyan, Harutyun; Degtyarev, Alexander

    2017-12-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment-dependency creates difficulties and decelerates development and integration of such technologies. Also mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with help of ad-hoc wireless local networks could eliminate hardware-attachment and be useful also in terms of scientific approach. Solutions from basic internet-messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decisionmaking and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  10. 78 FR 57855 - Announcement of Requirements and Registration for “System for Locating People Using Electricity...

    Science.gov (United States)

    2013-09-20

    ... communication methods/ technologies; e.g. Ethernet, Wi-Fi, Mobile (CDMA, GSM, LTE), Amateur Radio, ZigBee... additional methods (e.g., mobile and social media apps) are required to establish the infrastructure needed... limitation, for advertising and promotional purposes relating to the challenge. [[Page 57857

  11. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  12. Establishment of mobile based nuclear safety inspection system

    International Nuclear Information System (INIS)

    Kim, In Hyeon; Lee, Yoon; Choi, Keun Ho; Lee, Kwang Pyo; Cha, Gi Hyeon; Gook, Cheol Woong; Park, Tae Joo; Kang, Roc Hyeong; Kim, Ji Young; Yoo, Mi Jung

    2005-03-01

    We have developed the mobile-based atomic energy status real time monitoring system and mobile-based atomic energy accident and trouble retrieval system through this study. The mobile-based atomic energy status real time monitoring system is the system enabling its users to monitor nineteen (19) Nuclear Power Plants under operation in the real time based on the PDA(Personal Digital Assistance) via a wireless communication. We have developed the mobile information providing server program and PDA client program for the purpose of providing the atomic energy status information service on the PDA by linking the real time atomic energy status information collected by the computerized technical advisory system for the radiological emergency installed and operated by the KINS. The mobile based atomic energy accident and trouble retrieval system has been developed under the intention of enabling the site inspector to effectively use the past information upon performing the test works at the sites through the local retrieval of past accidents and troubles occurred in the Nuclear Power Plants at the mobile client(PDA). In this regard, we have developed the client program to retrieve the atomic energy accident and trouble status by installing the accident and trouble information database. We also include the function supporting the rapid site report through the employees' information retrieval, site status image file transmission, e-mail and SMS(Short Message Service)

  13. OD Matrix Acquisition Based on Mobile Phone Positioning Data

    Directory of Open Access Journals (Sweden)

    Xiaoqing ZUO

    2014-06-01

    Full Text Available Dynamic OD matrix is basic data of traffic travel guidance, traffic control, traffic management and traffic planning, and reflects the basic needs of travelers on the traffic network. With the rising popularity of positioning technology and the communication technology and the generation of huge mobile phone users, the mining and use of mobile phone positioning data, can get more traffic intersections and import and export data. These data will be integrated into obtaining the regional OD matrix, which is bound to bring convenience. In this article, mobile phone positioning data used in the data acquisition of intelligent transportation system, research a kind of regional dynamic OD matrix acquisition method based on the mobile phone positioning data. The method based on purpose of transportation, using time series similarity classification algorithm based on piecewise linear representation of the corner point (CP-PLR, mapping each base station cell to traffic zone of different traffic characteristics, and through a series of mapping optimization of base station cell to traffic zone to realize city traffic zone division based on mobile phone traffic data, on the basis, adjacency matrix chosen as the physical data structure of OD matrix storage, the principle of obtaining regional dynamic OD matrix based on the mobile phone positioning data are expounded, and the algorithm of obtaining regional dynamic OD matrix based on mobile phone positioning data are designed and verified.

  14. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    Science.gov (United States)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  15. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  16. 47 CFR 90.233 - Base/mobile non-voice operations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Base/mobile non-voice operations. 90.233... SERVICES PRIVATE LAND MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.233 Base/mobile non-voice operations. The use of A1D, A2D, F1D, F2D, G1D, or G2D emission may be authorized to base...

  17. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses....... A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes....... Ad-talk only mobilizes PWOM. PWOM mediates and leverages ad-talk’s influence on consumer responses, because PWOM adds personal experiences, preferences and social acceptance to the brand promise seen in the firm’s advertizing. This changes the value of the brand and makes the firm’s offer better than...

  18. Development of an advanced mobile base for personal mobility and manipulation appliance generation II robotic wheelchair.

    Science.gov (United States)

    Wang, Hongwu; Candiotti, Jorge; Shino, Motoki; Chung, Cheng-Shiu; Grindle, Garrett G; Ding, Dan; Cooper, Rory A

    2013-07-01

    This paper describes the development of a mobile base for the Personal Mobility and Manipulation Appliance Generation II (PerMMA Gen II robotic wheelchair), an obstacle-climbing wheelchair able to move in structured and unstructured environments, and to climb over curbs as high as 8 inches. The mechanical, electrical, and software systems of the mobile base are presented in detail, and similar devices such as the iBOT mobility system, TopChair, and 6X6 Explorer are described. The mobile base of PerMMA Gen II has two operating modes: "advanced driving mode" on flat and uneven terrain, and "automatic climbing mode" during stair climbing. The different operating modes are triggered either by local and dynamic conditions or by external commands from users. A step-climbing sequence, up to 0.2 m, is under development and to be evaluated via simulation. The mathematical model of the mobile base is introduced. A feedback and a feed-forward controller have been developed to maintain the posture of the passenger when driving over uneven surfaces or slopes. The effectiveness of the controller has been evaluated by simulation using the open dynamics engine tool. Future work for PerMMA Gen II mobile base is implementation of the simulation and control on a real system and evaluation of the system via further experimental tests.

  19. New mobile methods for dietary assessment: review of image-assisted and image-based dietary assessment methods.

    Science.gov (United States)

    Boushey, C J; Spoden, M; Zhu, F M; Delp, E J; Kerr, D A

    2017-08-01

    For nutrition practitioners and researchers, assessing dietary intake of children and adults with a high level of accuracy continues to be a challenge. Developments in mobile technologies have created a role for images in the assessment of dietary intake. The objective of this review was to examine peer-reviewed published papers covering development, evaluation and/or validation of image-assisted or image-based dietary assessment methods from December 2013 to January 2016. Images taken with handheld devices or wearable cameras have been used to assist traditional dietary assessment methods for portion size estimations made by dietitians (image-assisted methods). Image-assisted approaches can supplement either dietary records or 24-h dietary recalls. In recent years, image-based approaches integrating application technology for mobile devices have been developed (image-based methods). Image-based approaches aim at capturing all eating occasions by images as the primary record of dietary intake, and therefore follow the methodology of food records. The present paper reviews several image-assisted and image-based methods, their benefits and challenges; followed by details on an image-based mobile food record. Mobile technology offers a wide range of feasible options for dietary assessment, which are easier to incorporate into daily routines. The presented studies illustrate that image-assisted methods can improve the accuracy of conventional dietary assessment methods by adding eating occasion detail via pictures captured by an individual (dynamic images). All of the studies reduced underreporting with the help of images compared with results with traditional assessment methods. Studies with larger sample sizes are needed to better delineate attributes with regards to age of user, degree of error and cost.

  20. 78 FR 64216 - Announcement of Requirements and Registration for “System for Locating People Using Electricity...

    Science.gov (United States)

    2013-10-28

    ..., Mobile (CDMA, GSM, LTE), Amateur Radio, ZigBee; Ability to switch between/rollover spectrum/technologies... near completion, coding software is still needed and additional methods (e.g., mobile and social media... advertising and promotional purposes relating to the challenge. About ASPR ASPR leads HHS in preparing the...

  1. Ethernet-based mobility architecture for 5G

    DEFF Research Database (Denmark)

    Cattoni, Andrea Fabio; Mogensen, Preben; Vesterinen, Seppo

    2014-01-01

    of mobile devices and sensors. In this paper we propose a paradigm shift for the evolved Packet Core for the future 5G system. By leveraging on the economy of scale of software–based ICT technologies, namely Software Defined Networking and cloud computing, we propose a hierarchically cloudified mobile...... network. In particular, in this paper we focus on the mobility aspects within such new architecture, proposing low latency Layer 2 solutions for the Access Network, while exploiting aggregating Layer 3 mobility functionalities in the regional and national clouds....

  2. Mobile Agent based Market Basket Analysis on Cloud

    OpenAIRE

    Waghmare, Vijayata; Mukhopadhyay, Debajyoti

    2014-01-01

    This paper describes the design and development of a location-based mobile shopping application for bakery product shops. Whole application is deployed on cloud. The three-tier architecture consists of, front-end, middle-ware and back-end. The front-end level is a location-based mobile shopping application for android mobile devices, for purchasing bakery products of nearby places. Front-end level also displays association among the purchased products. The middle-ware level provides a web ser...

  3. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  4. Description of a Mobile-based Electronic Informed Consent System Development.

    Science.gov (United States)

    Hwang, Min-A; Kwak, In Ja

    2015-01-01

    Seoul National University Hospital constructed and implemented a computer-based informed consent system in December 2011. As of 2013, 30% of the informed consents were still filled out manually on paper. Patients and medical staff continuously suggested the implementation of a system for electronic informed consent using portable devices. Therefore, a mobile-based system for electronic informed consent was developed in 2013 to prevent the issues that arise with computer-based systems and paper informed consent. The rate of filling out electronic informed consent increased from 69% to 95% following the implementation of the mobile-based electronic informed consent. This construction of a mobile-based electronic informed consent system would be a good reference point for the development of a mobile-based Electronic Medical Record and for various mobile system environments in medical institutions.

  5. Design and Fabricate the Remote Monitor on the Scenic Spot Based on Integrated Sensor System

    Directory of Open Access Journals (Sweden)

    Xiaohui Wang

    2014-10-01

    Full Text Available Based on the embedded Linux system, established the integrated sensing system to monitor the scenic spot and transmit the collected data to the users. The platform based on the ARM11 development board as the hardware of the system. Used the sensors to collect the different data and pictures and then they were transmitted by the wired and wireless mode. Set up the small Web server by the Boa (small Web server and realized the integrated Web technology and CGI (Common Gateway Interface program. According to the difference information of the scenic spot, the mobile platform collected the needed data and transmitted it to the control platform by the ZigBee wireless module and displayed in the embedded platform. The administrator can realize monitoring all the spots of the scenic and control the terminal equipments in the whole day.

  6. Business Models for NFC based mobile payments

    OpenAIRE

    Johannes Sang Un Chae; Jonas Hedman

    2015-01-01

    Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experienc...

  7. Mobile Communication and Work Practices in Knowledge-based Organizations

    Directory of Open Access Journals (Sweden)

    Pertti Hurme

    2005-01-01

    Full Text Available This paper examines the role of mobile communication, mobile tools and work practices in the context of organizations, especially knowledge-based organizations. Today, organizations are highly complex and diverse. Not surprisingly, various solutions to incorporating mobile tools and mobile communication in organizations have been devised. Challenges to technological development and research on mobile communication are presented.

  8. Biologically based neural network for mobile robot navigation

    Science.gov (United States)

    Torres Muniz, Raul E.

    1999-01-01

    The new tendency in mobile robots is to crete non-Cartesian system based on reactions to their environment. This emerging technology is known as Evolutionary Robotics, which is combined with the Biorobotic field. This new approach brings cost-effective solutions, flexibility, robustness, and dynamism into the design of mobile robots. It also provides fast reactions to the sensory inputs, and new interpretation of the environment or surroundings of the mobile robot. The Subsumption Architecture (SA) and the action selection dynamics developed by Brooks and Maes, respectively, have successfully obtained autonomous mobile robots initiating this new trend of the Evolutionary Robotics. Their design keeps the mobile robot control simple. This work present a biologically inspired modification of these schemes. The hippocampal-CA3-based neural network developed by Williams Levy is used to implement the SA, while the action selection dynamics emerge from iterations of the levels of competence implemented with the HCA3. This replacement by the HCA3 results in a closer biological model than the SA, combining the Behavior-based intelligence theory with neuroscience. The design is kept simple, and it is implemented in the Khepera Miniature Mobile Robot. The used control scheme obtains an autonomous mobile robot that can be used to execute a mail delivery system and surveillance task inside a building floor.

  9. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  10. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  11. Mobile-based biology edutainment application for secondary schools

    Science.gov (United States)

    AL-Modwahi, Ashraf Abbas M.; Kaisara, Onalenna; Parkizkar, Behrang; Habibi Lashkari, Arash

    2013-03-01

    The high increase of mobile technology is leading to mobilized learning environment, thus making traditional learning to diminish slowly and become inactive and unproductive. Learners worldwide are being attracted to mobile environment more so that it promotes anytime, anywhere learning. Biology as a secondary school subject will be applicable for mobile learning for such a time and generation as this. This paper is therefore an attempt to mobile based biology edutainment system for the students who normally range from the ages of thirteen to sixteen.

  12. Mobile based optical form evaluation system

    Directory of Open Access Journals (Sweden)

    Asım Sinan YÜKSEL

    2016-05-01

    Full Text Available Optical forms that contain multiple-choice answers are widely used both for electing students and evaluating student achievements in education systems in our country and worldwide. Optical forms are evaluated by employing optical mark recognition techniques through optical readers. High cost of these machines, limited access to them, long waiting time for evaluation results make the process hard for educationists working in cities or countries. In this study, a mobile application was developed for the educationists who own mobile phones or tablets for the purpose of evaluating students' answer sheets quickly and independent of location and optical readers. Optical form recognition, reading and evaluation processes are done on the image of student's answer sheet that is taken with the mobile phone or tablet of educationist. The Android based mobile application that we developed has a user-friendly interface, high success rate and is the first of our knowledge application that operates on mobile platforms in this field.

  13. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  14. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  15. Design of Smart Home Control System Based on ARM and ZigBee%基于ARM和ZigBee的智能家居控制系统设计

    Institute of Scientific and Technical Information of China (English)

    黄国伟; 彭玲; 林伟腾

    2014-01-01

    为实现家居设备远程控制智能化,提出一种基于ARM、ZigBee和GPRS技术的智能家居控制系统。系统以ARM9处理器S3C2440为控制核心,利用ZigBee技术组建无线传感网络,实现家庭内部各种设备的无线连接和信息采集功能。通过在ARM上移植BOA Web服务器,同时利用 GPRS技术接入移动通信网络,实现用户利用远端PC和手机远程监控家居环境设备的功能。测试结果表明,系统达到设计要求。%In order to achieve the remote monitoring and control household ,designs a smart home control system based on ARM, ZigBee and GPRS technologies. The system uses ARM920T embedded processor S3C2440 as the control center, uses ZigBee wireless sensor networks to collect and transmit various household data, uses BOA Web servicer to build on ARM platform to achieve the landing Web page function, uses GPRS technology to access mobile telecommunication network, so as to achieve the remote control function by PC and mobile of users. The test result shows that the system conforms to the design requirements.

  16. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  17. 44 CFR 321.2 - Selection of the mobilization base.

    Science.gov (United States)

    2010-10-01

    ... base. 321.2 Section 321.2 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE, DEPARTMENT OF ENERGY, MARITIME ADMINISTRATION) § 321.2 Selection of the mobilization base. (a) The Department...

  18. Research on user interest modeling in mobile ad recommendation%手机广告推荐中的用户兴趣建模研究

    Institute of Scientific and Technical Information of China (English)

    顾其威; 郭鹏; 潘锋

    2012-01-01

    为了增强基于WAP网页的手机广告推荐中用户建模的准确性,并对“非邀”式广告推荐中脱离用户兴趣试探性推荐进行修正,针对手机广告推荐中手机屏幕小、用户注意力集中等特点,根据用户对广告的访问历史和操作模式建立其广告兴趣模型和非兴趣模型,同时分析用户网页访问模式探测其网页兴趣度,在此基础上建立用户综合兴趣模型.分别采用基于网页兴趣模型、基于广告兴趣模型和基于用户综合兴趣模型进行广告推荐,随着样本空间增大,综合兴趣模型的查准率明显优于另两者.实验验证了用户综合兴趣模型在手机广告推荐中的有效性和优越性.%For enhancing the accuracy of mobile advertising recommendation on the basis of WAP Web page, and amending the exploratory recommended in the mobile advertising recommendation of which recommendation pattern is No Invitation, on account of mobile phone' s small screen and user' s great attention, builds advertising interest model and noninterest model according the ads visiting history and operation mode. Simultaneously, analyzed the Web access mode to detect the user' s Web interest degree, proposed a user comprehensive interest model which considering the user' s Web interest and user' s ads interest. Employed three recommended patterns to recommend the mobile advertising based on Web page interest model, advertising interest model and comprehensive interest model, with the sample space growing, the accuracy of comprehensive interest model was superior to other two models. Experiments prove that the effectiveness and superiority of comprehensive model in the mobile advertising recommendation.

  19. Context-Aware Community Construction in Proximity-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Na Yu

    2015-01-01

    Full Text Available Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.

  20. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  1. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  2. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  3. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  4. A Game Theory Based Approach for Power Efficient Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kun Hua

    2017-01-01

    Full Text Available Green communications are playing critical roles in vehicular ad hoc networks (VANETs, while the deployment of a power efficient VANET is quite challenging in practice. To add more greens into such kind of complicated and time-varying mobile network, we specifically investigate the throughput and transmission delay performances for real-time and delay sensitive services through a repeated game theoretic solution. This paper has employed Nash Equilibrium in the noncooperative game model and analyzes its efficiency. Simulation results have shown an obvious improvement on power efficiency through such efforts.

  5. Mobile phone-based interventions for smoking cessation.

    Science.gov (United States)

    Whittaker, Robyn; McRobbie, Hayden; Bullen, Chris; Rodgers, Anthony; Gu, Yulong

    2016-04-10

    Access to mobile phones continues to increase exponentially globally, outstripping access to fixed telephone lines, fixed computers and the Internet. Mobile phones are an appropriate and effective option for the delivery of smoking cessation support in some contexts. This review updates the evidence on the effectiveness of mobile phone-based smoking cessation interventions. To determine whether mobile phone-based smoking cessation interventions increase smoking cessation in people who smoke and want to quit. For the most recent update, we searched the Cochrane Tobacco Addiction Group Specialised Register in April 2015. We also searched the UK Clinical Research Network Portfolio for current projects in the UK, and the ClinicalTrials.gov register for ongoing or recently completed studies. We searched through the reference lists of identified studies and attempted to contact the authors of ongoing studies. We applied no restrictions on language or publication date. We included randomised or quasi-randomised trials. Participants were smokers of any age who wanted to quit. Studies were those examining any type of mobile phone-based intervention for smoking cessation. This included any intervention aimed at mobile phone users, based around delivery via mobile phone, and using any functions or applications that can be used or sent via a mobile phone. Review authors extracted information on risk of bias and methodological details using a standardised form. We considered participants who dropped out of the trials or were lost to follow-up to be smoking. We calculated risk ratios (RR) and 95% confidence intervals (CI) for each included study. Meta-analysis of the included studies used the Mantel-Haenszel fixed-effect method. Where meta-analysis was not possible, we presented a narrative summary and descriptive statistics. This updated search identified 12 studies with six-month smoking cessation outcomes, including seven studies completed since the previous review. The

  6. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  7. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  8. Incorporating Mobile Phone Technologies to Expand Evidence-Based Care.

    Science.gov (United States)

    Jones, Deborah J; Anton, Margaret; Gonzalez, Michelle; Honeycutt, Amanda; Khavjou, Olga; Forehand, Rex; Parent, Justin

    2015-08-01

    Ownership of mobile phones is on the rise, a trend in uptake that transcends age, region, race, and ethnicity, as well as income. It is precisely the emerging ubiquity of mobile phones that has sparked enthusiasm regarding their capacity to increase the reach and impact of health care, including mental health care. Community-based clinicians charged with transporting evidence-based interventions beyond research and training clinics are in turn, ideally and uniquely situated to capitalize on mobile phone uptake and functionality to bridge the efficacy to effectiveness gap. As such, this article delineates key considerations to guide these frontline clinicians in mobile phone-enhanced clinical practice, including an overview of industry data on the uptake of and evolution in the functionality of mobile phone platforms, conceptual considerations relevant to the integration of mobile phones into practice, representative empirical illustrations of mobile-phone enhanced assessment and treatment, and practical considerations relevant to ensuring the feasibility and sustainability of such an approach.

  9. Incorporating Mobile Phone Technologies to Expand Evidence-Based Care

    Science.gov (United States)

    Jones, Deborah J.; Anton, Margaret; Gonzalez, Michelle; Honeycutt, Amanda; Khavjou, Olga; Forehand, Rex; Parent, Justin

    2014-01-01

    Ownership of mobile phones is on the rise, a trend in uptake that transcends age, region, race, and ethnicity, as well as income. It is precisely the emerging ubiquity of mobile phones that has sparked enthusiasm regarding their capacity to increase the reach and impact of health care, including mental health care. Community-based clinicians charged with transporting evidence-based interventions beyond research and training clinics are in turn, ideally and uniquely situated to capitalize on mobile phone uptake and functionality to bridge the efficacy to effectiveness gap. As such, this article delineates key considerations to guide these frontline clinicians in mobile phone-enhanced clinical practice, including an overview of industry data on the uptake of and evolution in the functionality of mobile phone platforms, conceptual considerations relevant to the integration of mobile phones into practice, representative empirical illustrations of mobile-phone enhanced assessment and treatment, and practical considerations relevant to ensuring the feasibility and sustainability of such an approach. PMID:26213458

  10. Business Models for NFC based mobile payments

    Directory of Open Access Journals (Sweden)

    Johannes Sang Un Chae

    2015-01-01

    Full Text Available Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experience with their mobile wallet through a multifaceted value proposition. The delivery of its offering requires cooperation from multiple stakeholders and the creation of an ecosystem. Furthermore, they focus on the scalability of their value propositions. Originality / value: The paper offers an applicable business model framework that allows practitioners and academics to study current and future mobile payment approaches.

  11. Business Models for NFC Based Mobile Payments

    DEFF Research Database (Denmark)

    Chae, Johannes Sang-Un; Hedman, Jonas

    2015-01-01

    Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper...... investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experience with their mobile wallet through a multifaceted value proposition. The delivery of its offering requires cooperation...... from multiple stakeholders and the creation of an ecosystem. Furthermore, they focus on the scalability of their value propositions. Originality / value: The paper offers an applicable business model framework that allows practitioners and academics to study current and future mobile payment approaches....

  12. Mobile Prototyping Platforms for Remote Engineering Applications

    Directory of Open Access Journals (Sweden)

    Karsten Henke

    2009-08-01

    Full Text Available This paper describes a low-cost mobile communication platform as a universal rapid-prototyping system, which is based on the Quadrocopter concept. At the Integrated Hardware and Software Systems Group at the Ilmenau University of Technology these mobile platforms are used to motivate bachelor and master students to study Computer Engineering sciences. This could be done by increasing their interest in technical issues, using this platform as integral part of a new ad-hoc lab to demonstrate different aspects in the area of Mobile Communication as well as universal rapid prototyping nodes to investigate different mechanisms for self-organized mobile communication systems within the International Graduate School on Mobile Communications. Beside the three fields of application, the paper describes the current architecture concept of the mobile prototyping platform as well as the chosen control mechanism and the assigned sensor systems to fulfill all the required tasks.

  13. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  14. Location-Based Services and Privacy Protection Under Mobile Cloud Computing

    OpenAIRE

    Yan, Yan; Xiaohong, Hao; Wanjun, Wang

    2015-01-01

    Location-based services can provide personalized services based on location information of moving objects and have already been widely used in public safety services, transportation, entertainment and many other areas. With the rapid development of mobile communication technology and popularization of intelligent terminals, there will be great commercial prospects to provide location-based services under mobile cloud computing environment. However, the high adhesion degree of mobile terminals...

  15. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  16. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  17. Design of a multimedia gateway for mobile devices

    Science.gov (United States)

    Hens, Raf; Goeminne, Nico; Van Hoecke, Sofie; Verdickt, Tom; Bouve, Thomas; Gielen, Frank; Demeester, Piet

    2005-03-01

    Although mobile users are currently offered a lot more capabilities on their mobile devices, they still experience some limitations. They can surf the Internet, read their e-mail and receive MMS messages, but they have limited processing power, storage capacity and bandwidth and are limited in their access to peripherals (e.g. printers). We have designed and implemented a multimedia gateway for mobile devices that reduces these limitations. It gives the mobile devices transparent access to high capacity devices connected to the gateway, which is built around a central, modularly extensible server that can run on any PC or home gateway. It manages two sets of modules: one set offering the actual services and another set handling the IP-based wireless interaction with the client applications on the mobile devices. These modules can be added and removed dynamically, offering new services on the fly. Currently services for storage, printing, domotics and playing music are provided. Others can easily be added later on. This paper discusses the architecture and development, the management of modules, the actual services and their benefits. Besides a proprietary implementation, it also looks into OSGi and how both platforms compare to each other, concerning design, architecture, ease of development, functionality, ...

  18. Field-Based Experiential Learning Using Mobile Devices

    Science.gov (United States)

    Hilley, G. E.

    2015-12-01

    Technologies such as GPS and cellular triangulation allow location-specific content to be delivered by mobile devices, but no mechanism currently exists to associate content shared between locations in a way that guarantees the delivery of coherent and non-redundant information at every location. Thus, experiential learning via mobile devices must currently take place along a predefined path, as in the case of a self-guided tour. I developed a mobile-device-based system that allows a person to move through a space along a path of their choosing, while receiving information in a way that guarantees delivery of appropriate background and location-specific information without producing redundancy of content between locations. This is accomplished by coupling content to knowledge-concept tags that are noted as fulfilled when users take prescribed actions. Similarly, the presentation of the content is related to the fulfillment of these knowledge-concept tags through logic statements that control the presentation. Content delivery is triggered by mobile-device geolocation including GPS/cellular navigation, and sensing of low-power Bluetooth proximity beacons. Together, these features implement a process that guarantees a coherent, non-redundant educational experience throughout a space, regardless of a learner's chosen path. The app that runs on the mobile device works in tandem with a server-side database and file-serving system that can be configured through a web-based GUI, and so content creators can easily populate and configure content with the system. Once the database has been updated, the new content is immediately available to the mobile devices when they arrive at the location at which content is required. Such a system serves as a platform for the development of field-based geoscience educational experiences, in which students can organically learn about core concepts at particular locations while individually exploring a space.

  19. Network constellations for mobile payments - Influence of the leading partner on NFC-based mobile digital wallets

    OpenAIRE

    Sánchez Garvín, Mario

    2011-01-01

    The mobile payments industry, which is currently at an early stage of development, is taking the direction to be established mainly as an NFC-based industry, and, moreover, led by the mobile digital wallets setting. A mobile digital wallet is a complete payment app for your NFC-enabled mobile phone that enables consumers to pay at stores at the point of sale with a mobile phone. The digital wallet, which is associated with a credit card, integrates all payment-related services like the manage...

  20. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  1. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architectu...

  2. Simulación de Redes de Sensores Inalámbricos: un Modelo Energético a Nivel de Nodo-Sensor Bajo las Especificaciones Ieee 802.15.4tm y Zigbee

    Directory of Open Access Journals (Sweden)

    Milton Osvaldo Amarillo Rojas

    2015-10-01

    Full Text Available Este artículo presenta el desarrollo de un modelo de simulación para una red de sensores inalámbricos que se rige por las especificaciones IEEE 802.15.4 y ZigBee y que utiliza la configuración de la beacon habilitada. El modelo de simulación también implementa un modelo de consumo de energía para los tres tipos de nodossensores de la red (Coordinador ZigBee, Router y Dispositivo Final. El principal aporte de este trabajo radica en que por medio de la simulación se puede estimar el consumo de energía de un nodo-sensor y, de esta forma, analizar el consumo de energía de cada uno de los tipos del mismo. Así mismo, al poder estimar el consumo de energía del nodo-sensor, también se puede estimar su tiempo de vida. Por último, se analiza la razón, por la cual, el consumo de energía de los nodos es inversamente proporcional a la latencia de los datos dentro de la red.

  3. Mobil/Badger to market zeolite-based cumene technology

    International Nuclear Information System (INIS)

    Rotman, D.

    1993-01-01

    Badger (Cambridge, MA) and Mobil (Fairfax, VA) are ready to jointly license a new cumene technology that they say achieves higher yields and product purity than existing processes. The zeolite-based technology is scheduled to be introduced at next month's DeWitt Petrochemical Review in Houston. The Mobil/Badger technology aims to challenge the dominant position of UOP's (Des Plaines, IL) solid phosphoric acid (SPA) catalyst process - which accounts for 80%-90% of the world's cumene production. In addition, Monsanto/Kellogg's aluminum chloride-based technology has gained significant momentum since its introduction in the 1980s. And late last year, ABB Lummus Crest (Bloomfield, NJ) also began marketing a zeolite-based cumene technology. While all the technologies make cumene via the alkylation of benzene with propylene, the Mobil/Badger process uses a zeolite-containing catalyst designed by Mobil to selectively catalyze the benzene/propylene reaction, avoiding unwanted propylene oligomerization. Because the olefin reactions are so fast, says Frank A. Demers, Badger's v.p./technology development and marketing, other zeolite technologies are forced to use complex reactor arrangements to stop the propylene-propylene reactions. However, he says, 'Mobil has designed a catalyst that wants to react benzene with propylene to make cumene.'

  4. N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents

    Directory of Open Access Journals (Sweden)

    Pallavi Bagga

    2017-12-01

    Full Text Available From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.

  5. Adherence to internet-based mobile-supported stress management

    DEFF Research Database (Denmark)

    Zarski, A C; Lehr, D.; Berking, M.

    2016-01-01

    of this study was to investigate the influence of different guidance formats (content-focused guidance, adherence-focused guidance, and administrative guidance) on adherence and to identify predictors of nonadherence in an Internet-based mobile-supported stress management intervention (ie, GET.ON Stress......) for employees. Methods: The data from the groups who received the intervention were pooled from three randomized controlled trials (RCTs) that evaluated the efficacy of the same Internet-based mobile-supported stress management intervention (N=395). The RCTs only differed in terms of the guidance format...... of the predictors significantly predicted nonadherence. Conclusions: Guidance has been shown to be an influential factor in promoting adherence to an Internet-based mobile-supported stress management intervention. Adherence-focused guidance, which included email reminders and feedback on demand, was equivalent...

  6. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  7. Reengineering a PC-based System into the Mobile Device Product Line

    DEFF Research Database (Denmark)

    Zhang, Weishan; Jarzabek, Stanislaw; Loughran, Neil

    2003-01-01

    There is a growing demand to port existing PC-based software systems to mobile device platforms. Systems running on mobile devices share basic characteristics with their PC-based counterparts, but differ from them in details of user interfaces, application models, etc. Systems running on mobile...... devices must also perform well using less memory than PC-based systems. Mobile devices themselves are different from each other in many ways, too. We describe how we made an existing PC-based City Guide System available on a wide range of mobile devices, in a cost-effective way. We applied "reengineering...... into a product line architecture" approach to achieve the goal. Our product line architecture facilitates reuse via generation. We generate specific City Guide Systems for target platforms including PC, Pocket PC and other mobile devices, from generic meta-components that form the City Guide System product line...

  8. Energy generation for an ad hoc wireless sensor network-based monitoring system using animal head movement

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Blanes-Vidal, Victoria; Jørgensen, Rasmus Nyholm

    2011-01-01

    are not easily accessible. Therefore, exploring novel sources of energy generation rather than operating electronics only on limited power supplies such as batteries is a major challenge. Monitoring free-ranging animal behavior is an application in which the entities (animals) within the MANET are not readily...... that the amount of energy generated by the vertical neck–head movement of sheep during grazing can be converted to useful electrical power adequate to provide power for operation of wireless sensor nodes on a continuous basis within a MANET-based animal behavior monitoring system.......The supply of energy to electronics is an imperative constraining factor to be considered during the design process of mobile ad hoc wireless sensor networks (MANETs). This influence is especially important when the MANET is deployed unattended or the wireless modules within the MANET...

  9. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    OpenAIRE

    Lidong Wang; Cheryl Ann Alexander

    2014-01-01

    Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...

  10. Voxel-based analysis of cerebral glucose metabolism in AD and non-AD degenerative dementia using statistical parametric mapping

    International Nuclear Information System (INIS)

    Li Zugui; Gao Shuo; Zhang Benshu; Ma Aijun; Cai Li; Li Dacheng; Li Yansheng; Liu Lei

    2008-01-01

    Objective: It is know that Alzheimer's disease (AD) and non-AD degenerative dementia have some clinical features in common. The aim of this study was to investigate the specific patterns of regional, cerebral glucose metabolism of AD and non-AD degenerative dementia patients, using a voxel-based 18 F-fluorodeoxyglucose (FDG) PET study. Methods: Twenty-three AD patients and 24 non-AD degenerative dementia patients including 9 Parkinson's disease with dementia(PDD), 7 frontal-temporal dementia (FTD), 8 dementia of Lewy bodies (DLB) patients, and 40 normal controls (NC)were included in the study. To evaluate the relative cerebral metabolic rate of glucose (rCMRglc), 18 F-FDG PET imaging was performed in all subjects. Subsequently, statistical comparison of PET data with NC was performed using statistical parametric mapping (SPM). Results: The AD-associated FDG imaging pattern typically presented as focal cortical hypometabolism in bilateral parietotemporal association cortes and(or) frontal lobe and the posterior cingulate gyms. As compared with the comparative NC, FTD group demonstrated significant regional reductions in rCMRglc in bilateral frontal, parietal lobes, the cingulate gyri, insulae, left precuneus, and the subcortical structures (including right putamen, right medial dorsal nucleus and ventral anterior nucleus). The PDD group showed regional reductions in rCMRglc in bilateral frontal cortexes, parietotemporal association cortexes, and the subcortical structures (including left caudate, right putamen, the dorsomedial thalamus, lateral posterior nucleus, and pulvinar). By the voxel-by-voxel comparison between the DLB group and NC group, regional reductions in rCMRglc included bilateral occipital cortexes, precuneuses, frontal and parietal lobes, left anterior cingulate gyms, right superior temporal cortex, and the subcortical structures including putamen, caudate, lateral posterior nucleus, and pulvinar. Conclusions: The rCMRglc was found to be different

  11. A Storyboard-Based Interface for Mobile Video Browsing

    NARCIS (Netherlands)

    Hürst, Wolfgang|info:eu-repo/dai/nl/313710589; Hoet, Miklas; van de Werken, Rob

    2015-01-01

    We present an interface design for video browsing on mobile devices such as tablets that is based on storyboards and optimized with respect to content visualization and interaction design. In particular, we consider scientific results from our previous studies on mobile visualization (e.g., about

  12. mPano: cloud-based mobile panorama view from single picture

    Science.gov (United States)

    Li, Hongzhi; Zhu, Wenwu

    2013-09-01

    Panorama view provides people an informative and natural user experience to represent the whole scene. The advances on mobile augmented reality, mobile-cloud computing, and mobile internet can enable panorama view on mobile phone with new functionalities, such as anytime anywhere query where a landmark picture is and what the whole scene looks like. To generate and explore panorama view on mobile devices faces significant challenges due to the limitations of computing capacity, battery life, and memory size of mobile phones, as well as the bandwidth of mobile Internet connection. To address the challenges, this paper presents a novel cloud-based mobile panorama view system that can generate and view panorama-view on mobile devices from a single picture, namely "Pano". In our system, first, we propose a novel iterative multi-modal image retrieval (IMIR) approach to get spatially adjacent images using both tag and content information from the single picture. Second, we propose a cloud-based parallel server synthing approach to generate panorama view in cloud, against today's local-client synthing approach that is almost impossible for mobile phones. Third, we propose predictive-cache solution to reduce latency of image delivery from cloud server to the mobile client. We have built a real mobile panorama view system and perform experiments. The experimental results demonstrated the effectiveness of our system and the proposed key component technologies, especially for landmark images.

  13. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  14. Mobile cosmetics advisor: an imaging based mobile service

    Science.gov (United States)

    Bhatti, Nina; Baker, Harlyn; Chao, Hui; Clearwater, Scott; Harville, Mike; Jain, Jhilmil; Lyons, Nic; Marguier, Joanna; Schettino, John; Süsstrunk, Sabine

    2010-01-01

    Selecting cosmetics requires visual information and often benefits from the assessments of a cosmetics expert. In this paper we present a unique mobile imaging application that enables women to use their cell phones to get immediate expert advice when selecting personal cosmetic products. We derive the visual information from analysis of camera phone images, and provide the judgment of the cosmetics specialist through use of an expert system. The result is a new paradigm for mobile interactions-image-based information services exploiting the ubiquity of camera phones. The application is designed to work with any handset over any cellular carrier using commonly available MMS and SMS features. Targeted at the unsophisticated consumer, it must be quick and easy to use, not requiring download capabilities or preplanning. Thus, all application processing occurs in the back-end system and not on the handset itself. We present the imaging pipeline technology and a comparison of the services' accuracy with respect to human experts.

  15. Power Management of MEMS-Based Storage Devices for Mobile Systems

    NARCIS (Netherlands)

    Khatib, M.G.; Hartel, Pieter H.

    2008-01-01

    Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. MEMS-based storage devices should also be energy efficient for deployment in mobile systems. The problem is that MEMS-based storage devices are mechanical,

  16. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

    Directory of Open Access Journals (Sweden)

    Qingqing Xie

    2016-11-01

    Full Text Available With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP can provide location-based service (LBS for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman algorithm and ciphertext policy attribute-based encryption (CP-ABE scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA and efficient enough for practical applications in terms of user side computation overhead.

  17. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  18. Zero added oxygen for high quality sputtered ITO: A data science investigation of reduced Sn-content and added Zr

    International Nuclear Information System (INIS)

    Peshek, Timothy J.; Burst, James M.; Coutts, Timothy J.; Gessert, Timothy A.

    2016-01-01

    The authors demonstrate mobilities of >45 cm 2 /V s for sputtered tin-doped indium oxide (ITO) films at zero added oxygen. All films were deposited with 5 wt. % SnO 2 , instead of the more conventional 8–10 wt. %, and had varying ZrO 2 content from 0 to 3 wt. %, with a subsequent reduction in In 2 O 3 content. These films were deposited by radio-frequency magnetron sputtering from nominally stoichiometric targets with varying oxygen partial pressure in the sputter ambient. Anomalous behavior was discovered for films with no Zr-added, where a bimodality of high and low mobilities was discovered for nominally similar growth conditions. However, all films showed the lowest resistivity and highest mobilities when the oxygen partial pressure in the sputter ambient was zero. This result is contrasted with several other reports of ITO transport performance having a maximum for small but nonzero oxygen partial pressure. This result is attributed to the reduced concentration of SnO 2 . The addition of ZrO 2 yielded the highest mobilities at >55 cm 2 /V s and the films showed a modest increase in optical transmission with increasing Zr-content

  19. Mobile phone based imaging system for selected tele-healthcare applications

    OpenAIRE

    Condominas Guàrdia, Jordi

    2013-01-01

    A mobile phone based telemedicine study is developed to see how feasible phone usage is in selected health care applications. The research is divided into three different objectives. The first objective is to compile the technical characteristics of selected mobile phones from telemedicine perspective. The second objective is to develop techniques to acquire quality images of skin with mobile phones. Finally a smartphone based telemedicine application will be developed to asses...

  20. Cloud-Based Mobile Learning

    Directory of Open Access Journals (Sweden)

    Alexandru BUTOI

    2013-01-01

    Full Text Available As the cloud technologies are largely studied and mobile technologies are evolving, new di-rections for development of mobile learning tools deployed on cloud are proposed.. M-Learning is treated as part of the ubiquitous learning paradigm and is a pervasive extension of E-Learning technologies. Development of such learning tools requires specific development strategies for an effective abstracting of pedagogical principles at the software design and implementation level. Current paper explores an interdisciplinary approach for designing and development of cloud based M-Learning tools by mapping a specific development strategy used for educational programs to software prototyping strategy. In order for such instruments to be user effective from the learning outcome point of view, the evaluation process must be rigorous as we propose a metric model for expressing the trainee’s overall learning experience with evaluated levels of interactivity, content presentation and graphical user interface usability.

  1. The use of a mobile assistant learning system for health education based on project-based learning.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-10-01

    With the development of mobile devices and wireless technology, mobile technology has gradually infiltrated nursing practice courses to facilitate instruction. Mobile devices save manpower and reduce errors while enhancing nursing students' professional knowledge and skills. To achieve teaching objectives and address the drawbacks of traditional education, this study presents a mobile assistant learning system to help nursing students prepare health education materials. The proposed system is based on a project-based learning strategy to assist nursing students with internalizing professional knowledge and developing critical thinking skills. Experimental results show that the proposed mobile system and project-based learning strategy can promote learning effectiveness and efficiency. Most nursing students and nursing educators showed positive attitudes toward this mobile learning system and looked forward to using it again in related courses in the future.

  2. Impact of Mobile advertising on consumer attitudes in Algeria: case study of Ooredoo

    OpenAIRE

    Amina Merabet; Abderrezzak Benhabib; Abderrezzak Merabet

    2017-01-01

    Mobile advertising is a perfect tool to build a relationship based on proximity between brand and consumer. It is tactile, interactive, and personalized. As few studies have focused on this con-cept, particularly in the Algerian context, we aim in this research to show the role of mobile ad-vertising on consumer attitudes. After a literature review, an empirical study is conducted among150 students in Tlemcen city. Results, using regression analysis, show that attitude to-wards mobile adverti...

  3. Mobile device-based optical instruments for agriculture

    Science.gov (United States)

    Sumriddetchkajorn, Sarun

    2013-05-01

    Realizing that a current smart-mobile device such as a cell phone and a tablet can be considered as a pocket-size computer embedded with a built-in digital camera, this paper reviews and demonstrates on how a mobile device can be specifically functioned as a portable optical instrument for agricultural applications. The paper highlights several mobile device-based optical instruments designed for searching small pests, measuring illumination level, analyzing spectrum of light, identifying nitrogen status in the rice field, estimating chlorine in water, and determining ripeness level of the fruit. They are suitable for individual use as well as for small and medium enterprises.

  4. a Voxel-Based Filtering Algorithm for Mobile LIDAR Data

    Science.gov (United States)

    Qin, H.; Guan, G.; Yu, Y.; Zhong, L.

    2018-04-01

    This paper presents a stepwise voxel-based filtering algorithm for mobile LiDAR data. In the first step, to improve computational efficiency, mobile LiDAR points, in xy-plane, are first partitioned into a set of two-dimensional (2-D) blocks with a given block size, in each of which all laser points are further organized into an octree partition structure with a set of three-dimensional (3-D) voxels. Then, a voxel-based upward growing processing is performed to roughly separate terrain from non-terrain points with global and local terrain thresholds. In the second step, the extracted terrain points are refined by computing voxel curvatures. This voxel-based filtering algorithm is comprehensively discussed in the analyses of parameter sensitivity and overall performance. An experimental study performed on multiple point cloud samples, collected by different commercial mobile LiDAR systems, showed that the proposed algorithm provides a promising solution to terrain point extraction from mobile point clouds.

  5. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  6. Agent Based Framework Architecture for Supporting Content Adaptation for Mobile Government

    Directory of Open Access Journals (Sweden)

    Hasan Omar Al-Sakran

    2013-01-01

    Full Text Available Rapid spread of smart mobile technology that supports internet access is transforming the way governments provide services to their citizens. Mobile devices have different capabilities based on the manufacturers and models. This paper proposes a new framework for adapting the content of M-government services using mobile agent technology. The framework is based on a mediation architecture that uses multiple mobile agents and XML as semi-structure mediation language. The flexibility of the mediation and XML provide an adaptive environment to stream data based on the capabilities of the device sending the query to the system.

  7. Mobihealth: Wireless mobile services and applications for healthcare

    NARCIS (Netherlands)

    Konstantas, D.; Jones, Valerie M.; Bults, Richard G.A.; Herzog, R.

    2002-01-01

    The MobiHealth IST project aims in the integration of existing and forthcoming technologies in developing and trial new mobile value-added services in the area of healthcare, based on 2.5 (GPRS) and 3G (UMTS) technologies. The target is to develope the means contributing to the reduction of costs in

  8. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  9. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  10. Value Added Service and Service Quality from the Customer’s Perspective: An Empirical Investigation in Thai Telecommunication Industry

    Directory of Open Access Journals (Sweden)

    Saowanee Srikanjanarak

    2009-12-01

    Full Text Available Increasing global competition has led to an intensively competitive market among service providers. Several organizations have created and developed a variety of products or services; in particular the telecommunications industry has developed mobile phone services. Various value-added services linked to mobile phone services, such as communication, entertainment, information services and money transfer services have been intensively incorporated to sustain and serve the customer’s need, which in turn demands performance maximization. In service marketing literature, SERVQUAL and SERVPERF have been reported as failing to measure service quality in new industries such as the retail industry’s B2B service. Therefore, service quality models for the mobile phone service industry need to be further developed.Service quality models have placed little focus on value-added services and no research has yet operationalized the concept of value-added services in a service quality model from the customer’s perspective of the service industry. Hence, this paper aims to conceptualize a service quality model based on Gronroos’ Model, other exploratory research and the current market situation in the service context. A total of 998 structured questionnaires were distributed to pre-paid mobile phones users in nine provinces around Thailand. The results indicate four dimensions of service quality. The value-added services have shown a particularly high level of measurements of satisfaction. These findings reveal a meaningful insight into how customers perceive the value-added services offered by service providers. This will help managers to design an appropriate variety of service options that suit their customers and in turn may lead to the development of a long-term relationship with their organizations.

  11. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  12. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers . Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...privacy-sensitive permissions just to display advertisements . 1Applications need phone state to obtain the phone’s In- ternational Mobile Equipment Identity...the Android permis- sion system and explain how mobile advertising currently works. We then explain how the current system leads to privacy and

  13. Effect of a mobile phone-based intervention on post-abortion contraception: a randomized controlled trial in Cambodia

    Science.gov (United States)

    Ngo, Thoai D; Gold, Judy; Edwards, Phil; Vannak, Uk; Sokhey, Ly; Machiyama, Kazuyo; Slaymaker, Emma; Warnock, Ruby; McCarthy, Ona; Free, Caroline

    2015-01-01

    Abstract Objective To assess the effect of a mobile phone-based intervention (mHealth) on post-abortion contraception use by women in Cambodia. Methods The Mobile Technology for Improved Family Planning (MOTIF) study involved women who sought safe abortion services at four Marie Stopes International clinics in Cambodia. We randomly allocated 249 women to a mobile phone-based intervention, which comprised six automated, interactive voice messages with counsellor phone support, as required, whereas 251 women were allocated to a control group receiving standard care. The primary outcome was the self-reported use of an effective contraceptive method, 4 and 12 months after an abortion. Findings Data on effective contraceptive use were available for 431 (86%) participants at 4 months and 328 (66%) at 12 months. Significantly more women in the intervention than the control group reported effective contraception use at 4 months (64% versus 46%, respectively; relative risk, RR: 1.39; 95% confidence interval, CI: 1.17–1.66) but not at 12 months (50% versus 43%, respectively; RR: 1.16; 95% CI: 0.92–1.47). However, significantly more women in the intervention group reported using a long-acting contraceptive method at both follow-up times. There was no significant difference between the groups in repeat pregnancies or abortions at 4 or 12 months. Conclusion Adding a mobile phone-based intervention to abortion care services in Cambodia had a short-term effect on the overall use of any effective contraception, while the use of long-acting contraceptive methods lasted throughout the study period. PMID:26668436

  14. Mobile phone based ELISA (MELISA).

    Science.gov (United States)

    Zhdanov, Arsenii; Keefe, Jordan; Franco-Waite, Luis; Konnaiyan, Karthik Raj; Pyayt, Anna

    2018-04-30

    Enzyme-linked immunosorbent assay (ELISA) is one of the most important technologies for biochemical analysis critical for diagnosis and monitoring of many diseases. Traditional systems for ELISA incubation and reading are expensive and bulky, thus cannot be used at point-of-care or in the field. Here, we propose and demonstrate a new miniature mobile phone based system for ELISA (MELISA). This system can be used to complete all steps of the assay, including incubation and reading. It weighs just 1 pound, can be fabricated at low cost, portable, and can transfer test results via mobile phone. We successfully demonstrated how MELISA can be calibrated for accurate measurements of progesterone and demonstrated successful measurements with the calibrated system. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. DESAIN ALGORITMA DAN SIMULASI ROUTING UNTUK GATEWAY AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Nixson Meok

    2009-12-01

    Full Text Available   Routing protocol to the wireless ad hoc networks is very needed in the communication process between some terminals, to send the data packet through one or several node(s to the destination address where the network typology is always changing. Many previous works that discussed about routing ad hoc both for manet (mobile ad hoc networks and wireless networks, but the emphasis have more focus on comparing the performance of several routing ad hoc. While in this work, there is a bulding of routing algorithm model to gateway in land to the nodes that analogized as a boat that move on the sea. With the assumption that the communication inter terminals to radio band of Very High Frequency, thus algorithm that built in the simulation based on the range gap of the HF frequency. The result of this simulation will be developed as the platform to implement the service development of multiuser communication

  16. Legal Aspects of a Location-Based Mobile Advertising Platform

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix; Gidofalvi, Gyozo

    2008-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services. Among these services, mobile advertising is predicted to represent a high yield revenue...... stream. In this article the possibilities of using a location-aware mobile messenger for the purpose of mobile advertising will be introduced. However, mobile advertising may become an extremely intrusive practice if the user's privacy is not taken in account. The objective of this article is therefore...

  17. Is mobile teleconsulting equivalent to hospital-based telestroke services?

    Science.gov (United States)

    Audebert, Heinrich J; Boy, Sandra; Jankovits, Ralf; Pilz, Philipp; Klucken, Jochen; Fehm, Nando P; Schenkel, Johannes

    2008-12-01

    Telemedicine is increasingly used to provide acute stroke expertise for hospitals without full-time neurological services. Teleconsulting through mobile laptop computers may offer more flexibility compared with hospital-based services, but concerns about quality and technical reliability remain. We conducted a controlled trial, allocating hospital-based or mobile teleconsulting in a shift-by-shift sequence and evaluating technical parameters, acceptability, and impact on immediate clinical decisions. Both types of telemedicine workstations were equipped with DICOM (Digital-Imaging-and-Communications-in-Medicine) viewer and videoconference software. The laptop connected by asymmetrical broadband UMTS (Universal-Mobile-Telecommunication-Systems) technology with a one-way spoke-to-hub video transmission, whereas the hospital-based device used landline symmetrical telecommunication, including a 2-way videoconference. One hundred twenty-seven hospital-based and 96 mobile teleconsultations were conducted within 2 months without any technical breakdown. The rates per allocated time were similar with 3.8 and 4.0 per day. No significant differences were found for durations of videoconference (mean: 11+/-3 versus 10+/-3 minutes, P=0.07), DICOM download (3+/-3 versus 4+/-3 minutes, P=0.19), and total duration of teleconsultations (44+/-19 versus 45+/-21 minutes, P=0.98). Technical quality of mobile teleconsultations was rated worse on both sides, but this did not affect the ability to make remote clinical decisions like initiating thrombolysis (17% versus 13% of all, P=0.32). Teleconsultation using a laptop workstation and broadband mobile telecommunication was technically stable and allowed remote clinical decision-making. There remain disadvantages regarding videoconference quality on the hub side and lack of video transmission to the spoke side.

  18. A method of mobile video transmission based on J2ee

    Science.gov (United States)

    Guo, Jian-xin; Zhao, Ji-chun; Gong, Jing; Chun, Yang

    2013-03-01

    As 3G (3rd-generation) networks evolve worldwide, the rising demand for mobile video services and the enormous growth of video on the internet is creating major new revenue opportunities for mobile network operators and application developers. The text introduced a method of mobile video transmission based on J2ME, giving the method of video compressing, then describing the video compressing standard, and then describing the software design. The proposed mobile video method based on J2EE is a typical mobile multimedia application, which has a higher availability and a wide range of applications. The users can get the video through terminal devices such as phone.

  19. A super base station based centralized network architecture for 5G mobile communication systems

    Directory of Open Access Journals (Sweden)

    Manli Qian

    2015-04-01

    Full Text Available To meet the ever increasing mobile data traffic demand, the mobile operators are deploying a heterogeneous network with multiple access technologies and more and more base stations to increase the network coverage and capacity. However, the base stations are isolated from each other, so different types of radio resources and hardware resources cannot be shared and allocated within the overall network in a cooperative way. The mobile operators are thus facing increasing network operational expenses and a high system power consumption. In this paper, a centralized radio access network architecture, referred to as the super base station (super BS, is proposed, as a possible solution for an energy-efficient fifth-generation (5G mobile system. The super base station decouples the logical functions and physical entities of traditional base stations, so different types of system resources can be horizontally shared and statistically multiplexed among all the virtual base stations throughout the entire system. The system framework and main functionalities of the super BS are described. Some key technologies for system implementation, i.e., the resource pooling, real-time virtualization, adaptive hardware resource allocation are also highlighted.

  20. Mobile Application Identification based on Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Yang Xinyan

    2018-01-01

    Full Text Available With the increasing number of mobile applications, there has more challenging network management tasks to resolve. Users also face security issues of the mobile Internet application when enjoying the mobile network resources. Identifying applications that correspond to network traffic can help network operators effectively perform network management. The existing mobile application recognition technology presents new challenges in extensibility and applications with encryption protocols. For the existing mobile application recognition technology, there are two problems, they can not recognize the application which using the encryption protocol and their scalability is poor. In this paper, a mobile application identification method based on Hidden Markov Model(HMM is proposed to extract the defined statistical characteristics from different network flows generated when each application starting. According to the time information of different network flows to get the corresponding time series, and then for each application to be identified separately to establish the corresponding HMM model. Then, we use 10 common applications to test the method proposed in this paper. The test results show that the mobile application recognition method proposed in this paper has a high accuracy and good generalization ability.

  1. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  2. Minimizing the Power Consumption of Location-Based Services on Mobile Phones

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2012-01-01

    Location-based services have to pay careful attention to their power consumption in order not to drain the batteries of mobile phones. It is not a simple task to build low power location-based services that can run for hours because such services make heavy use of many power consuming features...... of mobile phones. In this article we discuss the power consumption of location-based services and mobile phone features, survey methods for how to minimize power consumption and summarize a number of design considerations for location-based service developers....

  3. Mobile phones, mobile phone base stations and cancer: a review.

    Science.gov (United States)

    Moulder, J E; Foster, K R; Erdreich, L S; McNamee, J P

    2005-03-01

    There have been reports in the media and claims in the courts that radiofrequency (RF) emissions from mobile phones are a cause of cancer, and there have been numerous public objections to the siting of mobile phone base antennas because of a fear of cancer. This review summarizes the current state of evidence concerning whether the RF energy used for wireless communication might be carcinogenic. Relevant studies were identified by searching MedLine with a combination of exposure and endpoint terms. This was supplemented by a review of the over 1700 citations assembled by the Institute of Electrical and Electronics Engineers (IEEE) International Committee on Electromagnetic Safety as part of their updating of the IEEE C95.1 RF energy safety guidelines. Where there were multiple studies, preference was given to recent reports, to positive reports of effects and to attempts to confirm such positive reports. Biophysical considerations indicate that there is little theoretical basis for anticipating that RF energy would have significant biological effects at the power levels used by modern mobile phones and their base station antennas. The epidemiological evidence for a causal association between cancer and RF energy is weak and limited. Animal studies have provided no consistent evidence that exposure to RF energy at non-thermal intensities causes or promotes cancer. Extensive in vitro studies have found no consistent evidence of genotoxic potential, but in vitro studies assessing the epigenetic potential of RF energy are limited. Overall, a weight-of-evidence evaluation shows that the current evidence for a causal association between cancer and exposure to RF energy is weak and unconvincing. However, the existing epidemiology is limited and the possibility of epigenetic effects has not been thoroughly evaluated, so that additional research in those areas will be required for a more thorough assessment of the possibility of a causal connection between cancer and the

  4. [A wireless mobile monitoring system based on bluetooth technology].

    Science.gov (United States)

    Sun, Shou-jun; Wu, Kai; Wu, Xiao-Ming

    2006-09-01

    This paper presents a wireless mobile monitoring system based on Bluetooth technology. This system realizes the remote mobile monitoring of multiple physiological parameters, and has the characters of easy use, low cost, good reliability and strong capability of anti-jamming.

  5. Overcoming the response plateau in multiple myeloma: a novel bortezomib-based strategy for secondary induction and high-yield CD34+ stem cell mobilization.

    Science.gov (United States)

    Niesvizky, Ruben; Mark, Tomer M; Ward, Maureen; Jayabalan, David S; Pearse, Roger N; Manco, Megan; Stern, Jessica; Christos, Paul J; Mathews, Lena; Shore, Tsiporah B; Zafar, Faiza; Pekle, Karen; Xiang, Zhaoying; Ely, Scott; Skerret, Donna; Chen-Kiang, Selina; Coleman, Morton; Lane, Maureen E

    2013-03-15

    This phase II study evaluated bortezomib-based secondary induction and stem cell mobilization in 38 transplant-eligible patients with myeloma who had an incomplete and stalled response to, or had relapsed after, previous immunomodulatory drug-based induction. Patients received up to six 21-day cycles of bortezomib plus dexamethasone, with added liposomal doxorubicin for patients not achieving partial response or better by cycle 2 or very good partial response or better (≥VGPR) by cycle 4 (DoVeD), followed by bortezomib, high-dose cyclophosphamide, and filgrastim mobilization. Gene expression/signaling pathway analyses were conducted in purified CD34+ cells after bortezomib-based mobilization and compared against patients who received only filgrastim ± cyclophosphamide. Plasma samples were similarly analyzed for quantification of associated protein markers. The response rate to DoVeD relative to the pre-DoVeD baseline was 61%, including 39% ≥ VGPR. Deeper responses were achieved in 10 of 27 patients who received bortezomib-based mobilization; postmobilization response rate was 96%, including 48% ≥ VGPR, relative to the pre-DoVeD baseline. Median CD34+ cell yield was 23.2 × 10(6) cells/kg (median of 1 apheresis session). After a median follow-up of 46.6 months, median progression-free survival was 47.1 months from DoVeD initiation; 5-year overall survival rate was 76.4%. Grade ≥ 3 adverse events included thrombocytopenia (13%), hand-foot syndrome (11%), peripheral neuropathy (8%), and neutropenia (5%). Bortezomib-based mobilization was associated with modulated expression of genes involved in stem cell migration. Bortezomib-based secondary induction and mobilization could represent an alternative strategy for elimination of tumor burden in immunomodulatory drug-resistant patients that does not impact stem cell yield.

  6. Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Aissam Belghiat

    2016-06-01

    Full Text Available Mobile agent-based applications are special type of software systems which take the advantages of mobile agents in order to provide a new beneficial paradigm to solve multiple complex problems in several fields and areas such as network management, e-commerce, e-learning, etc. Likewise, we notice lack of real applications based on this paradigm and lack of serious evaluations of their modeling approaches. Hence, this paper provides a comparative study of modeling approaches of mobile agent-based software systems. The objective is to give the reader an overview and a thorough understanding of the work that has been done and where the gaps in the research are.

  7. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  8. Auto correct method of AD converters precision based on ethernet

    Directory of Open Access Journals (Sweden)

    NI Jifeng

    2013-10-01

    Full Text Available Ideal AD conversion should be a straight zero-crossing line in the Cartesian coordinate axis system. While in practical engineering, the signal processing circuit, chip performance and other factors have an impact on the accuracy of conversion. Therefore a linear fitting method is adopted to improve the conversion accuracy. An automatic modification of AD conversion based on Ethernet is presented by using software and hardware. Just by tapping the mouse, all the AD converter channel linearity correction can be automatically completed, and the error, SNR and ENOB (effective number of bits are calculated. Then the coefficients of linear modification are loaded into the onboard AD converter card's EEPROM. Compared with traditional methods, this method is more convenient, accurate and efficient,and has a broad application prospects.

  9. Design of Mine Ventilators Monitoring System Based on Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fu Sheng; Song Haiqiang

    2012-01-01

    A monitoring system for a mine ventilator is designed based on ZigBee wireless sensor network technology in the paper. The system consists of a sink node, sensor nodes, industrial personal computer and several sensors. Sensor nodes communicate with the sink node through the ZigBee wireless sensor network. The sink node connects with the configuration software on the pc via serial port. The system can collect or calculate vibration, temperature, negative pressure, air volume and other information of the mine ventilator. Meanwhile the system accurately monitors operating condition of the ventilator through these parameters. Especially it provides the most original information for potential faults of the ventilator. Therefore, there is no doubt that it improves the efficiency of fault diagnosis.

  10. Design of Mine Ventilators Monitoring System Based on Wireless Sensor Network

    Science.gov (United States)

    Fu, Sheng; Song, Haiqiang

    2012-05-01

    A monitoring system for a mine ventilator is designed based on ZigBee wireless sensor network technology in the paper. The system consists of a sink node, sensor nodes, industrial personal computer and several sensors. Sensor nodes communicate with the sink node through the ZigBee wireless sensor network. The sink node connects with the configuration software on the pc via serial port. The system can collect or calculate vibration, temperature, negative pressure, air volume and other information of the mine ventilator. Meanwhile the system accurately monitors operating condition of the ventilator through these parameters. Especially it provides the most original information for potential faults of the ventilator. Therefore, there is no doubt that it improves the efficiency of fault diagnosis.

  11. Synergy between Software Product Line and Intelligent Mobile Middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius

    2007-01-01

    with OWL ontology reasoning enhanced BDI (belief-desire-intention) agents in an ongoing research project called PLIMM (product line enabled intelligent mobile middleware), in which Frame based software product line techniques are applied. Besides the advantages of a software product line, our approach can...... handle ontology evolution and keep all related assets in a consistent state. Ontology evolution is a problem that has not been addressed by current mobile middleware. Another advantage is the ability to configure Jadex BDI agents for different purpose and enhance agent intelligence by adding logic...

  12. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  13. Comparison of mobility extraction methods based on field-effect measurements for graphene

    Directory of Open Access Journals (Sweden)

    Hua Zhong

    2015-05-01

    Full Text Available Carrier mobility extraction methods for graphene based on field-effect measurements are explored and compared according to theoretical analysis and experimental results. A group of graphene devices with different channel lengths were fabricated and measured, and carrier mobility is extracted from those electrical transfer curves using three different methods. Accuracy and applicability of those methods were compared. Transfer length method (TLM can obtain accurate density dependent mobility and contact resistance at relative high carrier density based on data from a group of devices, and then can act as a standard method to verify other methods. As two of the most popular methods, direct transconductance method (DTM and fitting method (FTM can extract mobility easily based on transfer curve of a sole graphene device. DTM offers an underestimated mobility at any carrier density owing to the neglect of contact resistances, and the accuracy can be improved through fabricating field-effect transistors with long channel and good contacts. FTM assumes a constant mobility independent on carrier density, and then can obtain mobility, contact resistance and residual density stimulations through fitting a transfer curve. However, FTM tends to obtain a mobility value near Dirac point and then overestimates carrier mobility of graphene. Comparing with the DTM and FTM, TLM could offer a much more accurate and carrier density dependent mobility, that reflects the complete properties of graphene carrier mobility.

  14. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  15. Arogyasree: An Enhanced Grid-Based Approach to Mobile Telemedicine

    Directory of Open Access Journals (Sweden)

    Sriram Kailasam

    2010-01-01

    Full Text Available A typical telemedicine system involves a small set of hospitals providing remote healthcare services to a small section of the society using dedicated nodal centers. However, in developing nations like India where majority live in rural areas that lack specialist care, we envision the need for much larger Internet-based telemedicine systems that would enable a large pool of doctors and hospitals to collectively provide healthcare services to entire populations. We propose a scalable, Internet-based P2P architecture for telemedicine integrating multiple hospitals, mobile medical specialists, and rural mobile units. This system, based on the store and forward model, features a distributed context-aware scheduler for providing timely and location-aware telemedicine services. Other features like zone-based overlay structure and persistent object space abstraction make the system efficient and easy to use. Lastly, the system uses the existing internet infrastructure and supports mobility at doctor and patient ends.

  16. Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design

    Science.gov (United States)

    Banimahendra, R. D.; Santoso, H. B.

    2018-03-01

    The development of mobile technology is now increasing rapidly, demanding all activities including learning should be done on mobile devices. It shows that the implementation of mobile application as a learning medium needs to be done. This study describes the process of developing and evaluating the Moodle-based mobile Learning Management System (LMS) application called Student Centered e-Learning Environment (SCeLE). This study discusses the process of defining features, implementing features into the application, and evaluating the application. We define the features using user research and literature study, then we implement the application with user-centered design basis, at the last phase we evaluated the application using usability testing and system usability score (SUS). The purpose of this study is to determine the extent to which this application can help the users doing their tasks and provide recommendation for the next research and development.

  17. Neurobehavioral effects among inhabitants around mobile phone base stations.

    Science.gov (United States)

    Abdel-Rassoul, G; El-Fateh, O Abou; Salem, M Abou; Michael, A; Farahat, F; El-Batanouny, M; Salem, E

    2007-03-01

    There is a general concern on the possible hazardous health effects of exposure to radiofrequency electromagnetic radiations (RFR) emitted from mobile phone base station antennas on the human nervous system. To identify the possible neurobehavioral deficits among inhabitants living nearby mobile phone base stations. A cross-sectional study was conducted on (85) inhabitants living nearby the first mobile phone station antenna in Menoufiya governorate, Egypt, 37 are living in a building under the station antenna while 48 opposite the station. A control group (80) participants were matched with the exposed for age, sex, occupation and educational level. All participants completed a structured questionnaire containing: personal, educational and medical histories; general and neurological examinations; neurobehavioral test battery (NBTB) [involving tests for visuomotor speed, problem solving, attention and memory]; in addition to Eysenck personality questionnaire (EPQ). The prevalence of neuropsychiatric complaints as headache (23.5%), memory changes (28.2%), dizziness (18.8%), tremors (9.4%), depressive symptoms (21.7%), and sleep disturbance (23.5%) were significantly higher among exposed inhabitants than controls: (10%), (5%), (5%), (0%), (8.8%) and (10%), respectively (Pstation exhibited a lower performance in the problem solving test (block design) than those under the station. All inhabitants exhibited a better performance in the two tests of visuomotor speed (Digit symbol and Trailmaking B) and one test of attention (Trailmaking A) than controls. The last available measures of RFR emitted from the first mobile phone base station antennas in Menoufiya governorate were less than the allowable standard level. Inhabitants living nearby mobile phone base stations are at risk for developing neuropsychiatric problems and some changes in the performance of neurobehavioral functions either by facilitation or inhibition. So, revision of standard guidelines for public

  18. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  19. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  20. An Agent-Based Model for the Development of Intelligent Mobile Services

    NARCIS (Netherlands)

    Koch, F.L.

    2009-01-01

    The next generation of mobile services must invisible, convenient, and useful. It requires new techniques to design and develop mobile computing applications, based on user-centred, environment-aware, adaptive behaviour. I propose an alternative technology for the development of intelligent mobile

  1. Mobile STEMship Discovery Center: K-12 Aerospace-Based Science, Technology, Engineering, and Mathematics (STEM) Mobile Teaching Vehicle

    Science.gov (United States)

    2015-08-03

    AND SUBTITLE Mobile STEMship Discovery Center: K-12 Aerospace-Based Science, Technology, Engineering, and Mathematics (STEM) Mobile Teaching Vehicle...Center program to be able to expose Science Technology, Engineering and Mathematics (STEM) space-inspired science centers for DC Metro beltway schools

  2. Online Learning for Classification of Alzheimer Disease based on Cortical Thickness and Hippocampal Shape Analysis.

    Science.gov (United States)

    Lee, Ga-Young; Kim, Jeonghun; Kim, Ju Han; Kim, Kiwoong; Seong, Joon-Kyung

    2014-01-01

    Mobile healthcare applications are becoming a growing trend. Also, the prevalence of dementia in modern society is showing a steady growing trend. Among degenerative brain diseases that cause dementia, Alzheimer disease (AD) is the most common. The purpose of this study was to identify AD patients using magnetic resonance imaging in the mobile environment. We propose an incremental classification for mobile healthcare systems. Our classification method is based on incremental learning for AD diagnosis and AD prediction using the cortical thickness data and hippocampus shape. We constructed a classifier based on principal component analysis and linear discriminant analysis. We performed initial learning and mobile subject classification. Initial learning is the group learning part in our server. Our smartphone agent implements the mobile classification and shows various results. With use of cortical thickness data analysis alone, the discrimination accuracy was 87.33% (sensitivity 96.49% and specificity 64.33%). When cortical thickness data and hippocampal shape were analyzed together, the achieved accuracy was 87.52% (sensitivity 96.79% and specificity 63.24%). In this paper, we presented a classification method based on online learning for AD diagnosis by employing both cortical thickness data and hippocampal shape analysis data. Our method was implemented on smartphone devices and discriminated AD patients for normal group.

  3. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  4. Content Adaptation for Heterogeneous Mobile Devices using web-based Mobile Services

    OpenAIRE

    Schmohl, Robert;Baumgarten, Uwe;Köthner, Lars

    2017-01-01

    Recent advances in mobile computing have spawned a very heterogeneous environment of mobile devices. Those devices have di erent capabilities in providing mobile services to the user, implying the challenge of considering heterogeneous devices during mobile service development. This especially encompasses the task of adapting the content, which a mobile service provides to a specific mobile device. In this paper we present an approach using a service platform, which utilizes a content adaptat...

  5. Impact of Mobile advertising on consumer attitudes in Algeria: case study of Ooredoo

    Directory of Open Access Journals (Sweden)

    Amina Merabet

    2017-04-01

    Full Text Available Mobile advertising is a perfect tool to build a relationship based on proximity between brand and consumer. It is tactile, interactive, and personalized. As few studies have focused on this con-cept, particularly in the Algerian context, we aim in this research to show the role of mobile ad-vertising on consumer attitudes. After a literature review, an empirical study is conducted among150 students in Tlemcen city. Results, using regression analysis, show that attitude to-wards mobile advertising had no influence on the attitude towards brand and purchase intention.

  6. Implementation of a mobile base with evasion of obstacles using ROS navigation

    International Nuclear Information System (INIS)

    Arauz Villegas, Carolina

    2013-01-01

    A mobile base is implemented with evasion of obstacles using ROS Navigation. The simulation of that mobile base is performed with the 2D Stage simulator, firstly; and once understanded the operation of Navigation has proceeded to build the mobile base. The mobile base has had two DC motors, an Asus Xtion sensor, a netbook and a stm32f4-discovery microcontroller. ROS in the netbook was installed and then serial communication over USB was achieved between the netbook and the microcontroller. The microcontroller has received the velocity data sent by move_base of navigation through that communication and sends the odometry data back. A PWM control is implemented for the driving and for the speed of the motors having a control PI for the cycle of work of the same. The encoder interface of the microcontroller was used for the data acquisition of odometry. The communication between ROS and the mobile base was integrated to the navigation, which has allowed to generate mapping, location and move safely from a starting point to a point of arrival sending speed messages. (author) [es

  7. Wess-Zumino terms for AdS D-branes

    International Nuclear Information System (INIS)

    Hatsuda, Machiko; Kamimura, Kiyoshi

    2004-01-01

    We show that Wess-Zumino terms for Dp branes with p>0 in the anti-de Sitter (AdS) space are given in terms of 'left-invariant' currents on the super-AdS group or the 'expanded' super-AdS group. As a result there is no topological extension of the super-AdS algebra. In the flat limit the global Lorentz rotational charges of the AdS space turn out to be brane charges of the supertranslation algebra representing the BPS mass. We also show that a D-instanton is described by the GL(1) degree of freedom in the Roiban-Siegel formalism based on the GL(4 vertical bar 4)/[Sp(4)xGL(1)]2 coset

  8. Low-Cost Bluetooth Mobile Positioning for Location-based Application

    OpenAIRE

    Barahim, Zaafir; Doomun, M. Razvi; Joomun, Nazrana

    2012-01-01

    Bluetooth is a promising short-range radio network technology. We present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the Bluetooth (BT) Sensor System and the Central Navigation System which have been developed using the JDK 6.0. The Bluetooth Sensor System allows mobile devices whose Bluetooth mode is set to discoverable, to be scanned and detected...

  9. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  10. Driving advertising into mobile mediums : Study of consumer attitudes towards mobile advertising and of factors affecting on them

    OpenAIRE

    Pietz, Michal; Storbacka, Lauri

    2007-01-01

    The high penetration rate of mobile phones along with the recent technological development has created a whole new marketing medium named mobile advertising filled with possibilities for the advertisers. Earlier studies have although indicated the success of this new advertising channel to depend on user acceptance of receiving mobile ads. Wherefore a study of consumer attitudes towards mobile advertising can be considered necessary in order to create a lucrative business. Even though this to...

  11. Training Revising Based Traversability Analysis of Complex Terrains for Mobile Robot

    Directory of Open Access Journals (Sweden)

    Rui Song

    2014-05-01

    Full Text Available Traversability analysis is one of the core issues in the autonomous navigation for mobile robots to identify the accessible area by the information of sensors on mobile robots. This paper proposed a model to analyze the traversability of complex terrains based on rough sets and training revising. The model described the traversability for mobile robots by traversability cost. Through the experiment, the paper gets the conclusion that traversability analysis model based on rough sets and training revising can be used where terrain features are rich and complex, can effectively handle the unstructured environment, and can provide reliable and effective decision rules in the autonomous navigation for mobile robots.

  12. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  13. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    OpenAIRE

    Stanislav A. Shikov

    2017-01-01

    Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT), and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of T...

  14. Mobile Urban Drama - Setting the Stage with Location Based Technologies

    DEFF Research Database (Denmark)

    Hansen, Frank Allan; Kortbek, Karen Johanne; Grønbæk, Kaj

    2008-01-01

    This paper introduces the novel concept of location-based Mobile Urban Dramas. In a Mobile Urban Drama the user become the main character in a play where actors’ voices appear in the mobile phone headset linked to the physical setting in the city as the stage for the drama. The paper describes...... the dramaturgical concept and introduces a software framework supporting drama writers in developing such Mobile Urban Dramas. Experiences with use of the framework are discussed with successful examples of real dramas that have been developed and performed by a Danish theatre group, Katapult....

  15. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  16. Mobile Context Toolbox - an extensible context framework for S60 mobile phones

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Jensen, Kristian

    2009-01-01

    We describe an open framework utilizing sensors and application data on S60 mobile phones enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new sensors and features to be added to the context framework as they become....... In the experiments 14 participants have been continuously using a Nokia N95 mobile phone with a context logger application for an average of 48 days per user and covering 70% of the time. The study has provided valuable insights into the performance issues of the system in real-life usage situations, including...

  17. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  18. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  19. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  20. ME science as mobile learning based on virtual reality

    Science.gov (United States)

    Fradika, H. D.; Surjono, H. D.

    2018-04-01

    The purpose of this article described about ME Science (Mobile Education Science) as mobile learning application learning of Fisika Inti. ME Science is a product of research and development (R&D) that was using Alessi and Trollip model. Alessi and Trollip model consists three stages that are: (a) planning include analysis of problems, goals, need, and idea of development product, (b) designing includes collecting of materials, designing of material content, creating of story board, evaluating and review product, (c) developing includes development of product, alpha testing, revision of product, validation of product, beta testing, and evaluation of product. The article describes ME Science only to development of product which include development stages. The result of development product has been generates mobile learning application based on virtual reality that can be run on android-based smartphone. These application consist a brief description of learning material, quizzes, video of material summery, and learning material based on virtual reality.

  1. A point-based rendering approach for real-time interaction on mobile devices

    Institute of Scientific and Technical Information of China (English)

    LIANG XiaoHui; ZHAO QinPing; HE ZhiYing; XIE Ke; LIU YuBo

    2009-01-01

    Mobile device is an Important interactive platform. Due to the limitation of computation, memory, display area and energy, how to realize the efficient and real-time interaction of 3D models based on mobile devices is an important research topic. Considering features of mobile devices, this paper adopts remote rendering mode and point models, and then, proposes a transmission and rendering approach that could interact in real time. First, improved simplification algorithm based on MLS and display resolution of mobile devices is proposed. Then, a hierarchy selection of point models and a QoS transmission control strategy are given based on interest area of operator, interest degree of object in the virtual environment and rendering error. They can save the energy consumption. Finally, the rendering and interaction of point models are completed on mobile devices. The experiments show that our method is efficient.

  2. Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks

    Science.gov (United States)

    Azzali, F.; Ghazali, O.; Omar, M. H.

    2017-08-01

    The design of next generation networks in various technologies under the “Anywhere, Anytime” paradigm offers seamless connectivity across different coverage. A conventional algorithm such as RSSThreshold algorithm, that only uses the received strength signal (RSS) as a metric, will decrease handover performance regarding handover latency, delay, packet loss, and handover failure probability. Moreover, the RSS-based algorithm is only suitable for horizontal handover decision to examine the quality of service (QoS) compared to the vertical handover decision in advanced technologies. In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). The study uses network simulator 2.29 (NS 2.29) along with the mobility traffic network and generator to implement simulation scenarios and topologies. This helps the simulation to achieve a realistic VANET mobility scenario. The required analysis on the performance of QoS in the vertical handover can thus be conducted. The proposed Fuzzy Logic algorithm shows improvement over the conventional algorithm (RSSThreshold) in the average percentage of handover QoS whereby it achieves 20%, 21% and 13% improvement on handover latency, delay, and packet loss respectively. This is achieved through triggering a process in layer two and three that enhances the handover performance.

  3. Use of Speech Analyses within a Mobile Application for the Assessment of Cognitive Impairment in Elderly People.

    Science.gov (United States)

    Konig, Alexandra; Satt, Aharon; Sorin, Alex; Hoory, Ran; Derreumaux, Alexandre; David, Renaud; Robert, Phillippe H

    2018-01-01

    Various types of dementia and Mild Cognitive Impairment (MCI) are manifested as irregularities in human speech and language, which have proven to be strong predictors for the disease presence and progress ion. Therefore, automatic speech analytics provided by a mobile application may be a useful tool in providing additional indicators for assessment and detection of early stage dementia and MCI. 165 participants (subjects with subjective cognitive impairment (SCI), MCI patients, Alzheimer's disease (AD) and mixed dementia (MD) patients) were recorded with a mobile application while performing several short vocal cognitive tasks during a regular consultation. These tasks included verbal fluency, picture description, counting down and a free speech task. The voice recordings were processed in two steps: in the first step, vocal markers were extracted using speech signal processing techniques; in the second, the vocal markers were tested to assess their 'power' to distinguish between SCI, MCI, AD and MD. The second step included training automatic classifiers for detecting MCI and AD, based on machine learning methods, and testing the detection accuracy. The fluency and free speech tasks obtain the highest accuracy rates of classifying AD vs. MD vs. MCI vs. SCI. Using the data, we demonstrated classification accuracy as follows: SCI vs. AD = 92% accuracy; SCI vs. MD = 92% accuracy; SCI vs. MCI = 86% accuracy and MCI vs. AD = 86%. Our results indicate the potential value of vocal analytics and the use of a mobile application for accurate automatic differentiation between SCI, MCI and AD. This tool can provide the clinician with meaningful information for assessment and monitoring of people with MCI and AD based on a non-invasive, simple and low-cost method. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  4. Developing a Behavioral Model for Mobile Phone-Based Diabetes Interventions

    Science.gov (United States)

    Nundy, Shantanu; Dick, Jonathan J.; Solomon, Marla C.; Peek, Monica E.

    2013-01-01

    Objectives Behavioral models for mobile phone-based diabetes interventions are lacking. This study explores the potential mechanisms by which a text message-based diabetes program affected self-management among African-Americans. Methods We conducted in-depth, individual interviews among 18 African-American patients with type 2 diabetes who completed a 4-week text message-based diabetes program. Each interview was audio- taped, transcribed verbatim, and imported into Atlas.ti software. Coding was done iteratively. Emergent themes were mapped onto existing behavioral constructs and then used to develop a novel behavioral model for mobile phone-based diabetes self-management programs. Results The effects of the text message-based program went beyond automated reminders. The constant, daily communications reduced denial of diabetes and reinforced the importance of self-management (Rosenstock Health Belief Model). Responding positively to questions about self-management increased mastery experience (Bandura Self-Efficacy). Most surprisingly, participants perceived the automated program as a “friend” and “support group” that monitored and supported their self-management behaviors (Barrera Social Support). Conclusions A mobile phone-based diabetes program affected self-management through multiple behavioral constructs including health beliefs, self-efficacy, and social support. Practice implications: Disease management programs that utilize mobile technologies should be designed to leverage existing models of behavior change and can address barriers to self-management associated with health disparities. PMID:23063349

  5. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  6. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  7. A Critical Review of 13 Years of Mobile Game-Based Learning

    Science.gov (United States)

    Giannakas, Filippos; Kambourakis, Georgios; Papasalouros, Andreas; Gritzalis, Stefanos

    2018-01-01

    With the increasing popularity of smartphones and tablets, game-based learning (GBL) is undergoing a rapid shift to mobile platforms. This transformation is driven by mobility, wireless interfaces, and built-in sensors that these smart devices offer in order to enable blended and context-sensitive mobile learning (m-Learning) activities. Thus,…

  8. Lifelink: 3G-based mobile telemedicine system.

    Science.gov (United States)

    Alis, Christian; del Rosario, Carlos; Buenaobra, Bernardino; Mar Blanca, Carlo

    2009-04-01

    Current wired telemedicine systems encounter difficulties when implemented in archipelagic developing countries because of the high cost of fixed infrastructure. In this research, we devised Lifelink, a mobile real-time telemonitoring and diagnostic facility to command and control remote medical devices through mobile phones. The whole process is phone-based, effectively freeing offsite medical specialists from stationary monitoring consoles and endowing the system with the potential to increase the number participating consultants. The electrocardiogram (ECG) readings are analyzed using a detrended fluctuation technique and classified into pathological cases using an unassisted K-means clustering algorithm. We analyzed 30 batches of 2-hour ECG signals taken from cardiac patients (20 males, 10 females, mean age 46.7 years) with pre-diagnosed pathologies. The method successfully categorized the 30 subjects without user intervention into the following cases: normal (at 86.7% accuracy), congestive heart failure (86.7%), and atrial fibrillation (80.0%). The synergy of mobile monitoring and fluctuation analysis presents a powerful platform to reach remote, underserved communities with poor or nonexistent wired communication structures. It is likely to be essential in the development of new mobile diagnostic and prognostic measures.

  9. Epidemiological evidence for a health risk from mobile phone base stations.

    Science.gov (United States)

    Khurana, Vini G; Hardell, Lennart; Everaert, Joris; Bortkiewicz, Alicja; Carlberg, Michael; Ahonen, Mikko

    2010-01-01

    Human populations are increasingly exposed to microwave/radiofrequency (RF) emissions from wireless communication technology, including mobile phones and their base stations. By searching PubMed, we identified a total of 10 epidemiological studies that assessed for putative health effects of mobile phone base stations. Seven of these studies explored the association between base station proximity and neurobehavioral effects and three investigated cancer. We found that eight of the 10 studies reported increased prevalence of adverse neurobehavioral symptoms or cancer in populations living at distances base stations. None of the studies reported exposure above accepted international guidelines, suggesting that current guidelines may be inadequate in protecting the health of human populations. We believe that comprehensive epidemiological studies of long-term mobile phone base station exposure are urgently required to more definitively understand its health impact.

  10. Mobility of radionuclides based on sequential extraction of soils

    International Nuclear Information System (INIS)

    Salbu, B.; Oughton, D.H.; Lien, H.N.; Oestby, G.; Strand, P.

    1992-01-01

    Since 1989, core samples of soil and vegetation from semi-natural pastures have been collected at selected sites in Norway during the growing season. The activity concentrations in soil and vegetation as well as transfer coefficients vary significantly between regions, within regions and even within sampling plot areas. In order to differentiate between mobil and inert fractions of radioactive and stable isotopes of Cs and Sr in soils, samples were extracted sequentially using agents with increasing dissolution power. The reproducibility of the sequential extraction technique is good and the data obtained seems most informative. As the distribution pattern for radioactive and stable isotopes of Cs and Sr are similar, a high degree of isotopic exchange is indicated. Based on easily leachable fractions, mobility factors are calculated. In general the mobility of 90 Sr is higher than for 137 Cs. Mobility factors are not significantly influenced by seasonal variations, but a decrease in the mobile fraction in soil with time is indicated. Mobility factors should be considered useful for modelling purposes. (au)

  11. Mobile Learning for Higher Education in Problem-Based Learning Environments

    DEFF Research Database (Denmark)

    Rongbutsri, Nikorn

    2011-01-01

    This paper describes the PhD project on Mobile Learning for Higher Education in Problem-Based Learning Environment which aims to understand how students gain benefit from using mobile devices in the aspect of project work collaboration. It demonstrates research questions, theoretical perspective...

  12. Identifying and Classifying Mobile Business Models Based on Meta-Synthesis Approach

    Directory of Open Access Journals (Sweden)

    Porrandokht Niroomand

    2012-03-01

    Full Text Available The appearance of mobile has provided unique opportunities and fields through the development and creation of businesses and has been able to create the new job opportunities. The current research tries to familiarize entrepreneures who are running the businesses especially in the area of mobile services with business models. These business models can familiarize them for implementing the new ideas and designs since they can enter to business market. Searching in many papers shows that there are no propitiated papers and researches that can identify, categorize and analyze the mobile business models. Consequently, this paper involves innovation. The first part of this paper presents the review about the concepts and theories about the different mobile generations, the mobile commerce and business models. Afterwards, 92 models are compared, interpreted, translated and combined using 33 papers, books based on two different criteria that are expert criterion and kind of product criterion. In the classification of models according to models that are presented by experts, the models are classified based on criteria such as business fields, business partners, the rate of dynamism, the kind of activity, the focus areas, the mobile generations, transparency, the type of operator activities, marketing and advertisements. The models that are classified based on the kind of product have been analyzed and classified at four different areas of mobile commerce including the content production, technology (software and hardware, network and synthetic.

  13. Simple Wide Frequency Range Impedance Meter Based on AD5933 Integrated Circuit

    Directory of Open Access Journals (Sweden)

    Chabowski Konrad

    2015-03-01

    Full Text Available As it contains elements of complete digital impedance meter, the AD5933 integrated circuit is an interesting solution for impedance measurements. However, its use for measurements in a wide range of impedances and frequencies requires an additional digital and analogue circuitry. This paper presents the design and performance of a simple impedance meter based on the AD5933 IC. Apart from the AD5933 IC it consists of a clock generator with a programmable prescaler, a novel DC offset canceller for the excitation signal based on peak detectors and a current to voltage converter with switchable conversion ratios. The authors proposed a simple method for choosing the measurement frequency to minimalize errors resulting from the spectral leakage and distortion caused by a lack of an anti-aliasing filter in the DDS generator. Additionally, a novel method for the AD5933 IC calibration was proposed. It consists in a mathematical compensation of the systematic error occurring in the argument of the value returned from the AD5933 IC as a result. The performance of the whole system is demonstrated in an exemplary measurement.

  14. Research and design of photovoltaic power monitoring system based on Zig Bee

    Science.gov (United States)

    Zhu, Lijuan; Yun, Zhonghua; Bianbawangdui; Bianbaciren

    2018-01-01

    In order to monitor and study the impact of environmental parameters on photovoltaic cells, a photovoltaic cell monitoring system based on ZigBee is designed. The system uses ZigBee wireless communication technology to achieve real-time acquisition of P-I-V curves and environmental parameters of terminal nodes, and transfer the data to the coordinator, the coordinator communicates with the STM32 through the serial port. In addition, STM32 uses the serial port to transfer data to the host computer written by LabVIEW, and the collected data is displayed in real time, as well as stored in the background database. The experimental results show that the system has a stable performance, accurate measurement, high sensitivity, high reliability, can better realize real-time collection of photovoltaic cell characteristics and environmental parameters.

  15. Automated topic spotting provides added efficiency in a chat based tutoring environment

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-05-01

    Full Text Available Dr Math is a mobile, online tutoring project which allows primary and secondary school pupils to contact tutors in mathematics using text based chat systems on their cell phones. The tutors use traditional Internet based workstations. Dr Math...

  16. A review of the types of mobile activities in mobile inquiry-based learning

    NARCIS (Netherlands)

    Suarez, Angel; Specht, Marcus; Prinsen, Fleur; Kalz, Marco; Ternier, Stefaan

    2017-01-01

    Inquiry-based Learning is increasingly suggested as an efficient approach for fostering learners’ curiosity and motivation. It helps learners to develop their ability to work in complex and unpredictable environments making them more critical thinkers and agentic learners. Although mobile technology

  17. Supporting Activity-Based Computingusing Dynamically (De)Composable Mobile Applications

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh; Schougaard, Kari Rye

    2004-01-01

    the document-centered paradigm for pervasive computing: it crosscuts work with different kinds of entities and sets the focus on the user and the user's tasks. In domain such as healthcare, activities are fundamentally mobile: doctors and nurses move throughout the hospital as their work progresses. Hence......, the computer must support mobility of activities. For this reason, we consider it important to investigate whether a computing platform that embraces mobility at a fundamental level supports implementing software for this new paradigm. This paper describes our initial design ideas for supporting activity......-centered computing in the Pervasive Object Model Project (POMP), a project which concerns the development of a platform for pervasive computing applications. We first describe POMP, the present the notion of activity-based computing, and last investigate how activity-based computing can be implemented in POMP....

  18. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  19. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    Science.gov (United States)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  20. Test marketing for value-added root and tuber based products in ...

    African Journals Online (AJOL)

    Test marketing for value-added root and tuber based products in Ikwuano local government area ... JE Ewuziem, C Aniedu, E Oti, VO Onyenobi ... root and tuber based products, developed at National Root Crops Research Institute, Umudike.