Science.gov

Sample records for mobile broadband networks

  1. HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Hyunku; Maeng, Seungryoul; Chae, Youngsu

    With the increasing deployment of mobile devices and the advent of broadband wireless access systems such as WiBro, mWiMAX, and HSDPA, an efficient IP mobility management protocol becomes one of the most important technical issues for the successful deployment of the broadband wireless data networking service. IETF has proposed the Mobile IPv6 as the basic mobility management protocol for IPv6 networks. To enhance the performance of the basic MIPv6, researchers have been actively working on HMIPv6 and FMIPv6 protocols. In this paper, we propose a new mobility management protocol, HIMIPv6 (Highly Integrated MIPv6), which tightly integrates the hierarchical mobility management mechanism of the HMIPv6 and the proactive handover support of the FMIPv6 to enhance the handover performance especially for the cellular networking environment with high frequent handover activities. We have performed extensive simulation study using ns2 and the results show that the proposed HIMIPv6 outperforms FMIPv6 and HMIPv6. There is no packet loss and consequent service interruption caused by IP handover in HIMIP.

  2. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    PubMed

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  3. 75 FR 33303 - Comment Sought on Measurement of Mobile Broadband Network Performance and Coverage

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-11

    ... significance of mobile internet access. Additionally, the Bureau seeks comment on how providers can improve... services given the growing significance of mobile internet access. Additionally, the Bureau seeks comment... the following methods: Electronic Filers: Comments may be filed electronically using the Internet...

  4. 47 CFR 90.19 - Nationwide Public Safety Broadband Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Nationwide Public Safety Broadband Network. 90.19 Section 90.19 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.19 Nationwide...

  5. 47 CFR 90.19 - Nationwide Public Safety Broadband Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Nationwide Public Safety Broadband Network. 90.19 Section 90.19 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.19 Nationwide...

  6. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and that... 47 Telecommunication 2 2011-10-01 2011-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  7. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and that... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  8. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and that... 47 Telecommunication 2 2012-10-01 2012-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  9. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and which... 47 Telecommunication 5 2012-10-01 2012-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  10. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and which... 47 Telecommunication 5 2011-10-01 2011-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  11. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... interoperable across public safety local and state agencies, jurisdictions, and geographic areas, and which... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private...

  12. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  13. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  14. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  15. Future large broadband switched satellite communications networks

    NASA Technical Reports Server (NTRS)

    Staelin, D. H.; Harvey, R. R.

    1979-01-01

    Critical technical, market, and policy issues relevant to future large broadband switched satellite networks are summarized. Our market projections for the period 1980 to 2000 are compared. Clusters of switched satellites, in lieu of large platforms, etc., are shown to have significant advantages. Analysis of an optimum terrestrial network architecture suggests the proper densities of ground stations and that link reliabilities 99.99% may entail less than a 10% cost premium for diversity protection at 20/30 GHz. These analyses suggest that system costs increase as the 0.6 power of traffic. Cost estimates for nominal 20/30 GHz satellite and ground facilities suggest optimum system configurations might employ satellites with 285 beams, multiple TDMA bands each carrying 256 Mbps, and 16 ft ground station antennas. A nominal development program is outlined.

  16. Future integrated broadband fiber, wireless, and satellite networks

    NASA Astrophysics Data System (ADS)

    Chan, Vincent W. S.

    2006-10-01

    With the increasing technical maturity in fiber, wireless and satellite communication technologies, new horizons are becoming feasible for future broadband networks, providing economical data rates well in excess of Gbps for stationary and mobile users as well as novel applications these advanced network services will permit. This talk explores the future architecture possibilities of such a network using new and radical technology building blocks such as: free space laser communications, multiple access multi-beam data satellite communications, novel all-optical network transport/switching and analog transmission and processing over optical carriers that support coherent distributed platform sensing and communications. We will articulate why we have to design this new network across layers from the Physical Layer to the Network and Transport Layers (even the Application Layer). Not only can future network performance and cost undergo quantum-leap improvements; such a network can have profound transforming effects on space and terrestrial system architectures for sensing, healthcare, early warning systems, disaster relief, research collaborations and other new commercial applications.

  17. Networked Nation: Broadband in America, 2007

    ERIC Educational Resources Information Center

    National Telecommunications and Information Administration, 2008

    2008-01-01

    This report highlights the dramatic growth of broadband in the United States. The report shows that the Administration's technology, regulatory and fiscal policies have stimulated innovation and competition, and encouraged investment in the U.S. broadband market contributing to significantly increased accessibility of broadband services. The…

  18. 47 CFR 90.18 - Public Safety 700 MHz Nationwide Broadband Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Public Safety 700 MHz Nationwide Broadband Network. 90.18 Section 90.18 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.18 Public...

  19. The Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  20. Broadband access technology for passive optical network

    NASA Astrophysics Data System (ADS)

    Chi, Sien; Yeh, Chien-Hung; Chow, Chi-Wai

    2009-01-01

    We will introduce four related topics about fiber access network technologies for PONs. First, an upstream signal powerequalizer is proposed and designed using a FP-LD in optical line terminal applied to the TDM-PON, and a 20dB dynamic upstream power range from -5 to -25dBm having a 1.7dB maximal power variation is retrieved. The fiber-fault protection is also an important issue for PON. We investigate a simple and cost-effective TDM/WDM PON system with self-protected function. Next, using RSOA-based colorless WDM-PON is also demonstrated. We propose a costeffective CW light source into RSOA for 2.5Gb/s upstream in WDM-PON together with self-healing mechanism against fiber fault. Finally, we investigate a 4Gb/s OFDM-QAM for both upstream and downstream traffic in long-reach WDM/TDM PON system under 100km transmission without dispersion compensation. As a result, we believe that these key access technologies are emerging and useful for the next generation broadband FTTH networks.

  1. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States.

    PubMed

    Serrano, Katrina J; Thai, Chan L; Greenberg, Alexandra J; Blake, Kelly D; Moser, Richard P; Hesse, Bradford W

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P <.05). The increase in the percentage of people accessing the Internet through mobile devices presents an opportunity for technology-based health interventions that should be explored.

  2. Networking a mobile robot

    NASA Astrophysics Data System (ADS)

    McKee, Gerard T.

    1994-10-01

    Conventional mobile robotic systems are `stand alone'. Program development involves loading programs into the mobile, via an umbilical. Autonomous operation, in this context, means `isolation': the user cannot interact with the program as the robot is moving around. Recent research in `swarm robotics' has exploited wireless networks as a means of providing inter- robot communication, but the population is still isolated from the human user. In this paper we report on research we are conducting into the provision of mobile robots as resources on a local area computer network, and thus breaking the isolation barrier. We are making use of new multimedia workstation and wireless networking technology to link the robots to the network in order to provide a new type of resource for the user. We model the robot as a set of resources and propose a client-server architecture as the basis for providing user access to the robots. We describe the types of resources each robot can provide and we outline the potential for cooperative robotics, human-robot cooperation, and teleoperation and autonomous robot behavior within this context.

  3. Economic evaluation of broadband distribution networks to the home

    NASA Astrophysics Data System (ADS)

    Merk, Charles A.

    1992-02-01

    Economic wideband, linear fiber optic transmitters and receivers pave the way for broadband to the home. The diamond network architecture (DNA) delivers 1 GHz bandwidth. This provides standard video, HDTV, and switched two-way broadband digital services to the home. An economic model is presented using the DNA that considers the impact of digital TV, HDTV, and the evolution of switched voice and data services on a CATV system.

  4. The Glenview Model: Community Networking via Broadband Cable.

    ERIC Educational Resources Information Center

    Mundt, John P.

    This paper describes the installation of a data network in the community of Glenview, Illinois, which uses broadband cable equipment to connect schools, libraries, and governmental agencies to each other and to the Internet via a high speed Ethernet network. The history of the project is outlined followed by a discussion of the implementation of…

  5. 75 FR 26180 - Effects on Broadband Communications Networks of Damage To or Failure of Network Equipment or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... networks, fiber networks, local exchange carriers, licensed wireless broadband communications networks and... the country, including in lesser developed or sparsely populated areas. Broadband core networks are... COMMISSION 47 CFR Chapter I Effects on Broadband Communications Networks of Damage To or Failure of...

  6. Old Buildings Broadband Home Networks: Technologies and Services Overview

    NASA Astrophysics Data System (ADS)

    Fantacci, Romano; Pecorella, Tommaso; Micciullo, Luigia; Viti, Roberto; Pasquini, Vincenzo; Calì, Marco

    2014-05-01

    Internet broadband access is becoming a reality in many countries. To fully exploit the benefits from high-speed connection, both suitable home network connectivity and advanced services support have to be made available to the user. In this article, issues relative to the upgrade of existing home networks, particularly in old buildings, together with networking and security requirements are addressed, and possible solutions are proposed.

  7. Global Interoperability of Broadband Networks (GIBN): Project Overview

    NASA Technical Reports Server (NTRS)

    DePaula, Ramon P.

    1998-01-01

    Various issues associated with the Global Interoperability of Broadband Networks (GIBN) are presented in viewgraph form. Specific topics include GIBN principles, objectives and goals, and background. GIBN/NASA status, the Transpacific High Definition Video experiment, GIBN experiment selection criteria, satellite industry involvement, and current experiments associated with GIBN are also discussed.

  8. Broadband networks for interactive telemedical applications

    NASA Astrophysics Data System (ADS)

    Graschew, Georgi; Roelofs, Theo A.; Rakowsky, Stefan; Schlag, Peter M.

    2002-08-01

    Using off-the-shelf hardware components and a specially developed high-end software communication system (WinVicos) satellite networks for interactive telemedicine have been designed and developed. These networks allow for various telemedical applications, like intraoperative teleconsultation, second opinioning, teleteaching, telementoring, etc.. Based on the successful GALENOS network, several projects are currently being realized: MEDASHIP (Medical Assistance for Ships); DELTASS (Disaster Emergency Logistic Telemedicine Advanced Satellites Systems) and EMISPHER (Euro-Mediterranean Internet-Satellite Platform for Health, medical Education and Research).

  9. Multiple-Access Techniques for Broadband Networks

    DTIC Science & Technology

    1991-12-20

    satellite-to- earth -station links of corn- some of the transmitted signals either separately (subop- munieation networks. When bursty data or voice traffic...frequency-sclective and lite-to- earth -station links in communication networks such multipath fading. These properties of SSMA are of inter- as the...Muy, nd. Cokle Pat, through the Nati• l Sciemce Foundation’s Enering Rmo&l Ca0 PraSm: NSF CDI NMOIOI MULTI-SENSOR CORRELATION AND QUANTIZATION IN

  10. The Design of Impedance- Matching Networks for Broadband Antennas.

    DTIC Science & Technology

    1987-09-01

    AD-RIB? GN THE DESIGN OF IMPEDANCE - MATCHING NETWORKS FOR / BRORDBAM RNTENNAS(U) NAVAL OCEAN SYSTEMS CENTER SAN DDIEGO CA S T LI .ET AL. SEP 87 NOSC...z Technical Document 1148 September 1987 The Design of Impedance - Matching Networks for Broadband Antennas o S. T.LU DTIC D. W. S. TamSJANO06 1988~1...over a given frequency band of interest. The device used to perform this impedance matching is called an antenna matching network. The number of

  11. On-board processing satellite network architectures for broadband ISDN

    NASA Technical Reports Server (NTRS)

    Inukai, Thomas; Faris, Faris; Shyy, Dong-Jye

    1992-01-01

    Onboard baseband processing architectures for future satellite broadband integrated services digital networks (B-ISDN's) are addressed. To assess the feasibility of implementing satellite B-ISDN services, critical design issues, such as B-ISDN traffic characteristics, transmission link design, and a trade-off between onboard circuit and fast packet switching, are analyzed. Examples of the two types of switching mechanisms and potential onboard network control functions are presented. A sample network architecture is also included to illustrate a potential onboard processing system.

  12. Mobility Model for Tactical Networks

    NASA Astrophysics Data System (ADS)

    Rollo, Milan; Komenda, Antonín

    In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These operations usually take place in environment without preexisting communication infrastructure and units thus have to be connected by wireless communication network. Units cooperate to fulfill common tasks and communication network has to serve high amount of communication requests, especially data, voice and video stream transmissions. To verify features of topology control, routing and interaction protocols software simulations are usually used, because of their scalability, repeatability and speed. Behavior of all these protocols relies on the mobility model of the network nodes, which has to resemble real-life movement pattern. Proposed mobility model is goal-driven and provides support for various types of units, group mobility and realistic environment model with obstacles. Basic characteristics of the mobility model like node spatial distribution and average node degree were analyzed.

  13. 76 FR 23812 - Reliability and Continuity of Communications Networks, Including Broadband Technologies; Effects...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-28

    ... on Broadband Communications Networks of Damage or Failure of Network Equipment or Severe Overload...: Effects on Broadband Communications Networks of Damage or Failure of Network Equipment or Severe Overload... INFORMATION CONTACT: Lisa M. Fowlkes, Deputy Bureau Chief, Public Safety and Homeland Security Bureau at...

  14. 77 FR 66588 - Development of the Nationwide Interoperable Public Safety Broadband Network

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-06

    ... Interoperable Public Safety Broadband Network AGENCY: National Telecommunications and Information Administration... meeting of the First Responder Network Authority (FirstNet) as well as to invite input on other network.../comments-nationwide-interoperable-public-safety-broadband-network-noi . All personal...

  15. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    PubMed

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  16. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    PubMed Central

    Jebaseeli Samuelraj, Ananthi; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point. PMID:26366431

  17. On-demand hypermedia/multimedia service over broadband networks

    SciTech Connect

    Bouras, C.; Kapoulas, V.; Spirakis, P. |

    1996-12-31

    In this paper we present a unified approach for delivering hypermedia/multimedia objects over broadband networks. Documents are stored in various multimedia servers, while the inline data may reside in their own media servers, attached to the multimedia servers. The described service consists of several multimedia servers and a set of functions that intend to present to the end user interactive information in real-time. Users interact with the service requesting multimedia documents on demand. Various media streams are transmitted over different parallel connections according lo their transmission requirements. The hypermedia documents are structured using a hypermedia markup language that keeps information of the spatiotemporal relationships among document`s media components. In order to deal with the variant network behavior, buffering manipulation mechanisms and grading of the transmitted media quality techniques are proposed to smooth presentation and synchronization anomalies.

  18. The digital divide: Trends in global mobile and broadband Internet access from 2000-2010.

    PubMed

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services.

  19. Applications of satellite technology to broadband ISDN networks

    NASA Technical Reports Server (NTRS)

    Price, Kent M.; Kwan, Robert K.; Chitre, D. M.; Henderson, T. R.; White, L. W.; Morgan, W. L.

    1992-01-01

    Two satellite architectures for delivering broadband integrated services digital network (B-ISDN) service are evaluated. The first is assumed integral to an existing terrestrial network, and provides complementary services such as interconnects to remote nodes as well as high-rate multicast and broadcast service. The interconnects are at a 155 Mbs rate and are shown as being met with a nonregenerative multibeam satellite having 10-1.5 degree spots. The second satellite architecture focuses on providing private B-ISDN networks as well as acting as a gateway to the public network. This is conceived as being provided by a regenerative multibeam satellite with on-board ATM (asynchronous transfer mode) processing payload. With up to 800 Mbs offered, higher satellite EIRP is required. This is accomplished with 12-0.4 degree hopping beams, covering a total of 110 dwell positions. It is estimated the space segment capital cost for architecture one would be about $190M whereas the second architecture would be about $250M. The net user cost is given for a variety of scenarios, but the cost for 155 Mbs services is shown to be about $15-22/minute for 25 percent system utilization.

  20. Broadband access network reference models: a different prospective

    NASA Astrophysics Data System (ADS)

    Mostafa, Mohamed S.

    1996-11-01

    The current view of the fiber-based broadband access network is that it could basically be modeled into two target networks represented by the following architectures, the fiber to the curb, building, home (FTTC/B/H) -- also termed switched digital video (SDV) -- architecture, and the hybrid fiber coax (HFC) architecture. Both architectures support on-demand digital services. One way to distinguish between these two architectures is based on the digital modulation scheme. The SDV/FTTC architecture utilizes baseband digital modulation both in the fiber distribution and the point-to- point drop. Whereas, the HFC architecture is pass-band and utilizes digitally modulated (as well as analog modulated) subcarriers both on the fiber and the coax for distribution to customers. From a network modeling point of view, the distinction between these two architectures is fuzzy. A hybrid between the above two architectures represents other architectural advantages especially bandwidth utilization in the upstream direction. This paper describes this hybrid architecture and provides an evaluation of the different access network configuration scenarios based on an expanded version of the DAVIC reference models.

  1. Energy optimization in mobile sensor networks

    NASA Astrophysics Data System (ADS)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  2. Assessing Quality of Experience while comparing competing mobile broadband services from the user perspective

    NASA Astrophysics Data System (ADS)

    Madruga, Ewerton L.; David, Rodrigo; Sabóia de Souza, Rodolfo; Dantas, Romulo

    2015-01-01

    The growth of mobile traffic is exploding globally, and users can already choose their best smartphone or tablet options from a handful of manufacturers based on specific criteria such as price and usability. It is much less clear when the user needs to pick from various mobile broadband service providers when choices are available. After all, how does one know what is the best provider for a given usage profile? This work uses drive tests to investigate the variation of radio frequency conditions and relate them to the quality of experience from the viewpoint of the user.

  3. The Evolution of the Policy Objectives of South Korea's Broadband Convergence Network from 2004 to 2007

    ERIC Educational Resources Information Center

    Menon, Siddhartha

    2011-01-01

    The purpose of this study is to explore the South Korean government's policy objectives for the Broadband Convergence Network (BcN) between 2004 and 2007. The BcN is envisioned as conduit for broadband content and applications. This paper uses generativity as a conceptual framework to determine whether the objectives for the BcN, based on a…

  4. Advanced Networks in Motion Mobile Sensorweb

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  5. Study of LEO-SAT microwave link for broad-band mobile satellite communication system

    NASA Technical Reports Server (NTRS)

    Fujise, Masayuki; Chujo, Wataru; Chiba, Isamu; Furuhama, Yoji; Kawabata, Kazuaki; Konishi, Yoshihiko

    1993-01-01

    In the field of mobile satellite communications, a system based on low-earth-orbit satellites (LEO-SAT's) such as the Iridium system has been proposed. The LEO-SAT system is able to offer mobile telecommunication services in high-latitude areas. Rain degradation, fading and shadowing are also expected to be decreased when the system is operated at a high elevation angle. Furthermore, the propagation delay generated in the LEO-SAT system is less pronounced than that in the geostationary orbit satellite (GEO-SAT) system and, in voice services, the effect of the delay is almost negligible. We proposed a concept of a broad-band mobile satellite communication system with LEO-SAT's and Optical ISL. In that system, a fixed L-band (1.6/1.5 GHz) multibeam is used to offer narrow band service to the mobile terminals in the entire area covered by a LEO-SAT and steerable Ka-band (30/20 GHz) spot beams are used for the wide band service. In this paper, we present results of a study of LEO-SAT microwave link between a satellite and a mobile terminal for a broad-band mobile satellite communication system. First, the results of link budget calculations are presented and the antennas mounted on satellites are shown. For a future mobile antenna technology, we also show digital beamforming (DBF) techniques. DBF, together with modulation and/or demodulation, is becoming a key technique for mobile antennas with advanced functions such as antenna pattern calibration, correction, and radio interference suppression. In this paper, efficient DBF techniques for transmitting and receiving are presented. Furthermore, an adaptive array antenna system suitable for this LEO-SAT is presented.

  6. Composing Networks: Writing Practices on Mobile Devices

    ERIC Educational Resources Information Center

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  7. Quality Control on the IBERARRY broad-band seismic network

    NASA Astrophysics Data System (ADS)

    Diaz, J.; Liguerzana, S.; Villaseñor, A.; Carbonell, R.

    2008-12-01

    Systematic quality control of the seismic recordings acquired by the IBERARRAY broad-band seismic network is carried out. As part of the standard quality control procedure of the raw seismic data, the background noise power spectral density (PSD) is regularly estimated for all the stations of the IberArray portable seismic network and is statistically analyzed to compute probability density functions (PDFs) using the PQLX software package. These PDFs provide a useful tool for managing the network, as they allow to identify stations with unacceptable high noise levels in the frequency band of interest as well as temporal changes of the noise level that may indicate the convenience of changing the location of some sites. At long periods (20-120s), the vertical components usually lie 15db above the NLNM of Peterson (1993). The horizontal components are much noisier in this frequency range, often depassing the NHNM for the longest periods. At microseismic frequencies (0.05 - 0.3 Hz), the noise level is very similar between all the stations, while at high frequencies (> 1 Hz), the main contribution seems to arise from the cultural noise and therefore produces significant variations between the stations. Among the different features observed in the PDF curves, we can highlight the day/night differences in the mean noise level, specially significant for high frequencies, the importance of the local site effects, illustrated by two stations located less than 100 km away but lying in very different terrains and the observation of noise variations related to weather conditions in the microseismic band.

  8. Study of bidirectional broadband passive optical network (BPON) using EDFA

    NASA Astrophysics Data System (ADS)

    Almalaq, Yasser

    Optical line terminals (OLTs) and number of optical network units (ONUs) are two main parts of passive optical network (PON). OLT is placed at the central office of the service providers, the ONUs are located near to the end subscribers. When compared with point-to-point design, a PON decreases the number of fiber used and central office components required. Broadband PON (BPON), which is one type of PON, can support high-speed voice, data and video services to subscribers' residential homes and small businesses. In this research, by using erbium doped fiber amplifier (EDFA), the performance of bi-directional BPON is experimented and tested for both downstream and upstream traffic directions. Ethernet PON (E-PON) and gigabit PON (G-PON) are the two other kinds of passive optical network besides BPON. The most beneficial factor of using BPON is it's reduced cost. The cost of the maintenance between the central office and the users' side is suitable because of the use of passive components, such as a splitter in the BPON architecture. In this work, a bidirectional BPON has been analyzed for both downstream and upstream cases by using bit error rate analyzer (BER). BER analyzers test three factors that are the maximum Q factor, minimum bit error rate, and eye height. In other words, parameters such as maximum Q factor, minimum bit error rate, and eye height can be analyzed utilized a BER tester. Passive optical components such as a splitter, optical circulator, and filters have been used in modeling and simulations. A 12th edition Optiwave simulator has been used in order to analyze the bidirectional BPON system. The system has been tested under several conditions such as changing the fiber length, extinction ratio, dispersion, and coding technique. When a long optical fiber above 40km was used, an EDFA was used in order to improve the quality of the signal.

  9. Securing Mobile Networks in an Operational Setting

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  10. Upgrade to the Broadband Observation network for Lightning and Thunderstorms

    NASA Astrophysics Data System (ADS)

    Akiyama, Y.; Wu, T.; Stock, M.; Nakamura, Y.; Kikuchi, H.; Yoshida, S.; Ushio, T.; Kawasaki, Z.

    2015-12-01

    Observation sensors for lightning discharges sense electromagnetic waves, mainly in the ELF to UHF range, and especially in the LF and VHF bands. VHF band sensor sensors can observe lightning discharge process in detail but its observation coverage is limited. On the other hand, LF band sensor can observe lightning at much great distances. Therefore, LF sensors are well adapted to observe lightning throughout a thunderstorm's life cycle. Our research group has been designing and developing the Broadband Observation network for Lightning and Thunderstorm (BOLT), which locates radiation sources associated with lightning discharge in three spatial dimensions. BOLT consists of 11 LF band sensors which detect lightning pulses wide frequency range from 5 kHz to 500 kHz. We have been operating BOLT in Kansai area of Japan, locating both cloud-to-ground and intracloud discharges. Currently, the BOLT system observes about 100 to 1000 lightning pulses per flash, but we are striving to improve both the detection efficiency and the location accuracy. Preliminary investigation show that the number of sources located, increases dramatically when only the highest portion of the BLOT frequency band is used far location. So, our research group has proposed improving a new "DDT" antenna sensor design to improve the high frequency sensitivity of the antenna. The DDT antenna consists of a modified charge amplifier circuit. In this research, we present a comparison of the DDT antenna and show the advantages of the DDT antenna.

  11. Broadband nanophotonic wireless links and networks using on-chip integrated plasmonic antennas

    PubMed Central

    Yang, Yuanqing; Li, Qiang; Qiu, Min

    2016-01-01

    Owing to their high capacity and flexibility, broadband wireless communications have been widely employed in radio and microwave regimes, playing indispensable roles in our daily life. Their optical analogs, however, have not been demonstrated at the nanoscale. In this paper, by exploiting plasmonic nanoantennas, we demonstrate the complete design of broadband wireless links and networks in the realm of nanophotonics. With a 100-fold enhancement in power transfer superior to previous designs as well as an ultrawide bandwidth that covers the entire telecommunication wavelength range, such broadband nanolinks and networks are expected to pave the way for future optical integrated nanocircuits. PMID:26783033

  12. The improved broadband Real-Time Seismic Network in Romania

    NASA Astrophysics Data System (ADS)

    Neagoe, C.; Ionescu, C.

    2009-04-01

    Starting with 2002 the National Institute for Earth Physics (NIEP) has developed its real-time digital seismic network. This network consists of 96 seismic stations of which 48 broad band and short period stations and two seismic arrays are transmitted in real-time. The real time seismic stations are equipped with Quanterra Q330 and K2 digitizers, broadband seismometers (STS2, CMG40T, CMG 3ESP, CMG3T) and strong motions sensors Kinemetrics episensors (+/- 2g). SeedLink and AntelopeTM (installed on MARMOT) program packages are used for real-time (RT) data acquisition and exchange. The communication from digital seismic stations to the National Data Center in Bucharest is assured by 5 providers (GPRS, VPN, satellite communication, radio lease line and internet), which will assure the back-up communications lines. The processing centre runs BRTT's AntelopeTM 4.10 data acquisition and processing software on 2 workstations for real-time processing and post processing. The Antelope Real-Time System is also providing automatic event detection, arrival picking, event location and magnitude calculation. It provides graphical display and reporting within near-real-time after a local or regional event occurred. Also at the data center was implemented a system to collect macroseismic information using the internet on which macro seismic intensity maps are generated. In the near future at the data center will be install Seiscomp 3 data acquisition processing software on a workstation. The software will run in parallel with Antelope software as a back-up. The present network will be expanded in the near future. In the first half of 2009 NIEP will install 8 additional broad band stations in Romanian territory, which also will be transmitted to the data center in real time. The Romanian Seismic Network is permanently exchanging real -time waveform data with IRIS, ORFEUS and different European countries through internet. In Romania, magnitude and location of an earthquake are now

  13. Neural networks using broadband spectral discriminators reduces illumination required for broccoli identification in weedy fields

    NASA Astrophysics Data System (ADS)

    Hahn, Federico

    1996-03-01

    Statistical discriminative analysis and neural networks were used to prove that crop/weed/soil discrimination by optical reflectance was feasible. The wavelengths selected as inputs on those neural networks were ten nanometers width, reducing the total collected radiation for the sensor. Spectral data collected from several farms having different weed populations were introduced to discriminant analysis. The best discriminant wavelengths were used to build a wavelength histogram which selected the three best spectral broadbands for broccoli/weed/soil discrimination. The broadbands were analyzed using a new single broadband discriminator index named the discriminative integration index, DII, and the DII values obtained were used to train a neural network. This paper introduces the index concept, its results and its use for minimizing artificial lightning requirements with broadband spectral measurements for broccoli/weed/soil discrimination.

  14. Mobile Assisted Security in Wireless Sensor Networks

    DTIC Science & Technology

    2015-08-03

    reduce to complexity of providing security in wireless sensor networks. We worked on mobile assisted key management to distribute keys using mobile... worked on mobile assisted key management to distribute keys using mobile robots and controlled path traversal where a robot has to prove the path...5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 5c. PROGRAM ELEMENT NUMBER 5b. GRANT NUMBER 5a. CONTRACT NUMBER Form Approved OMB NO

  15. Mobile-ip Aeronautical Network Simulation Study

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  16. Amplified CWDM-based Next Generation Broadband Access Networks

    NASA Astrophysics Data System (ADS)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  17. Mobile Botnet Detection Using Network Forensics

    NASA Astrophysics Data System (ADS)

    Vural, Ickin; Venter, Hein

    Malicious software (malware) infects large numbers of computers around the world. This malware can be used to promote unwanted products, disseminate offensive content, or provide unauthorized access to personal and financial information. Until recently mobile networks have been relatively isolated from the Internet, so there has been little need to protect them against Botnets. Mobile networks are now well integrated with the internet, so threats on the internet such as Botnets have started to migrate onto mobile networks. Botnets on mobile devices will probably appear very soon, there are already signs that this is happening. This paper studies the potential threat of Botnets based on mobile networks, and proposes the use of computational intelligence techniques to detect Botnets. We then simulate anomaly detection followed by an interpretation of the simulated values.

  18. Reconfigurable Robust Routing for Mobile Outreach Network

    NASA Technical Reports Server (NTRS)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  19. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  20. Design and implementation of interface units for high speed fiber optics local area networks and broadband integrated services digital networks

    NASA Technical Reports Server (NTRS)

    Tobagi, Fouad A.; Dalgic, Ismail; Pang, Joseph

    1990-01-01

    The design and implementation of interface units for high speed Fiber Optic Local Area Networks and Broadband Integrated Services Digital Networks are discussed. During the last years, a number of network adapters that are designed to support high speed communications have emerged. This approach to the design of a high speed network interface unit was to implement package processing functions in hardware, using VLSI technology. The VLSI hardware implementation of a buffer management unit, which is required in such architectures, is described.

  1. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    PubMed Central

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  2. Advanced mobility handover for mobile IPv6 based wireless networks.

    PubMed

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  3. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  4. Modeling and analysis of mobility management in mobile communication networks.

    PubMed

    Baek, Woon Min; Yoon, Ji Hyun; Kim, Chesoong

    2014-01-01

    Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z) and two-zone registration with implicit registration by outgoing calls (2Zi). We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z), and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  5. Discovering Mobile Social Networks by Semantic Technologies

    NASA Astrophysics Data System (ADS)

    Jung, Jason J.; Choi, Kwang Sun; Park, Sung Hyuk

    It has been important for telecommunication companies to discover social networks from mobile subscribers. They have attempted to provide a number of recommendation services, but they realized that the services were not successful. In this chapter, we present semantic technologies for discovering social networks. The process is mainly composed of two steps; (1) profile identification and (2) context understanding. Through developing a Next generation Contents dElivery (NICE) platform, we were able to generate various services based on the discovered social networks.

  6. The National Broadband Network and the Challenges of Creating Connectivity in Education: The Case of Tasmania

    ERIC Educational Resources Information Center

    Stack, Sue; Watson, Jane; Abbott-Chapman, Joan

    2013-01-01

    Tasmania, one of the first locations to have communities connected to the national broadband network (NBN), provided the context within which to ask significant questions about the implications of the NBN for all levels and sectors of education. This paper reports findings from a research project that developed innovative methodology to explore…

  7. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  8. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  9. Uncovering the spatial structure of mobility networks.

    PubMed

    Louail, Thomas; Lenormand, Maxime; Picornell, Miguel; García Cantú, Oliva; Herranz, Ricardo; Frias-Martinez, Enrique; Ramasco, José J; Barthelemy, Marc

    2015-01-21

    The extraction of a clear and simple footprint of the structure of large, weighted and directed networks is a general problem that has relevance for many applications. An important example is seen in origin-destination matrices, which contain the complete information on commuting flows, but are difficult to analyze and compare. We propose here a versatile method, which extracts a coarse-grained signature of mobility networks, under the form of a 2 × 2 matrix that separates the flows into four categories. We apply this method to origin-destination matrices extracted from mobile phone data recorded in 31 Spanish cities. We show that these cities essentially differ by their proportion of two types of flows: integrated (between residential and employment hotspots) and random flows, whose importance increases with city size. Finally, the method allows the determination of categories of networks, and in the mobility case, the classification of cities according to their commuting structure.

  10. Broadband local service offerings using free-space optical links: a network business perspective

    NASA Astrophysics Data System (ADS)

    Britz, David M.; Dodley, J. P.; Barnickel, D. J.

    2001-02-01

    12 This paper describes a promising optical wireless broadband technology that will provide low cost broadband services to the local access `last mile' market. This paper examines the application, advantages and limitations of utilizing Free Space Optical Communications (FSOC) systems for broadband access markets. The service markets that would fully utilize FSOC technologies include metropolitan areas, BLECs (multi- tenant dwellings/business apartments), campuses, industrial parks and `pole-to-hole' neighborhood deployments. This paper will identify weather dependent link availability as being the primary consideration in defining and selecting suitable locations for FSOC-based systems. Link availability in turn determines link range, type of service, and the need for transmission diversity. This paper will describe the implications of telecom `five nines' last-mile access availability and its effect on the transparent integration of FSOC technologies into the existing fiber optic networks. This paper will also describe propagation losses and link budget requirements for broadband FSOC-based local service. During adverse weather conditions, stand-alone, FSOC-based optical wireless links typically offer path lengths of less than 200 meters while still meeting the `five nines' availability criteria. This paper will also consider `availability limited' services. These services may prove to be attractive to customers who are willing to accept broadband service on an `as available basis'. The use of availability-enhancing transmission diversity and the use of intelligent `roof-top' routing and optical wireless cross connects between buildings will also be discussed.

  11. Analysis and Testing of Mobile Wireless Networks

    NASA Technical Reports Server (NTRS)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  12. Transportation dynamics on networks of mobile agents.

    PubMed

    Yang, Han-Xin; Wang, Wen-Xu; Xie, Yan-Bo; Lai, Ying-Cheng; Wang, Bing-Hong

    2011-01-01

    Most existing works on transportation dynamics focus on networks of a fixed structure, but networks whose nodes are mobile have become widespread, such as cell-phone networks. We introduce a model to explore the basic physics of transportation on mobile networks. Of particular interest is the dependence of the throughput on the speed of agent movement and the communication range. Our computations reveal a hierarchical dependence for the former, while an algebraic power law is found between the throughput and the communication range with the exponent determined by the speed. We develop a physical theory based on the Fokker-Planck equation to explain these phenomena. Our findings provide insights into complex transportation dynamics arising commonly in natural and engineering systems.

  13. Transportation dynamics on networks of mobile agents

    NASA Astrophysics Data System (ADS)

    Yang, Han-Xin; Wang, Wen-Xu; Xie, Yan-Bo; Lai, Ying-Cheng; Wang, Bing-Hong

    2011-01-01

    Most existing works on transportation dynamics focus on networks of a fixed structure, but networks whose nodes are mobile have become widespread, such as cell-phone networks. We introduce a model to explore the basic physics of transportation on mobile networks. Of particular interest is the dependence of the throughput on the speed of agent movement and the communication range. Our computations reveal a hierarchical dependence for the former, while an algebraic power law is found between the throughput and the communication range with the exponent determined by the speed. We develop a physical theory based on the Fokker-Planck equation to explain these phenomena. Our findings provide insights into complex transportation dynamics arising commonly in natural and engineering systems.

  14. Portable control device for networked mobile robots

    DOEpatents

    Feddema, John T.; Byrne, Raymond H.; Bryan, Jon R.; Harrington, John J.; Gladwell, T. Scott

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  15. Ubiquitous Mobile Awareness from Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kanter, Theo; Pettersson, Stefan; Forsström, Stefan; Kardeby, Victor; Österberg, Patrik

    Users require applications and services to be available everywhere, enabling them to focus on what is important to them. Therefore, context information (e.g., spatial data, user preferences, available connectivity and devices, etc.) has to be accessible to applications that run in end systems close to users. In response to this, we present a novel architecture for ubiquitous sensing and sharing of context in mobile services and applications. The architecture offers distributed storage of context derived from sensor networks wirelessly attached to mobile phones and other devices. The architecture also handles frequent updates of sensor information and is interoperable with presence in 3G mobile systems, thus enabling ubiquitous sensing applications. We demonstrate these concepts and the principle operation in a sample ubiquitous Mobile Awareness service.

  16. Supersampling and Network Reconstruction of Urban Mobility

    PubMed Central

    Sagarra, Oleguer; Szell, Michael; Santi, Paolo; Díaz-Guilera, Albert; Ratti, Carlo

    2015-01-01

    Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required. PMID:26275237

  17. Architectures and economics for pervasive broadband satellite networks

    NASA Technical Reports Server (NTRS)

    Staelin, D. H.; Harvey, R. L.

    1979-01-01

    The size of a satellite network necessary to provide pervasive high-data-rate business communications is estimated, and one possible configuration is described which could interconnect most organizations in the United States. Within an order of magnitude, such a network might reasonably have a capacity equivalent to 10,000 simultaneous 3-Mbps channels, and rely primarily upon a cluster of approximately 3-5 satellites in a single orbital slot. Nominal prices for 3-6 Mbps video conference services might then be approximately $2000 monthly lease charge plus perhaps 70 cents per minute one way.

  18. Community core evolution in mobile social networks.

    PubMed

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  19. A cost model for broadband access networks: FTTx versus WiMAX

    NASA Astrophysics Data System (ADS)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  20. BROADBAND ANTENNA MATCHING NETWORK DESIGN AND APPLICATION FOR RF PLASMA ION SOURCE

    SciTech Connect

    Shin, Ki; Kang, Yoon W; Piller, Chip; Fathy, Aly

    2011-01-01

    The RF ion source at Spallation Neutron Source has been upgraded to meet higher beam power requirement. One important subsystem for efficient operation of the ion source is the 2MHz RF impedance matching network. The real part of the antenna impedance is very small and is affected by plasma density for 2MHz operating frequency. Previous impedance matching network for the antenna has limited tuning capability to cover this potential variation of the antenna impedance since it employed a single tuning element and an impedance transformer. A new matching network with two tunable capacitors has been built and tested. This network can allow precision matching and increase the tunable range without using a transformer. A 5-element broadband matching network also has been designed, built and tested. The 5-element network allows wide band matching up to 50 kHz bandwidth from the resonance center of 2 MHz. The design procedure, simulation and test results are presented.

  1. Interworking evolution of mobile satellite and terrestrial networks

    NASA Technical Reports Server (NTRS)

    Matyas, R.; Kelleher, P.; Moller, P.; Jones, T.

    1993-01-01

    There is considerable interest among mobile satellite service providers in interworking with terrestrial networks to provide a universal global network. With such interworking, subscribers may be provided a common set of services such as those planned for the Public Switched Telephone Network (PSTN), the Integrated Services Digital Network (ISDN), and future Intelligent Networks (IN's). This paper first reviews issues in satellite interworking. Next the status and interworking plans of terrestrial mobile communications service providers are examined with early examples of mobile satellite interworking including a discussion of the anticipated evolution towards full interworking between mobile satellite and both fixed and mobile terrestrial networks.

  2. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    DTIC Science & Technology

    2007-09-01

    METADATA TAGGING AND DATA DISSEMINATION IN MOBILE DEVICE NETWORKS by Christopher T. Clotfelter Jonathon E. Towle September 2007 Thesis...Metadata Tagging and Data Dissemination in Mobile Device Networks 6. AUTHOR(S) Clotfelter, Christopher T. Towle , Jonathon E. 5. FUNDING NUMBERS 7...DISSEMINATION IN MOBILE DEVICE NETWORKS Jonathan E. Towle Captain, United States Maine Corps B.S., California State University Humboldt

  3. Convergence of broadband optical and wireless access networks

    NASA Astrophysics Data System (ADS)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  4. Fast packet switch architectures for broadband integrated services digital networks

    NASA Technical Reports Server (NTRS)

    Tobagi, Fouad A.

    1990-01-01

    Background information on networking and switching is provided, and the various architectures that have been considered for fast packet switches are described. The focus is solely on switches designed to be implemented electronically. A set of definitions and a brief description of the functionality required of fast packet switches are given. Three basic types of packet switches are identified: the shared-memory, shared-medium, and space-division types. Each of these is described, and examples are given.

  5. Software structure for broadband wireless sensor network system

    NASA Astrophysics Data System (ADS)

    Kwon, Hyeokjun; Oh, Sechang; Yoon, Hargsoon; Varadan, Vijay K.

    2010-04-01

    Zigbee Sensor Network system has been investigating for monitoring and analyzing the data measured from a lot of sensors because the Zigbee Sensor Network has several advantages of low power consumption, compact size, and multi-node connection. However, it has a disadvantage not to be able to monitor the data measured from sensors at the remote area such as other room that is located at other city. This paper describes the software structure to compensate the defect with combining the Zigbee Sensor Network and wireless LAN technology for remote monitoring of measured sensor data. The software structure has both benefits of Zigbee Sensor Network and the advantage of wireless LAN. The software structure has three main software structures. The first software structure consists of the function in order to acquire the data from sensors and the second software structure is to gather the sensor data through wireless Zigbee and to send the data to Monitoring system by using wireless LAN. The second part consists of Linux packages software based on 2440 CPU (Samsung corp.), which has ARM9 core. The Linux packages include bootloader, device drivers, kernel, and applications, and the applications are TCP/IP server program, the program interfacing with Zigbee RF module, and wireless LAN program. The last part of software structure is to receive the sensor data through TCP/IP client program from Wireless Gate Unit and to display graphically measured data by using MATLAB program; the sensor data is measured on 100Hz sampling rate and the measured data has 10bit data resolution. The wireless data transmission rate per each channel is 1.6kbps.

  6. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  7. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  8. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    PubMed

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  9. The European Virtual Broadband Seismic Network (VEBSN) and ORFEUS

    NASA Astrophysics Data System (ADS)

    van Eck, Torild; Sleeman, Reinoud; van den, Gert-Jan Hazel; Networks, Contributing

    2010-05-01

    Since 2002 ORFEUS has been coordinating the VEBSN concept, in which (near) real-time data is exchanged between Seismological observatory networks and the Orfeus Data Center (ODC). Seismological observatories in and around Europe have usually as primary objective the monitoring and analysis of current local and regional seismicity and seismic hazard. The data gathered by the observatories is, however, also valuable for fundamental research within global and European scale seismology; and therefore a primary data source for Academic seismological research. Within the VEBSN concept, the ODC provides and improves Quality control procedures for the observatories and the observatories provide real-time data for long-term secure waveform data archives at the ODC accessible for seismological research. In this concept the data remains ownership of the contributing network, while the ODC provides a secure back-up archive of waveform data. By facilitating a few data exchange mechanism with emphasis on SeedLink, the VEBSN strategy also enables observatories to exchange data between each other, thus enhancing the capabilities of the local or regional network and improving its performance for their monitoring and hazard objectives More recently, the ODC has been enlarged into the European Distributed waveform Data Archive (EIDA) in which currently GFZ/GEOFON, INGV and RESIF participate in an effort to extend the accessible waveform archive beyond only the VEBSN data. Currently the VEBSN consists of more then 450 3-component stations, each channel well defined with a full up-to-date SEED volume, providing all relevant metadata for a full reconstruction of the true ground motion. This encompases only about 45% of the operational BB stations in the European-Mediterranean area and our goal is to enlarge this.

  10. Fair Scheduling and Throughput Maximization for IEEE 802.16 Mesh Mode Broadband Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Alam, Muhammad Mahbub; Hamid, Md. Abdul; Razzaque, Md. Abdur; Hong, Choong Seon

    Broadband wireless access networks are promising technology for providing better end user services. For such networks, designing a scheduling algorithm that fairly allocates the available bandwidth to the end users and maximizes the overall network throughput is a challenging task. In this paper, we develop a centralized fair scheduling algorithm for IEEE 802.16 mesh networks that exploits the spatio-temporal bandwidth reuse to further enhance the network throughput. The proposed mechanism reduces the length of a transmission round by increasing the number of non-contending links that can be scheduled simultaneously. We also propose a greedy algorithm that runs in polynomial time. Performance of the proposed algorithms is evaluated by extensive simulations. Results show that our algorithms achieve higher throughput than that of the existing ones and reduce the computational complexity.

  11. Evaluation Study of a Broadband Multicasting Service over a Gigabit Ethernet Delivery Network

    NASA Astrophysics Data System (ADS)

    Stergiou, E.; Meletiou, G.; Vasiliadis, D. C.; Rizos, G. E.; Margariti, S. V.

    2008-11-01

    Multicasting networks are usually implemented for delivering audio and video. Consequently, the performance evaluation of a reliable multicasting architecture is useful in active delivery systems. In this paper we analyze and present a broadband multicasting system under an Internet environment using a typical IP multicasting mechanism. The test-bed multicasting scheme was based on both IGMP and MCOP protocols, where a Gigabit Ethernet was used as delivery network at client's segment. The evaluation study provides measurements for the two most significant performance metrics, the required Bandwidth and the Round Trip Time (RTT) of a packet versus the number of multicasting clients over 2.4 Mbps multicasting service rate.

  12. Advanced mobile networking, sensing, and controls.

    SciTech Connect

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  13. RACE project 1036: WTDM broadband customer premises network

    NASA Astrophysics Data System (ADS)

    Oliphant, A.; Mathers, C. D.

    1993-02-01

    Discussions in 1985 with BBC Television showed that signal routing in broadcasting centers presented two problems which would become more severe in the future: first, the increasing requirement for all sources to be available at all destinations, and second, the impending proliferation of signal standards (e.g. digital component signals, HDTV). The solution proposed by Research Department was the use of both wavelength and time division multiplexing (WTDM) over an optical fiber network; this inherently distributes all signals to all destinations, and with suitable terminal equipment can carry any signal format. To develop the required optical and electronic technology, a consortium of European firms was set up; at just this time, the EC launched its RACE initiative; after some negotiation, the work was accepted as Project R2001, and carried out with EC support.

  14. Navigation Architecture for a Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  15. Cooperative Multi-Agent Systems in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2006-01-01

    COOPERATIVE MULTI - AGENT SYSTEMS IN MOBILE AD HOC NETWORKS Joseph P. Macker William Chao Myriam Abramson Ian Downard Information Technology Division...are, mobile ad hoc networking (MANET) and Multi - Agent Systems (MAS). Despite their value in enabling more autonomous network system operation...2006 to 00-00-2006 4. TITLE AND SUBTITLE Cooperative Multi - Agent Systems in Mobile Ad Hoc Networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  16. Advances in optical power budgets and bandwidth capacity of broadband networks

    NASA Astrophysics Data System (ADS)

    Mysore, Sudhesh M.

    In this dissertation, we demonstrate record optical power budgets and novel architectures for broadband networks that provide ten times more bandwidth per subscriber than any system commercially available today. The compensation, and in some cases exploitation, of fiber nonlinearities is a key element in obtaining the record results. Using high-power optical amplifiers, low-noise optical preamplifiers and the beneficial effects of optical pulse compression, a 67.5 dB optical power budget for a 2.5 Gb/s system is obtained without the use of any intermediate repeaters or amplifiers Optical pulse compression is achieved through an interaction between anomalous fiber dispersion and a linear frequency chirp generated by self-phase-modulation (SPM) nonlinearity in the optical fiber. By solving the fiber propagation equation, the SPM-induce pulse compression is theoretically found. The optical pulse compression measured from eye diagrams is in very good agreements with the calculated values. Several applications that exploit the large power budgets for broadband applications are demonstrated: a digital video transport experiment in which a 2.5 Gb/s signal is broadcast to more than 8,000 subscribers located up to 50 km away; a four-channel (10 Gb/s) wavelength-division- multiplexed signal is broadcast to 40 subscribers located 200 km away; and a commercial 186 km fiber-optic system is built that is the largest unrepeatered SONET OC-48 span in the United States. We perform comprehensive modeling of dense wavelength- division-multiplexing (DWDM) networks that transport multi-level digital signals such as M-QAM requiring signal-to-noise ratios of 35 dB or more. System impairments due to chirp-induced distortions, laser clipping and stimulated Raman scattering (SRS) fiber nonlinearity (which places a fundamental limit on the number of DWDM channels) are analyzed. The coupled partial differential equations describing SRS are solved and the maximum capacity of DWDM systems is

  17. Study of multi- and broad-band internal antennas for mobile applications

    NASA Astrophysics Data System (ADS)

    Baek, Seung Hoon

    The modified aperture coupled MicroStrip Antenna (MSA) and Planar Inverted F Antenna (PIFA) for mobile applications are studied and presented in this dissertation. The designed antennas are improved multi-band and broad-band characteristics by the modification of radiating elements and/or the ground plane. The novel modified aperture coupling annular-ring antenna fed by stripline is the hybrid structure of the aperture coupling feed MSA and the proximity feed MSA. The proximity feed enable to concentrate the field strength toward the direction of the radiating element and the modified aperture layer contributes to provide the maximum coupling to the radiating element. The measurement bandwidths of the Aperture Coupling Proximity Feed Hybrid MSA #1(ACPF-HMSA#1, design #1) and ACPF-HMSA #2 (design #2) are 185MHz (7%) and 105MHz (4.1%), VSWR in less than 2, respectively. Two layers Planar Inverted F Antenna (PIFA) with the modification of the ground and radiating element was studied. The inserted T-shaped or L-shaped ground and inserted a slot and slits on radiating elements help to adjust the resonant frequencies to the target applications. The result of PIFA #3 (design #3) is presented a significant board-band characteristic on the upper band by 910MHz (from 1.45GHz to 2.36GHz) with VSWR less than 2.5. It covers GPS, DCS, PCS, and UMTS bands. Novel internal loop planar inverted F antennas (L-PIFA) with Inserted Concentrated Annular Rings (ICAR) and Inserted Loop Inductors (ILI) are presented as design #4 (ICAR-L-PIFA #4) and design #5 (ILI-L-PIFA #5), respectively. The simple loop structure consists of a meandered line. It increases the capacitance between adjacent lines. The Inserted annular-rings and loop inductors provide inductance values to the main loop antennas. Therefore, the impedance bandwidth of the design #4 is 570MHz (from 1.69GHz to 2.26GHz) with VSWR less than 2.5. And, the impedance bandwidth of the design #5 is 275MHz (from 1.63GHz to 1.905GHz) and

  18. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    ERIC Educational Resources Information Center

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  19. Consensus in networks of mobile communicating agents

    NASA Astrophysics Data System (ADS)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-01-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving network defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this paper can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  20. Consensus in evolving networks of mobile agents

    NASA Astrophysics Data System (ADS)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-02-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving networks defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this talk can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  1. Preliminary breakdown pulses located by Broadband Observation network for Lightning and Thunderstorm

    NASA Astrophysics Data System (ADS)

    Yoshida, S.; Wu, T.; Ushio, T.

    2013-12-01

    We have been designing and developing Broadband Observation network for Lightning and Thunderstorm (BOLT), which locates RF emissions associated with lightning discharges in 3D. The BOLT consists of 4 or more broadband sensors. A sensor of the BOLT is a capacitive antenna having decay time constants of about 0.2 ms. Waveforms of the sensor are digitized with 14 bit amplitude resolution and a sampling rate of 4 MHz. We have deployed the BOLT, consisting of 11 sensors, in Kinki area, Japan. We use the atmospheric sign convention (a positive electric field change corresponds to the dominant addition of positive charge above the ground). We first discuss the accuracy and detectability of the BOLT by comparing with the 2D radiation data located by VHF broadband digital interferometers. Also, we focus on a thunderstorm, lasting about one and half hours and producing many flashes on 28 October 2012, and show progressions of preliminary breakdown pulses, which occur in the beginning stage of a lightning flash. Most of negative preliminary breakdown pulses, whose initial polarity is negative, are located around 6 km in altitude, and most of positive ones are located around 4 km in altitude. These results indicate that negative initial breakdown pulses, most of which are followed by cloud-to-cloud lightning, were initiated between main negative and main positive charge regions. On the contrary, the positive initial breakdown pulses, most of which are followed by cloud-to-ground lightning, were initiated between main negative and lower positive charge regions.

  2. Using Mobile Agents and Overlay Networks to Secure Electrical Networks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-02-11

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats.

  3. Navigation Architecture For A Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space-based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts.

  4. Dynamic Trust Management for Mobile Networks and Its Applications

    ERIC Educational Resources Information Center

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  5. Reducing Communication Detection and Eavesdropping using Mobile Agent Relay Networks

    DTIC Science & Technology

    2010-12-01

    to maintain a wireless network to support the users. This type of solution is often used in Mobile Ad Hoc Networking (MANET) ( Corson 1999). MANET...USA: IEEE Computer Society. Corson , S. 1999. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC

  6. Mobile middleware for wireless body area network.

    PubMed

    Chen, Xiang; Waluyo, Agustinus Borgy; Pek, Isaac; Yeoh, Wee-Soon

    2010-01-01

    This paper presents a flexible, efficient and lightweight Wireless Body Area Network (WBAN) Middleware. The Middleware is developed to bridge the communication between mobile device as a gateway and the sensor nodes, and therefore it shields the underlying sensor and OS/protocol stack away from the WBAN application layer. The middleware is coded in the form of lightweight dynamic link library, which allows the application developer to simply incorporate the middleware resource dynamic link library into their application and call the required functions (i.e. data acquisition, resource management and configurations). A showcase of the middleware deployment is exhibited at the end of the paper.

  7. Synchronization in networks of mobile oscillators.

    PubMed

    Fujiwara, Naoya; Kurths, Jürgen; Díaz-Guilera, Albert

    2011-02-01

    We present a model of synchronization in networks of autonomous agents where the topology changes due to agents motion. We introduce two timescales, one for the topological change and another one for local synchronization. If the former scale is much shorter, an approximation that averages out the effect of motion is available. Here we show, however, that the time required for synchronization achievement is larger than the prediction of the approximation in the opposite case, especially close to the continuum percolation transition point. The simulation results are confirmed by means of spectral analysis of the time-dependent Laplacian matrix. Our results show that the tradeoff between these two timescales, which have opposite effects on synchronization, should be taken into account for the design of mobile device networks.

  8. Field testing of a remote controlled robotic tele-echo system in an ambulance using broadband mobile communication technology.

    PubMed

    Takeuchi, Ryohei; Harada, Hiroshi; Masuda, Kohji; Ota, Gen-ichiro; Yokoi, Masaki; Teramura, Nobuyasu; Saito, Tomoyuki

    2008-06-01

    We report the testing of a mobile Robotic Tele-echo system that was placed in an ambulance and successfully transmitted clear real time echo imaging of a patient's abdomen to the destination hospital from where this device was being remotely operated. Two-way communication between the paramedics in this vehicle and a doctor standing by at the hospital was undertaken. The robot was equipped with an ultrasound probe which was remotely controlled by the clinician at the hospital and ultrasound images of the patient were transmitted wirelessly. The quality of the ultrasound images that were transmitted over the public mobile telephone networks and those transmitted over the Multimedia Wireless Access Network (a private networks) were compared. The transmission rate over the public networks and the private networks was approximately 256 Kbps, 3 Mbps respectively. Our results indicate that ultrasound images of far higher definition could be obtained through the private networks.

  9. 75 FR 33729 - Facilitating the Provision of Fixed and Mobile Broadband Access, Educational and Other Advanced...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... corrects a clerical error in its rules governing the pre-transition frequency assignments for BRS Channel 1.... FOR FURTHER INFORMATION CONTACT: Nancy M. Zaczek, Wireless Telecommunications Bureau, Broadband... the Commission's Web site at http://wireless.fcc.gov/edocs_public/attachment/FCC-10-107A1doc ....

  10. Near real-time detection and characterization of landslides using broadband seismic networks

    NASA Astrophysics Data System (ADS)

    Manconi, Andrea; Coviello, Velio; De Santis, Francesca; Picozzi, Matteo

    2015-04-01

    Broadband seismic networks at regional, national, and global scale are usually deployed for a specific purpose, i.e. earthquake monitoring. However, it has been recently demonstrated that these networks are also capable to efficiently detect failure and transport processes related to landslide phenomena. Indeed, stations located several tens of kilometers away from the source areas can record the ground vibrations produced by large mass movements. In this work, we propose an integrated approach for the near real-time detection, location, and characterization of landslides, by considering data acquired from the Italian broadband seismic networks and available in the European Integrated Data Archive (EIDA). We use an automatic picking of first arrivals to identify significant seismic events recorded by the monitoring network. Secondly, waveforms relevant to landslide phenomena are selected by analyzing the spectral characteristics of seismic signals, which significantly differ from those related to earthquake events. Afterwards, in order to locate the landslide, we use a modified version of the real-time evolutionary location algorithm proposed for earthquakes, which relies on geometrical characteristics of the seismic network and on the relationships between triggered stations and not-triggered stations. Indeed, a first landslide location is roughly estimated as soon as the first station is triggered. The progressive increase over time in the number of triggered stations allows improving the accuracy on the most likely landslide location. Finally, we analyze the seismic energy released to infer an approximate value of the landslide volume in near real time. Here we present few examples relevant to recent well-known landslides where our method was successfully applied. Our results show how it is possible to extract precious information for landslide hazard assessment from seismic monitoring data, which in the field of earthquake warning would be discarded. Moreover

  11. Implementation of the Center-East Broadband Seismic Network in Colombia

    NASA Astrophysics Data System (ADS)

    Vargas-Jimenez, C. A.; Caneva, A.; Montes v., L. A.

    2007-12-01

    The seismic phenomenon is one of the most important natural hazards for Colombia (e.g. Armenia, 1999, M=6.1; Calima, 2004, M=6.7). In spite of big efforts implemented by different institutions in order to reduce the seismic vulnerability in Colombia, the understanding of the nature of the seismic phenomena and its spatial and temporal distribution and evolution is insufficient. In order to estimate the seismic hazard it is necessary to know the geological conditions of those regions where the cities are developing, it is necessary to study their structure, dynamics and behavior, looking for information which allows understand the processes which generate the seismic events and to obtain an adequate model of ruptures of the system. In this paper we show the implementation of an instrumental seismological network for the Colombia's capital city: Bogota. This project: "The Center-East Broadband Seismic Network" consists on fifteen seismological three components, broadband stations, located near the coordinates: 4.5 N latitude and 73.5 W longitude joined to a similar distribution of geodetic stations (GEORED). This network is expected to be a complementary, high sensitive addition to the National Seismological Network of Colombia. This network has to bring the possibility of improving the understanding of the seismic hazard in the Bogota's region, considering the better understanding of the spatial and temporal microseismic activity in this region, where live more than 15 millions people (30% of Colombia's population), and more than 40% of the GIP is concentrated. Based on the obtained information it will be possible to incorporate structural elements to the adequate development of this region considering the seismic hazard and supply the guidelines to designs and constructions.

  12. Mobile Network Defense Interface for Cyber Defense and Situational Awareness

    DTIC Science & Technology

    2013-03-01

    networks. Advances in mobile technology have created an environment well suited to address this shortfall. Faced with limited processing power and less...device within network management. Advances in mobile technology from both platform and security aspects make this a viable option in today’s...healthy operational state for their network. 3.3 Goals and Hypothesis The hypothesis of this research is that by using state-of-the-art mobile

  13. LinkMind: link optimization in swarming mobile sensor networks.

    PubMed

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  14. Synchronization of mobile chaotic oscillator networks

    NASA Astrophysics Data System (ADS)

    Fujiwara, Naoya; Kurths, Jürgen; Díaz-Guilera, Albert

    2016-09-01

    We study synchronization of systems in which agents holding chaotic oscillators move in a two-dimensional plane and interact with nearby ones forming a time dependent network. Due to the uncertainty in observing other agents' states, we assume that the interaction contains a certain amount of noise that turns out to be relevant for chaotic dynamics. We find that a synchronization transition takes place by changing a control parameter. But this transition depends on the relative dynamic scale of motion and interaction. When the topology change is slow, we observe an intermittent switching between laminar and burst states close to the transition due to small noise. This novel type of synchronization transition and intermittency can happen even when complete synchronization is linearly stable in the absence of noise. We show that the linear stability of the synchronized state is not a sufficient condition for its stability due to strong fluctuations of the transverse Lyapunov exponent associated with a slow network topology change. Since this effect can be observed within the linearized dynamics, we can expect such an effect in the temporal networks with noisy chaotic oscillators, irrespective of the details of the oscillator dynamics. When the topology change is fast, a linearized approximation describes well the dynamics towards synchrony. These results imply that the fluctuations of the finite-time transverse Lyapunov exponent should also be taken into account to estimate synchronization of the mobile contact networks.

  15. Measures of node centrality in mobile social networks

    NASA Astrophysics Data System (ADS)

    Gao, Zhenxiang; Shi, Yan; Chen, Shanzhi

    2015-02-01

    Mobile social networks exploit human mobility and consequent device-to-device contact to opportunistically create data paths over time. While links in mobile social networks are time-varied and strongly impacted by human mobility, discovering influential nodes is one of the important issues for efficient information propagation in mobile social networks. Although traditional centrality definitions give metrics to identify the nodes with central positions in static binary networks, they cannot effectively identify the influential nodes for information propagation in mobile social networks. In this paper, we address the problems of discovering the influential nodes in mobile social networks. We first use the temporal evolution graph model which can more accurately capture the topology dynamics of the mobile social network over time. Based on the model, we explore human social relations and mobility patterns to redefine three common centrality metrics: degree centrality, closeness centrality and betweenness centrality. We then employ empirical traces to evaluate the benefits of the proposed centrality metrics, and discuss the predictability of nodes' global centrality ranking by nodes' local centrality ranking. Results demonstrate the efficiency of the proposed centrality metrics.

  16. Evidence That Calls-Based and Mobility Networks Are Isomorphic

    PubMed Central

    Coscia, Michele; Hausmann, Ricardo

    2015-01-01

    Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable. PMID:26713730

  17. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  18. Role of mobile IPv6 for mobile networks and its remaining issues

    NASA Astrophysics Data System (ADS)

    Ma, Jian; Kan, Zhigang

    2001-10-01

    Mobile IPv6 has received tremendous attention from the cellular telephony industry for use in the next generation networks. This paper starts with recent development of Mobile IPv6 technologies and its standards, and explores remaining issues such as fast handover, smooth handover, mobility managements, AAA, QoS, security and scenarios in its deployment, with particular attention to IPv6.

  19. Distributed network management in the flat structured mobile communities

    NASA Astrophysics Data System (ADS)

    Balandina, Elena

    2005-10-01

    Delivering proper management into the flat structured mobile communities is crucial for improving users experience and increase applications diversity in mobile networks. The available P2P applications do application-centric management, but it cannot replace network-wide management, especially when a number of different applications are used simultaneously in the network. The network-wide management is the key element required for a smooth transition from standalone P2P applications to the self-organizing mobile communities that maintain various services with quality and security guaranties. The classical centralized network management solutions are not applicable in the flat structured mobile communities due to the decentralized nature and high mobility of the underlying networks. Also the basic network management tasks have to be revised taking into account specialties of the flat structured mobile communities. The network performance management becomes more dependent on the current nodes' context, which also requires extension of the configuration management functionality. The fault management has to take into account high mobility of the network nodes. The performance and accounting managements are mainly targeted in maintain an efficient and fair access to the resources within the community, however they also allow unbalanced resource use of the nodes that explicitly permit it, e.g. as a voluntary donation to the community or due to the profession (commercial) reasons. The security management must implement the new trust models, which are based on the community feedback, professional authorization, and a mix of both. For fulfilling these and another specialties of the flat structured mobile communities, a new network management solution is demanded. The paper presents a distributed network management solution for flat structured mobile communities. Also the paper points out possible network management roles for the different parties (e.g. operators, service

  20. The Impact of the Rate and Variety of Uses of Fixed and Mobile Broadband on the Progress of CPE: A Chartered Accountant's Perspective

    ERIC Educational Resources Information Center

    Rawashdeh, Awni; Al-namlah, Lamia

    2015-01-01

    To examine the impact of the usage of fixed and mobile broadband on the progress of continuing professional education (CPE) from the perspective of chartered accountants in Saudi Arabia, an e-mail survey was conducted. A random sampling of chartered accountants in Saudi Arabia was investigated. This research was aimed to identify any correlation…

  1. Traffic sharing algorithms for hybrid mobile networks

    NASA Technical Reports Server (NTRS)

    Arcand, S.; Murthy, K. M. S.; Hafez, R.

    1995-01-01

    In a hybrid (terrestrial + satellite) mobile personal communications networks environment, a large size satellite footprint (supercell) overlays on a large number of smaller size, contiguous terrestrial cells. We assume that the users have either a terrestrial only single mode terminal (SMT) or a terrestrial/satellite dual mode terminal (DMT) and the ratio of DMT to the total terminals is defined gamma. It is assumed that the call assignments to and handovers between terrestrial cells and satellite supercells take place in a dynamic fashion when necessary. The objectives of this paper are twofold, (1) to propose and define a class of traffic sharing algorithms to manage terrestrial and satellite network resources efficiently by handling call handovers dynamically, and (2) to analyze and evaluate the algorithms by maximizing the traffic load handling capability (defined in erl/cell) over a wide range of terminal ratios (gamma) given an acceptable range of blocking probabilities. Two of the algorithms (G & S) in the proposed class perform extremely well for a wide range of gamma.

  2. The critical satellite technical issues of future pervasive broadband low-cost communication networks

    NASA Technical Reports Server (NTRS)

    Harvey, R. L.

    1979-01-01

    The critical technical issues of signal waveform design, projected spacecraft technology, satellite launch options, and satellite cost are discussed for future pervasive broadband communication networks. With DPCM video signal encoding, 32 Mb/s user-to-user data rate per channel, 10% overhead, two orthogonal polarizations, and crosstalk loss limited to 1 dB, TFM permits about 75 channels/GHz of frequency allocation. The BOM (beginning of mission) weight and power of a baseline 400-channel multibeam satellite is about 1800 kg and 5000 W. Each 35 Mb/s channel can support 1 to 10 video channels. The weight and power estimates assume hardened digital logic, composite materials for a multibeam antenna structure, high-efficiency solar cells, batteries, and amplifiers. Based on a cost model for large communication satellites, the total space segment cost of two active satellites and one spare would be about $485 M.

  3. The designing and implementation of PE teaching information resource database based on broadband network

    NASA Astrophysics Data System (ADS)

    Wang, Jian

    2017-01-01

    In order to change traditional PE teaching mode and realize the interconnection, interworking and sharing of PE teaching resources, a distance PE teaching platform based on broadband network is designed and PE teaching information resource database is set up. The designing of PE teaching information resource database takes Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, and takes NAS technology for data storage and flow technology for video service. The analysis of system designing and implementation shows that the dynamic PE teaching information resource sharing platform based on Web Service can realize loose coupling collaboration, realize dynamic integration and active integration and has good integration, openness and encapsulation. The distance PE teaching platform based on Web Service and the design scheme of PE teaching information resource database can effectively solve and realize the interconnection, interworking and sharing of PE teaching resources and adapt to the informatization development demands of PE teaching.

  4. Mobile Networked Sensors for Environmental Observatories

    NASA Astrophysics Data System (ADS)

    Kaiser, W. J.

    2005-12-01

    carried by NIMS include sensors for visible wavelength imaging, thermal infrared temperature mapping, microclimate, solar radiation, and for water quality and physical characterization of aquatic systems. NIMS devices include compact embedded computing, wireless network connectivity to surrounding static sensors, and remote Internet access. Exploiting this onboard computing allows NIMS devices to follow precise scanning protocols and self-calibration procedures. This presentation will describe permanent facility NIMS systems deployed at the James San Jacinto Mountains Reserve. Rapidly deployable NIMS permitting short term, highly mobile experiments will also be discussed. This includes the Thermal Mapper system that simultaneously samples plant physical structure (using laser position sensing and imaging) along with plant surface temperature (using high spatial resolution thermal infrared sensing). This compact system has been applied to the investigation of thermal characteristics of alpine plants in varying soil surfaces at the White Mountains Research Station. Other NIMS applications and results to be described include novel spatial mapping of nitrate concentration and other variables in flowing streams. Finally, this presentation will also address the many future applications of observatories linking investigators with remote mobile and static sensor networks. This research is supported by the NSF0331481 ITR program. Research has been performed in collaboration with R. Ambrose, K. Bible, D. Estrin, E. Graham, M. Hamilton, M. Hanson, T. Harmon, G. Pottie, P. Rundel, M. Srivastava, and G. Sukhatme

  5. The Evolution of South Korea's Broadband Convergence Network, 2004-2007

    ERIC Educational Resources Information Center

    Menon, Siddhartha Shankar

    2010-01-01

    Broadband holds a critical position in the progress of economic and social indicators by connecting consumers, businesses and governments. South Korea has consistently been the global leader in broadband deployment since 1999. In the last ten years the Korean government has pursued several strategies for its broadband policy. The purpose of this…

  6. On Heterogeneous Mobile Network Connectivity: Number of Gateway Nodes

    DTIC Science & Technology

    2011-04-28

    clusters . Once the network has partitioned, mobile nodes cannot in different clusters cannot maintain connectivity due to insufficient radio...mobile nodes in different clusters can only occur when each cluster contains a gateway node. In this paper, we investigated the number of gateway...disperse geographical area. As tactical nodes move durng an operatioit. the network may partition into several segregated clusters . Once the network

  7. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  8. Design of Hybrid Mobile Communication Networks for Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Alena, Richard L.; Ossenfort, John; Lee, Charles; Walker, Edward; Stone, Thom

    2004-01-01

    The Mobile Exploration System Project (MEX) at NASA Ames Research Center has been conducting studies into hybrid communication networks for future planetary missions. These networks consist of space-based communication assets connected to ground-based Internets and planetary surface-based mobile wireless networks. These hybrid mobile networks have been deployed in rugged field locations in the American desert and the Canadian arctic for support of science and simulation activities on at least six occasions. This work has been conducted over the past five years resulting in evolving architectural complexity, improved component characteristics and better analysis and test methods. A rich set of data and techniques have resulted from the development and field testing of the communication network during field expeditions such as the Haughton Mars Project and NASA Mobile Agents Project.

  9. A Mobile Sensor Network System for Monitoring of Unfriendly Environments

    PubMed Central

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-01-01

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments. PMID:27873927

  10. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    PubMed

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  11. Message Efficient Checkpointing and Rollback Recovery in Heterogeneous Mobile Networks

    NASA Astrophysics Data System (ADS)

    Jaggi, Parmeet Kaur; Singh, Awadhesh Kumar

    2016-06-01

    Heterogeneous networks provide an appealing way of expanding the computing capability of mobile networks by combining infrastructure-less mobile ad-hoc networks with the infrastructure-based cellular mobile networks. The nodes in such a network range from low-power nodes to macro base stations and thus, vary greatly in their capabilities such as computation power and battery power. The nodes are susceptible to different types of transient and permanent failures and therefore, the algorithms designed for such networks need to be fault-tolerant. The article presents a checkpointing algorithm for the rollback recovery of mobile hosts in a heterogeneous mobile network. Checkpointing is a well established approach to provide fault tolerance in static and cellular mobile distributed systems. However, the use of checkpointing for fault tolerance in a heterogeneous environment remains to be explored. The proposed protocol is based on the results of zigzag paths and zigzag cycles by Netzer-Xu. Considering the heterogeneity prevalent in the network, an uncoordinated checkpointing technique is employed. Yet, useless checkpoints are avoided without causing a high message overhead.

  12. Specific absorption rate analysis of broadband mobile antenna with negative index metamaterial

    NASA Astrophysics Data System (ADS)

    Alam, Touhidul; Faruque, Mohammad Rashed Iqbal; Islam, Mohammad Tariqul

    2016-03-01

    This paper presents a negative index metamaterial-inspired printed mobile wireless antenna that can support most mobile applications such as GSM, UMTS, Bluetooth and WLAN frequency bands. The antenna consists of a semi-circular patch, a 50Ω microstrip feed line and metamaterial ground plane. The antenna occupies a very small space of 37 × 47 × 0.508 mm3, making it suitable for mobile wireless application. The perceptible novelty shown in this proposed antenna is that reduction of specific absorption rate using the negative index metamaterial ground plane. The proposed antenna reduced 72.11 and 75.53 % of specific absorption rate at 1.8 and 2.4 GHz, respectively.

  13. Green survivability in Fiber-Wireless (FiWi) broadband access network

    NASA Astrophysics Data System (ADS)

    Liu, Yejun; Guo, Lei; Gong, Bo; Ma, Rui; Gong, Xiaoxue; Zhang, Lincong; Yang, Jiangzi

    2012-03-01

    Fiber-Wireless (FiWi) broadband access network is a promising "last mile" access technology, because it integrates wireless and optical access technologies in terms of their respective merits, such as high capacity and stable transmission from optical access technology, and easy deployment and flexibility from wireless access technology. Since FiWi is expected to carry a large amount of traffic, numerous traffic flows may be interrupted by the failure of network components. Thus, survivability in FiWi is a key issue aiming at reliable and robust service. However, the redundant deployment of backup resource required for survivability usually causes huge energy consumption, which aggravates the global warming and accelerates the incoming of energy crisis. Thus, the energy-saving issue should be considered when it comes to survivability design. In this paper, we focus on the green survivability in FiWi, which is an innovative concept and remains untouched in the previous works to our best knowledge. We first review and discuss some challenging issues about survivability and energy-saving in FiWi, and then we propose some instructive solutions for its green survivability design. Therefore, our work in this paper will provide the technical references and research motivations for the energy-efficient and survivable FiWi development in the future.

  14. Demonstration of medical communications based on an ATM broadband network technology

    NASA Astrophysics Data System (ADS)

    Cox, Jerome R., Jr.; Blaine, G. James; Dubetz, Martin W.; Krieger, Kenneth; Jost, R. Gilbert; Moore, Stephen M.; Richard, William D.; Turner, Jonathan S.; Winterbauer, Albert

    1992-07-01

    The research and development efforts of several university and industry groups have brought digital imaging technologies into the practice of medicine. Radiographic images based on a digital data set can now be acquired, stored, communicated and presented for both primary interpretation and access by the referring physician. Moreover, conferences between a specialist and a primary care physician can be supported with audio and video links. A demonstration project at Washington University in collaboration with Southwestern Bell and NEC-America provides a testbed for deployment of ATM (Asynchronous Transfer Mode) broadband network technology supporting both LAN and WAN experiments in multimedia medical communications. A network based on four geographically dispersed ATM switches supports rapid display of high-resolution medical images, patient information, digital video and digitized real-time physiological signals at channel rates of 100 Mb/s. A prototype configuration of an Inquiry station is based on the NeXT computer with auxiliary displays for the medical images. Observations and preliminary performance results will be presented.

  15. Portable emergency telemedicine system over wireless broadband and 3G networks.

    PubMed

    Hong, SungHye; Kim, SangYong; Kim, JungChae; Lim, DongKyu; Jung, SeokMyung; Kim, DongKeun; Yoo, Sun K

    2009-01-01

    The telemedicine system aims at monitoring patients remotely without limit in time and space. However the existing telemedicine systems exchange medical information simply in a specified location. Due to increasing speed in processing data and expanding bandwidth of wireless networks, it is possible to perform telemedicine services on personal digital assistants (PDA). In this paper, a telemedicine system on PDA was developed using wideband mobile networks such as Wi-Fi, HSDPA, and WiBro for high speed bandwidths. This system enables to utilize and exchange variety and reliable patient information of video, biosignals, chatting messages, and triage data. By measuring bandwidths of individual data of the system over wireless networks, and evaluating the performance of this system using PDA, we demonstrated the feasibility of the designed portable emergency telemedicine system.

  16. Multiuser Collaboration with Networked Mobile Devices

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.

    2006-01-01

    In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application

  17. A Mobile Satellite Experiment (MSAT-X) network definition

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.; Yan, Tsun-Yee

    1990-01-01

    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.

  18. Globalization and International Student Mobility: A Network Analysis

    ERIC Educational Resources Information Center

    Shields, Robin

    2013-01-01

    This article analyzes changes to the network of international student mobility in higher education over a 10-year period (1999-2008). International student flows have increased rapidly, exceeding 3 million in 2009, and extensive data on mobility provide unique insight into global educational processes. The analysis is informed by three theoretical…

  19. A Cultural Approach to Networked-Based Mobile Education

    ERIC Educational Resources Information Center

    Koskimaa, Raine; Lehtonen, Miika; Heinonen, Ulla; Ruokamo, Heli; Tissari, Varpu; Vahtivuori-Hanninen, Sanna; Tella, Seppo

    2007-01-01

    This paper discusses cultural conditions for networked-based mobile education. In our paper, we demonstrate how an Integrated Meta-Model that we have been developing in our MOMENTS project, i.e. Models and Methods for Future Knowledge Construction: Interdisciplinary Implementations with Mobile Technologies, can be used as a heuristic tool for…

  20. Managing healthcare information using short message service (SMS) in wireless broadband networks

    NASA Astrophysics Data System (ADS)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  1. Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network

    NASA Astrophysics Data System (ADS)

    Inzerilli, Tiziano; Montozzi, Simone

    2003-07-01

    This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.

  2. Optimal forwarding ratio on dynamical networks with heterogeneous mobility

    NASA Astrophysics Data System (ADS)

    Gan, Yu; Tang, Ming; Yang, Hanxin

    2013-05-01

    Since the discovery of non-Poisson statistics of human mobility trajectories, more attention has been paid to understand the role of these patterns in different dynamics. In this study, we first introduce the heterogeneous mobility of mobile agents into dynamical networks, and then investigate packet forwarding strategy on the heterogeneous dynamical networks. We find that the faster speed and the higher proportion of high-speed agents can enhance the network throughput and reduce the mean traveling time in random forwarding. A hierarchical structure in the dependence of high-speed is observed: the network throughput remains unchanged at small and large high-speed value. It is also interesting to find that a slightly preferential forwarding to high-speed agents can maximize the network capacity. Through theoretical analysis and numerical simulations, we show that the optimal forwarding ratio stems from the local structural heterogeneity of low-speed agents.

  3. Modeling the propagation of mobile malware on complex networks

    NASA Astrophysics Data System (ADS)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  4. Adaptive Protocols for Mobile Wireless Networks

    DTIC Science & Technology

    2005-12-22

    frequency-hop wireless networks," International Journal of Wireless Information Networks , vol. 11, no. 3, pp. 147-159, July 2004. [PRW04c] M. B. Pursley...efficient routing of multimedia traffic in frequency-hop packet radio networks," submitted for publication in the International Journal of Wireless Information Networks , August

  5. Mobile sensor networks for inspection tasks in harsh industrial environments.

    PubMed

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    2010-01-01

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network of autonomous mobile sensors by utilizing both simulation tools and a robotic testbed. The research has been carried out in the context of the mobile sensing project, PicoSmart, in the northern provinces of the Netherlands for the inspection of natural gas pipelines.

  6. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    PubMed Central

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    2010-01-01

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network of autonomous mobile sensors by utilizing both simulation tools and a robotic testbed. The research has been carried out in the context of the mobile sensing project, PicoSmart, in the northern provinces of the Netherlands for the inspection of natural gas pipelines. PMID:22294889

  7. Gran Canaria temporary broadband seismic network: an study of the seismicity and Earth structure

    NASA Astrophysics Data System (ADS)

    Almendros, Javier; de Lis Mancilla, Flor; Martinez-Arevalo, Carmen; Carmona, Enrique; Sanchez, Nieves; Heit, Benjamin; Garcia, Alicia; Martin-Leon, Rosa; Buontempo, Luisa; Yuan, Xiahoui

    2010-05-01

    The present project is a joint effort between different institutions to deploy a dense seismic network at Gran Canaria island (Canary Islands, Spain). The interstation distance is around 20 km. The broadband seismic network is composed of one permanent (Guralp CMG-3T 120 s) and five temporary stations (Guralp CMG-3ESP 60 s). The permanent station is a 120 s Guralp CMG-3T and belongs to the Canary Island Seismic Network, run by the Instituto Geográfico Nacional (IGN) of Spain. The temporary stations are 60 s Guralp CMG-3ESP, provided by the GFZ seismic pool. The deployment was carried out in December 2009. The stations will be recording during two years. The improvement of the seismic network allow us to tackle the following issues: the detection and analysis of any local seismicity of tectonic and/or volcanic origin at Gran Canaria island; to contribute to the understanding of the regional seismicity with special interest in the oceanic channel between Tenerife and Gran Canaria Island in collaboration with a project running a dense temporary seismic network in Tenerife; to study the crustal and upper mantle structure, under Gran Canaria to constrain the crustal structure, the source of the volcanism, and better sample the mantle discontinuities and anisotropy. To study the Earth structure, we use receiver function analysis, ambient seismic noise and SKS anisotropy techniques, This project is part of a long-term research of the crustal and the mantle structure of the Canary Islands, which has started with Gran Canaria and Tenerife Islands and will eventually continue with the rest of the archipelago. The origin of the Canary Islands is generally attributed to a broad mantle upwelling under a slow moving plate, resulting in spatially and temporally distributed volcanic activity and a large number of seamounts and islands. A controversial discussion has been going on about the factors that control the evolution of the volcanic edifices, the type of the melting

  8. Hydrogen Bond Network Isomers of the Water Nonamer and Decamer Observed by Broadband Rotational Spectroscopy

    NASA Astrophysics Data System (ADS)

    Perez, Cristobal; Zaleski, Daniel P.; Seifert, Nathan A.; Pate, Brooks H.; Kisiel, Zbigniew; Temelso, Berhane; Shields, George C.

    2013-06-01

    After our previous study of the rotational spectrum of water clusters in the 6-18 GHz region, in order to study clusters of larger size (>8 water molecules), a chirped-pulse Fourier transform microwave spectrometer in the 2-8 GHz frequency range has been used to obtain the broadband rotational spectra of five water nonamer isomers and four water decamer isomers in a pulsed molecular beam. The oxygen atom framework geometries for three nonamers and two decamers have also been unambiguously identified from isotopic labeling measurements using an H_{2}^{18}O enriched sample. Three of the four observed water decamer show tunneling effect associated with the internal dynamics of hydrogen-bond network in a similar fashion as the prism water hexamer. These tunneling paths are quenched upon a single incorporation of a H_{2}^{18}O molecule in the cluster. Due the large amount of closely-spaced rotational transitions in the H_{2}^{18}O spectrum, automated fitting tools were employed to extract the corresponding rotational spectra, which will be also briefly described. C. Perez, M. T. Muckle, D. P. Zaleski, N. A. Seifert, B. Temelso, G. C. Shields, Z. Kisiel, and B. H. Pate, Science 336, 897 (2012).

  9. Energy harvesting performance of a broadband electromagnetic vibration energy harvester for powering industrial wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Ren, Long; Chen, Renwen; Xia, Huakang; Zhang, Xiaoxiao

    2016-04-01

    To supply power to wireless sensor networks, a type of broadband electromagnetic vibration energy harvester (VEH) using bistable vibration scavenging structure is proposed. It consists of a planar spring, an electromagnetic transducer with an annular magnetic circuit, and a coil assembly with a ferrite bobbin inside. A nonlinear magnetic force respecting to the relative displacement is generated by the ferrite bobbin, and to broaden the working frequency bandwidth of the VEH. Moreover, the ferrite bobbin increases the magnetic flux linkage gradient of the coil assembly in its moving region, and further to improve its output voltage. The dynamic behaviors of the VEH are analyzed and predicted by finite element analysis and ODE calculation. Validation experiments are carried out and show that the VEH can harvest high energy in a relatively wide excitation frequency band. The further test shows that the load power of the VEH with a load resistor of 90Ω can reach 10mW level in a wide frequency bandwidth when the acceleration level of the harmonic excitation is 1g. It can ensure the intermittent work of many sensors as well as wireless communication modules at least.

  10. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  11. The Future of Mobile TV: When Mobile TV Meets the Internet and Social Networking

    NASA Astrophysics Data System (ADS)

    Montpetit, Marie-José; Klym, Natalie; Blain, Emmanuel

    First-generation mobile TV has involved delivering content to cell phones. But as mobile TV evolves, it will find greater significance as part of a multifaceted video offering that combines multiple screens, devices, networks, and content types. Content, or a particular viewing session, moves with the user, across devices and across networks. Furthermore, in addition to providing an alternate screen, a mobile device may provide complementary functions like programming TiVo remotely, streaming video from the cell phone to the TV set, or creating video content for distribution on the Web and uploading it directly over wireless networks. In the new TV ecosystem, all end-user devices collaborate across the whole video value chain, from content creation to distribution to consumption. Finally, as mobile devices become integral components of the new video ecosystem, their personal nature will drive the development of social TV, defined as a new way of delivering TV based on users sharing all aspects of the experience within the context of social networks. This chapter presents our view of mobile social TV: a shared TV experience that uses the power of the Internet and social networks to "move" from screen to screen and network to network to unite family and friends.

  12. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-05-01

    Sagnik Ghosh, Bhaskar D. Rao, and James R. Zeidler; "Outage-Efficient Strategies for Multiuser MIMO Networks with Channel Distribution Information... Distributed cooperative routing and hybrid ARQ in MIMO -BLAST ad hoc networks”, submitted to IEEE Transactions on Communications, 2009. Davide...mobile ad hoc networks using polling techniques for MIMO nodes. Centralized and distributed topology control algorithms have been develop to

  13. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  14. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    NASA Technical Reports Server (NTRS)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  15. Site selection for the future stations of the french permanent broadband network

    NASA Astrophysics Data System (ADS)

    Vergne, Jérôme; Charade, Olivier

    2013-04-01

    RESIF (REseau SIsmologique et géodésique Français) is a new French research infrastructure dedicated to the observation of earth deformation based on seismic and geodetic instruments mainly located in France. One of its major component, called RESIF-CLB (Construction Large Bande), is devoted to the evolution of the permanent seismic broadband network in metropolitan France with the objective to complement the 45 existing stations with ~155 new stations within the next eight years. This network will be used for various scientific objectives including deep structures imaging and national seismicity monitoring. The chosen network topology consists in a backbone of homogeneously distributed stations (long wavelength array) completed by additional stations in seismically active regions. Management of the RESIF-CLB project is carried out by the technical division of INSU (Institut National des Sciences de l'Univers) who will rely on eight regional observatories and the CEA-LDG for the construction and operation of the stations. To optimize the performance of the network, we put a strong emphasis on the standardization of the stations in term of vault types, scientific and technical instrumentation and operation procedures. We also set up a procedure for site selection requiring that every potential site has to be tested for at least 3 weeks with a minimalist installation. Analysis of the continuous ambient noise records is then included in a standardized report submitted to all committed partners for acceptance. During the last two years, about 60 potential new sites have been tested, spanning various places and environments. We present a review of the seismic noise measurements at these sites and discuss the influence of different types of noise sources depending on the frequency band of interest. For example, we show that regional population distribution can be used as a proxy to infer the noise level at frequencies higher than 1 Hz. Based on similar noise analyses

  16. The North East Italy (NI) broadband seismic network run by OGS: experience in improving the long period performances

    NASA Astrophysics Data System (ADS)

    Pesaresi, D.

    2009-04-01

    The NI broadband seismic network is designed to monitor regional seismic activity of North East Italy and surroundings as well as to provide high quality data for various research projects in regional and global broadband seismology, like moment tensor determination. The network, grown during the last 30 years within local Civil Defence agencies and neighbouring scientific institutions cooperation, currently consists of 11 digital broadband stations equipped with Streckeisen STS-2 and STS-1, Nanometrics Trillium 40 and Guralp CMG-3T seismometers with 120 and 40 seconds long period corners; most of the seismic stations are also equipped with accelerometers. Waveforms and parametric data of the NI seismic network are transmitted in real time to the Friuli-Venezia Giulia,Veneto and Provincia di Trento Civil Defence Agencies, to the Italian National Institute for Geophysics and Volcanology (INGV) and to the Earth Science Department (DST) of the Trieste University in Italy, to the Austrian Central Institute for Meteorology and Geodynamics (ZAMG) in Vienna, Austria and to the Environmental Agency of the Republic of Slovenia (ARSO) in Ljubljana, Slovenia to support emergency management and seismological studies in the whole Alps-Dinarides junction zone. The commercial Antelope software suite from BRTT has been chosen as the common basis for real time data exchange, rapid location of earthquakes and alerting. In order to guarantee high quality installations, we sustain a continuous effort that involves searches for appropriate sites, away from sources of long period noise, improvements in installation procedures and insulation techniques, maintenance of transfer function files and routine monitoring of noise conditions at individual existing station. The quality of the seismic data is checked through the noise Power Spectral Density (PSD) analysis. The insulation equipment that we designed for our network is a local adaptation of the pressure-thermal insulation

  17. Epidemic transmission on random mobile network with diverse infection periods

    NASA Astrophysics Data System (ADS)

    Li, Kezan; Yu, Hong; Zeng, Zhaorong; Ding, Yong; Ma, Zhongjun

    2015-05-01

    The heterogeneity of individual susceptibility and infectivity and time-varying topological structure are two realistic factors when we study epidemics on complex networks. Current research results have shown that the heterogeneity of individual susceptibility and infectivity can increase the epidemic threshold in a random mobile dynamical network with the same infection period. In this paper, we will focus on random mobile dynamical networks with diverse infection periods due to people's different constitutions and external circumstances. Theoretical results indicate that the epidemic threshold of the random mobile network with diverse infection periods is larger than the counterpart with the same infection period. Moreover, the heterogeneity of individual susceptibility and infectivity can play a significant impact on disease transmission. In particular, the homogeneity of individuals will avail to the spreading of epidemics. Numerical examples verify further our theoretical results very well.

  18. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  19. Mobilization Training and Networking Resource Inventory

    DTIC Science & Technology

    1990-01-01

    CIMEX ...... Winter Exercise, Civil Military Exercise WWMCCS ........... Worldwide Military Command and Control System xvi MOBILIZATION TRAINING AND...MS FTX 9. Readiness for Mobilization Exercise (REMOBE) 10. REX-ALPHA 11. STARCEX 12. WINTEX- CIMEX 13. JCS Remedial Action Projects (RAP) Program 14...This exercise is small, includes high level NATO officials of NATO countries and is held the opposite years of WINTEX- CIMEX . The purpose is to

  20. Improved community model for social networks based on social mobility

    NASA Astrophysics Data System (ADS)

    Lu, Zhe-Ming; Wu, Zhen; Luo, Hao; Wang, Hao-Xian

    2015-07-01

    This paper proposes an improved community model for social networks based on social mobility. The relationship between the group distribution and the community size is investigated in terms of communication rate and turnover rate. The degree distributions, clustering coefficients, average distances and diameters of networks are analyzed. Experimental results demonstrate that the proposed model possesses the small-world property and can reproduce social networks effectively and efficiently.

  1. Modeling the propagation of mobile phone virus under complex network.

    PubMed

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei; Yao, Yu

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively.

  2. NX-2G : autonomous BBOBS-NX for a highly mobile broadband seismic observation at the seafloor

    NASA Astrophysics Data System (ADS)

    Shiobara, Hajime; Sugioka, Hiroko; Ito, Aki; Shinohara, Masanao

    2016-04-01

    We had developed the broadband ocean bottom seismometer (BBOBS) and its new generation system (BBOBS-NX), and, with them, several practical observations have been performed to create and establish a new category of the ocean floor broadband seismology, since 1999. Now, our BBOBS and BBOBS-NX data is proved to be at acceptable level for broadband seismic analyses. Especially, the BBOBS-NX is able to obtain the low noise horizontal data comparable to the land station in periods longer than 10 s, which is adequate for modern analyses of the mantle structure. Moreover, the BBOBS(T)-NX is under practical evaluation for the mobile tilt observation at the seafloor, which will enable dense geodetic monitoring. The BBOBS-NX system must be a powerful tool, although, the current system has intrinsic limitation in opportunity of observations due to the necessary use of the submersible vehicle for the deployment and recovery. If we can use this system with almost any kind of vessels, like as the BBOBS (self pop-up system), it should lead us a true breakthrough of seafloor observations in geodynamics. Hereafter, we call the new autonomous BBOBS-NX as NX-2G in short. There are two main problems to be cleared to realize the NX-2G system. The first one is a tilt of the sensor unit on landing, which is larger than the acceptable limit of the sensor (±8°) in 47 % after our 15 free-fall deployments of the BBOBS-NX. As we had no evidence at which moment the tilt occurred, so it was observed during the BBOBS-NX deployment in the last year by attaching a video camera and an acceleration logger those were originally developed for this purpose. The only one result shows that the tilt on landing seemed determined by the final posture of the BBOBS-NX system just before the penetration into the sediment. The second problem is a required force to extract the sensor unit from the sticky clay sediment, which was about 80 kgf in maximum with the current BBOBS-NX system from in-situ measurements

  3. Neural Network Perception for Mobile Robot Guidance

    DTIC Science & Technology

    1992-02-16

    each image (the steering model used to map road position to steering direction is discussed in the next section). The network described in the last...CHAPTER 3. TRAINING NETWORKS "ON-THE-FLY" response should change". Because it does not rely on a strong model of what important image features look... NETWORKS WITH STRUCTURED NOISE bias roughly models the tendency of noise features to appear away from the path directly ahead of the vehicle in real

  4. Placement of Base Stations in Broadband Power Line Communications Access Networks by Means of Multi-criteria Optimization

    NASA Astrophysics Data System (ADS)

    Haidine, Abdelfatteh; Lehnert, Ralf

    Broadband Power Line Communications (B-PLC) technology is an alternative for broadband access networks, allowing bit rates up to currently 200Mbps. This technique uses the wiring of the low-voltage grid in order to offer to the users the telecommunications services, such as Internet, VoIP, VoD, etc. The B-PLC design process is sub-divided into two parts: the Generalized Base Station Placement (GBSP) problem and the PLC Channel Allocation Problem (P-CAP). This paper focuses on GBSP that is modeled as multi-criteria combinatorial optimization problem. Based on our published mathematical modeling, this paper supplies more numerical experiments for the evaluation of Multi-Objective Evolutionary Algorithms (MOEAs) in solving GBSP. Their performance is compared with the single-objective optimization.

  5. Data Quality Control of the French Permanent Broadband Network in the RESIF Framework.

    NASA Astrophysics Data System (ADS)

    Grunberg, M.; Lambotte, S.; Engels, F.

    2014-12-01

    In the framework of the RESIF (Réseau Sismologique et géodésique Français) project, a new information system is setting up, allowing the improvement of the management and the distribution of high quality data from the different elements of RESIF. Within this information system, EOST (in Strasbourg) is in charge of collecting real-time permanent broadband seismic waveform, and performing Quality Control on these data. The real-time and validated data set are pushed to the French National Distribution Center (Isterre/Grenoble) to make them publicly available. Furthermore EOST hosts the BCSF-ReNaSS, in charge of the French metropolitan seismic bulletin. This allows to benefit from some high-end quality control based on the national and world-wide seismicity. Here we present the real-time seismic data flow from the stations of the French National Broad Band Network to EOST, and then, the data Quality Control procedures that were recently installed, including some new developments.The data Quality Control consists in applying a variety of processes to check the consistency of the whole system from the stations to the data center. This allows us to verify that instruments and data transmission are operating correctly. Moreover, time quality is critical for most of the scientific data applications. To face this challenge and check the consistency of polarities and amplitudes, we deployed several high-end processes including a noise correlation procedure to check for timing accuracy (intrumental time errors result in a time-shift of the whole cross-correlation, clearly distinct from those due to change in medium physical properties), and a systematic comparison of synthetic and real data for teleseismic earthquakes of magnitude larger than 6.5 to detect timing errors as well as polarity and amplitude problems.

  6. Exploiting node mobility for energy optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    El-Moukaddem, Fatme Mohammad

    Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed

  7. Design of a broadband electrical impedance matching network for piezoelectric ultrasound transducers based on a genetic algorithm.

    PubMed

    An, Jianfei; Song, Kezhu; Zhang, Shuangxi; Yang, Junfeng; Cao, Ping

    2014-04-16

    An improved method based on a genetic algorithm (GA) is developed to design a broadband electrical impedance matching network for piezoelectric ultrasound transducer. A key feature of the new method is that it can optimize both the topology of the matching network and perform optimization on the components. The main idea of this method is to find the optimal matching network in a set of candidate topologies. Some successful experiences of classical algorithms are absorbed to limit the size of the set of candidate topologies and greatly simplify the calculation process. Both binary-coded GA and real-coded GA are used for topology optimization and components optimization, respectively. Some calculation strategies, such as elitist strategy and clearing niche method, are adopted to make sure that the algorithm can converge to the global optimal result. Simulation and experimental results prove that matching networks with better performance might be achieved by this improved method.

  8. Jamming in Mobile Networks: A Game-Theoretic Approach

    DTIC Science & Technology

    2013-03-01

    general treatment of multiplayer differential games was presented by Starr and Ho [16], Leitmann [36], Vaisbord and Zhukovskiy [65], Zhukovskiy and...REPORT Jamming in mobile networks: A game -theoretic approach. 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In this paper, we address the problem of...model the intrusion as a pursuit-evasion game between a mobile jammer and a team of agents. First, we consider a differential game -theoretic approach

  9. Mobile human network management and recommendation by probabilistic social mining.

    PubMed

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  10. Data Quality Control of the French Permanent Broadband Network in the RESIF Framework

    NASA Astrophysics Data System (ADS)

    Grunberg, Marc; Lambotte, Sophie; Engels, Fabien; Dretzen, Remi; Hernandez, Alain

    2014-05-01

    In the framework of the RESIF (Réseau Sismologique et géodésique Français) project, a new information system is being setting up, allowing the improvement of the management and the distribution of high quality data from the different elements of RESIF and the associated networks. Within this information system, EOST (in Strasbourg) is in charge of collecting real-time permanent broadband seismic waveform, and performing Quality Control on these data. The real-time and validated data set are pushed to the French National Distribution Center (Isterre/Grenoble) in order to make them publicly available. Furthermore EOST hosts the BCSF-ReNaSS, in charge of the French metropolitan seismic bulletin. This allows to benefit from some high-end quality control based on the national and world-wide seismicity. Here we present first the real-time seismic data flow from the stations of the French National Broad Band Network to EOST, and then, the data Quality Control procedures that were recently installed, including some new developments. The data Quality Control consists in applying a variety of subprocesses to check the consistency of the whole system and process from the stations to the data center. This allows us to verify that instruments and data transmission are operating correctly. Moreover analysis of the ambient noise helps to characterize intrinsic seismic quality of the stations and to identify other kind of disturbances. The deployed Quality Control consist in a pipeline that starts with low-level procedures : check the real-time miniseed data file (file naming convention, data integrity), check for inconsistencies between waveform and meta-data (channel name, sample rate, etc.), compute waveform statistics (data availability, gap/overlap, mean, rms, time quality, spike). It is followed by some high-level procedures such as : power spectral density computation (PSD), STA/LTA computation to be correlated to the seismicity, phases picking and stations magnitudes

  11. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  12. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  13. Shuttle-run synchronization in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  14. Impact of mobility structure on optimization of small-world networks of mobile agents

    NASA Astrophysics Data System (ADS)

    Lee, Eun; Holme, Petter

    2016-06-01

    In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the agents on the optimal tuning of a small-world type network construction method. By this method, the network is updated periodically and held static between the updates. We investigate the optimal updating times for different scenarios of the movement of agents (modeling, for example, the fat-tailed trip distances, and periodicities, of human travel). We find that these mobility patterns affect the power consumption in non-trivial ways and discuss how these effects can best be handled.

  15. Reconceptualising Diasporic Intellectual Networks: Mobile Scholars in Transnational Space

    ERIC Educational Resources Information Center

    Chen, Qiongqiong; Koyama, Jill P.

    2013-01-01

    In this article, we explore how Chinese scholars in the USA recount their transnational collaborations and linkages. Guided by post-colonial theories and cultural studies of transnational academic mobility, we utilise in-depth interviews to resituate the scholars' experiences within a discourse of diasporic intellectual networks. We argue that…

  16. Autonomous Navigation Apparatus With Neural Network for a Mobile Vehicle

    NASA Technical Reports Server (NTRS)

    Quraishi, Naveed (Inventor)

    1996-01-01

    An autonomous navigation system for a mobile vehicle arranged to move within an environment includes a plurality of sensors arranged on the vehicle and at least one neural network including an input layer coupled to the sensors, a hidden layer coupled to the input layer, and an output layer coupled to the hidden layer. The neural network produces output signals representing respective positions of the vehicle, such as the X coordinate, the Y coordinate, and the angular orientation of the vehicle. A plurality of patch locations within the environment are used to train the neural networks to produce the correct outputs in response to the distances sensed.

  17. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    PubMed Central

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  18. RoCoMAR: robots' controllable mobility aided routing and relay architecture for mobile sensor networks.

    PubMed

    Le, Duc Van; Oh, Hoon; Yoon, Seokhoon

    2013-07-05

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  19. Mobile satellite business networks: A part of the European mobile system

    NASA Technical Reports Server (NTRS)

    deMateo, M. L.; Jongejans, A.; Loisy, C.; VanHimbeeck, C.; Marchal, J. P.; Borella, A.; Sartori, M.

    1995-01-01

    The European Space Agency (ESA) is presently procuring an L-band payload EMS, to be embarked on the ITALSAT-2 satellite due for launch in early 1996, in order to promote a regional European mobile system. One of the Land Mobile Communication systems supported by EMS is the MSBN (Mobile Satellite Business Network) voice and data system which will offer the services of a business network on a seamless European coverage. This paper will first recall the characteristics of the MSBN system, which is based on quasi-synchronized CDMA (Code Division Multiple Access) techniques in both directions, and then describe the CDMA receivers implementation. Main validation test results will also be reported confirming predicted performances.

  20. Epidemic spreading on hierarchical geographical networks with mobile agents

    NASA Astrophysics Data System (ADS)

    Han, Xiao-Pu; Zhao, Zhi-Dan; Hadzibeganovic, Tarik; Wang, Bing-Hong

    2014-05-01

    Hierarchical geographical traffic networks are critical for our understanding of scaling laws in human trajectories. Here, we investigate the susceptible-infected epidemic process evolving on hierarchical networks in which agents randomly walk along the edges and establish contacts in network nodes. We employ a metapopulation modeling framework that allows us to explore the contagion spread patterns in relation to multi-scale mobility behaviors. A series of computer simulations revealed that a shifted power-law-like negative relationship between the peak timing of epidemics τ0 and population density, and a logarithmic positive relationship between τ0 and the network size, can both be explained by the gradual enlargement of fluctuations in the spreading process. We employ a semi-analytical method to better understand the nature of these relationships and the role of pertinent demographic factors. Additionally, we provide a quantitative discussion of the efficiency of a border screening procedure in delaying epidemic outbreaks on hierarchical networks, yielding a rather limited feasibility of this mitigation strategy but also its non-trivial dependence on population density, infector detectability, and the diversity of the susceptible region. Our results suggest that the interplay between the human spatial dynamics, network topology, and demographic factors can have important consequences for the global spreading and control of infectious diseases. These findings provide novel insights into the combined effects of human mobility and the organization of geographical networks on spreading processes, with important implications for both epidemiological research and health policy.

  1. An Energy-Efficient Mobility-Supporting MAC Protocol for Mobile Sensor Networks

    NASA Astrophysics Data System (ADS)

    Choi, Sung-Chan; Lee, Jang-Won

    In this paper, we design an adaptive mobility-supporting MAC (AM-MAC) protocol for mobile sensor networks. In our protocol, as in S-MAC [1], each virtual cluster that consists of a subset of sensor nodes has its own listen-sleep schedule. Hence, when a mobile sensor node moves into a new virtual cluster, it needs to adapt to the listen-sleep schedule of the corresponding virtual cluster in a timely and energy efficient manner. To this end, in our protocol, we utilize schedule information on border nodes between virtual clusters. This allows us to implement fast and energy efficient listen-sleep schedule adaptation for mobile nodes, which consists of two main functions: energy efficient secondary listen period and smart scheduling adaptation. Simulation results show that our protocol can provide fast schedule adaptation while achieving energy efficiency.

  2. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  3. Analysis of bend insensitive liquid core optical fiber for broadband network and fiber-to-the-home applications

    NASA Astrophysics Data System (ADS)

    Palodiya, Vikram; Raghuwanshi, Sanjeev Kumar

    2016-02-01

    In this paper, we analyze the guided properties of liquid core optical fibers for fiber-to-thehome application. Fiber to the Home is advance technology to give unlimited bandwidth and high speed broadband network for communication. Fiber to the Home technology refers to the installation and use of bend insensitive optical fiber cables. The liquid core optical fiber has a simple core and cladding structure. This fiber achieves high relative refractive index difference among the core and cladding is proving to be bending insensitive. The single mode condition and the group velocity dispersion, mode field diameter and the bending loss of single mode fiber are studied theoretically. Compare with traditional silica optical fiber. Liquid core optical fiber has much smaller bending loss of than traditional silica fibers. Liquid core optical fiber shows unique properties, such as more confided guided mode, low bending loss and large non linear parameters in the visible and infrared region. This type of fiber used in fiber -to-the-home applications, Broadband network and also for sensing applications.

  4. Modified weighted fair queuing for packet scheduling in mobile WiMAX networks

    NASA Astrophysics Data System (ADS)

    Satrya, Gandeva B.; Brotoharsono, Tri

    2013-03-01

    The increase of user mobility and the need for data access anytime also increases the interest in broadband wireless access (BWA). The best available quality of experience for mobile data service users are assured for IEEE 802.16e based users. The main problem of assuring a high QOS value is how to allocate available resources among users in order to meet the QOS requirement for criteria such as delay, throughput, packet loss and fairness. There is no specific standard scheduling mechanism stated by IEEE standards, which leaves it for implementer differentiation. There are five QOS service classes defined by IEEE 802.16: Unsolicited Grant Scheme (UGS), Extended Real Time Polling Service (ertPS), Real Time Polling Service (rtPS), Non Real Time Polling Service (nrtPS) and Best Effort Service (BE). Each class has different QOS parameter requirements for throughput and delay/jitter constraints. This paper proposes Modified Weighted Fair Queuing (MWFQ) scheduling scenario which was based on Weighted Round Robin (WRR) and Weighted Fair Queuing (WFQ). The performance of MWFQ was assessed by using above five QoS criteria. The simulation shows that using the concept of total packet size calculation improves the network's performance.

  5. Adaptive neural networks for mobile robotic control

    NASA Astrophysics Data System (ADS)

    Burnett, Jeff R.; Dagli, Cihan H.

    2001-03-01

    Movement of a differential drive robot has non-linear dependence on the current position and orientation. A controller must be able to deal with the non-linearity of the plant. The controller must either linearize the plant and deal with special cases, or be non-linear itself. Once the controller is designed, implementation on a real robotic platform presents challenges due to the varying parameters of the plant. Robots of the same model may have different motor frictions. The surface the robot maneuvers on may change e.g. carpet to tile. Batteries will drain, providing less power over time. A feed-forward neural network controller could overcome these challenges. The network could learn the non- linearities of the plant and monitor the error for parameter changes and adapt to them. In this manner, a single controller can be designed for an ideal robot, and then used to populate a multi-robot colony without manually fine tuning the controller for each robot. This paper shall demonstrate such a controller, outlining design in simulation and implementation on Khepera robotic platforms.

  6. Role of Social Mobilization (Network) in Polio Eradication in India.

    PubMed

    Siddique, Anisur Rahman; Singh, Prem; Trivedi, Geetali

    2016-08-07

    In 2009, India contributed to over half the global cases of poliomyelitis. Many believed that India would be the last country to be polio free. India proved them wrong and was certified polio free in 2014. In January 2016, India celebrated 5 years of being polio free. One of the major reasons behind the interruption of polio transmission in the Polio endemic states of Uttar Pradesh and Bihar was the deployment of Social Mobilization Network (SMNet). A three tiered structure, the 7300 strong SMNet is now the gold standard in public health communication. It mobilizes communities by spearheading civil society participation; and works at district, block and community levels. The SMNet's social mobilization has evolved into an accelerated approach for achieving results with principles of mobilization at its core. The SMNet targets resistance to polio immunization through a multipronged approach by using local religious leaders, community influencers, interpersonal communication, counseling, mothers meetings, announcements from religious institutions and rallies. The success of the SMNet has been its ability to identify and convert resistant families into advocates for polio immunization. Deeply respected in the community, the SMNet mobilizers (98 percent of whom are women) are themselves models for gender empowerment. The SMNet model shows how mobilization techniques can be harnessed for short term and long term goals and can be replicated in other health programs to achieve the same results as were achieved for Polio.

  7. Translational networks in healthcare? Evidence on the design and initiation of organizational networks for knowledge mobilization.

    PubMed

    Fitzgerald, Louise; Harvey, Gill

    2015-08-01

    International attention has focussed on the variations between research evidence and practice in healthcare. This prompted the creation of formalized translational networks consisting of academic-service partnerships. The English Collaborations for Leadership in Applied Health Research and Care (CLAHRCs) are one example of a translational network. Using longitudinal, archival case study data from one CLAHRC over a 3-year period (2008-11), this article explores the relationship between organizational form and the function(s) of a translational network. The article focuses on the research gaps on the effective structures and appropriate governance to support a translational network. Data analysis suggested that the policy of setting up translational networks is insufficient of itself to produce positive translational activity. The data indicate that to leverage the benefits of the whole network, attention must be paid to devising a structure which integrates research production and use and facilitates lateral cross-disciplinary and cross-organizational communication. Equally, appropriate governance arrangements are necessary, particularly in large, multi-stakeholder networks, where shared governance may be questionable. Inappropriate network structure and governance inhibits the potential of the translational network. Finally, the case provides insights into the movement of knowledge within and between network organizations. The data demonstrate that knowledge mobilization extends beyond knowledge translation; knowledge mobilization includes the negotiated utilization of knowledge - a balanced power form of collaboration. Whilst much translational effort is externally focused on the health system, our findings highlight the essential need for the internal negotiation and mobilization of knowledge within academia.

  8. Localization with a mobile beacon in underwater acoustic sensor networks.

    PubMed

    Lee, Sangho; Kim, Kiseon

    2012-01-01

    Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB). The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node's location and then the node's location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  9. Structure and tie strengths in mobile communication networks.

    PubMed

    Onnela, J-P; Saramäki, J; Hyvönen, J; Szabó, G; Lazer, D; Kaski, K; Kertész, J; Barabási, A-L

    2007-05-01

    Electronic databases, from phone to e-mails logs, currently provide detailed records of human communication patterns, offering novel avenues to map and explore the structure of social and communication networks. Here we examine the communication patterns of millions of mobile phone users, allowing us to simultaneously study the local and the global structure of a society-wide communication network. We observe a coupling between interaction strengths and the network's local structure, with the counterintuitive consequence that social networks are robust to the removal of the strong ties but fall apart after a phase transition if the weak ties are removed. We show that this coupling significantly slows the diffusion process, resulting in dynamic trapping of information in communities and find that, when it comes to information diffusion, weak and strong ties are both simultaneously ineffective.

  10. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  11. Anomalous contagion and renormalization in networks with nodal mobility

    NASA Astrophysics Data System (ADS)

    Manrique, Pedro D.; Qi, Hong; Zheng, Minzhang; Xu, Chen; Hui, Pak Ming; Johnson, Neil F.

    2016-07-01

    A common occurrence in everyday human activity is where people join, leave and possibly rejoin clusters of other individuals —whether this be online (e.g. social media communities) or in real space (e.g. popular meeting places such as cafes). In the steady state, the resulting interaction network would appear static over time if the identities of the nodes are ignored. Here we show that even in this static steady-state limit, a non-zero nodal mobility leads to a diverse set of outbreak profiles that is dramatically different from known forms, and yet matches well with recent real-world social outbreaks. We show how this complication of nodal mobility can be renormalized away for a particular class of networks.

  12. Wireless Sensor/Actuator Network Design for Mobile Control Applications

    PubMed Central

    Xia, Feng; Tian, Yu-Chu; Li, Yanjun; Sun, Youxian

    2007-01-01

    Wireless sensor/actuator networks (WSANs) are emerging as a new generation of sensor networks. Serving as the backbone of control applications, WSANs will enable an unprecedented degree of distributed and mobile control. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. With emphasis on the reliability issue, this paper presents an application-level design methodology for WSANs in mobile control applications. The solution is generic in that it is independent of the underlying platforms, environment, control system models, and controller design. To capture the link quality characteristics in terms of packet loss rate, experiments are conducted on a real WSAN system. From the experimental observations, a simple yet efficient method is proposed to deal with unpredictable packet loss on actuator nodes. Trace-based simulations give promising results, which demonstrate the effectiveness of the proposed approach.

  13. Mobility based multicast routing in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Jain, Sanjeev; Tripathi, Vijay S.; Tiwari, Sudarshan

    2013-01-01

    There exist two fundamental approaches to multicast routing namely minimum cost trees and shortest path trees. The (MCT's) minimum cost tree is one which connects receiver and sources by providing a minimum number of transmissions (MNTs) the MNTs approach is generally used for energy constraint sensor and mobile ad hoc networks. In this paper we have considered node mobility and try to find out simulation based comparison of the (SPT's) shortest path tree, (MST's) minimum steiner trees and minimum number of transmission trees in wireless mesh networks by using the performance metrics like as an end to end delay, average jitter, throughput and packet delivery ratio, average unicast packet delivery ratio, etc. We have also evaluated multicast performance in the small and large wireless mesh networks. In case of multicast performance in the small networks we have found that when the traffic load is moderate or high the SPTs outperform the MSTs and MNTs in all cases. The SPTs have lowest end to end delay and average jitter in almost all cases. In case of multicast performance in the large network we have seen that the MSTs provide minimum total edge cost and minimum number of transmissions. We have also found that the one drawback of SPTs, when the group size is large and rate of multicast sending is high SPTs causes more packet losses to other flows as MCTs.

  14. Development of an intelligent wireless sensor network with mobile nodes

    NASA Astrophysics Data System (ADS)

    St. Pierre, Joseph; Michel, Howard E.

    2009-05-01

    Wireless sensor networks have become viable solutions to many commercial and military applications. This research focuses on utilizing the I-TRM to develop an architecture which supports adaptive, self-healing, and self-aware intelligent wireless sensor networks capable of supporting mobile nodes. Sensor subsystems are crucial in the development of projects to test complex systems such as the Future Combat System, a multi-layered system consisting of soldiers and 18 subsystems connected by a network. The proposed architecture utilizes the Sensor Web Enablement (SWE), a standard for sensor networks being developed by the Open Geospatial Consortium (OGC), and the Integrated Technical Reference Model (I-TRM), a multi-layered technical reference model consisting of a behavior-centric technical reference model, information-centric technical reference model, and control technical reference model. The designed architecture has been implemented on MPR2400CA motes using the nesC programming language. Preliminary results show the architecture meets needs of systems such as the Future Combat System. The architecture supports standard and tailored sensors, mobile and immobile sensors nodes, and is scalable. Also, functionality was implemented which produces adaptive, self-healing, and self-aware behavior in the wireless sensor network.

  15. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  16. Attaining Realistic Simulations of Mobile Ad-hoc Networks

    DTIC Science & Technology

    2010-06-01

    Optimized 2-8 Network Engineering Tools ( OPNET ) [33], and Global Mobile Information Systems Simulation Library (GloMoSim) [30]. NS and GloMoSim are...both provided as open use software to researchers, whereas OPNET is a commercial simulation engine. While all of these engines can simulate MANETs, the...key environmental and technical aspects have yet to be accurately modeled in any of the major simulation engines such as OPNET Modeler, NS-2, or

  17. Broadband dielectric spectroscopy of glucose aqueous solution: Analysis of the hydration state and the hydrogen bond network.

    PubMed

    Shiraga, Keiichiro; Suzuki, Tetsuhito; Kondo, Naoshi; Tajima, Takuro; Nakamura, Masahito; Togo, Hiroyoshi; Hirata, Akihiko; Ajito, Katsuhiro; Ogawa, Yuichi

    2015-06-21

    Recent studies of saccharides' peculiar anti-freezing and anti-dehydration properties point to a close association with their strong hydration capability and destructuring effect on the hydrogen bond (HB) network of bulk water. The underlying mechanisms are, however, not well understood. In this respect, examination of the complex dielectric constants of saccharide aqueous solutions, especially over a broadband frequency region, should provide interesting insights into these properties, since the dielectric responses reflect corresponding dynamics over the time scales measured. In order to do this, the complex dielectric constants of glucose solutions between 0.5 GHz and 12 THz (from the microwave to the far-infrared region) were measured. We then performed analysis procedures on this broadband spectrum by decomposing it into four Debye and two Lorentz functions, with particular attention being paid to the β relaxation (glucose tumbling), δ relaxation (rotational polarization of the hydrated water), slow relaxation (reorientation of the HB network water), fast relaxation (rotation of the non-HB water), and intermolecular stretching vibration (hindered translation of water). On the basis of this analysis, we revealed that the hydrated water surrounding the glucose molecules exhibits a mono-modal relaxational dispersion with 2-3 times slower relaxation times than unperturbed bulk water and with a hydration number of around 20. Furthermore, other species of water with distorted tetrahedral HB water structures, as well as increases in the relative proportion of non-HB water molecules which have a faster relaxation time and are not a part of the surrounding bulk water HB network, was found in the vicinity of the glucose molecules. These clearly point to the HB destructuring effect of saccharide solutes in aqueous solution. The results, as a whole, provide a detailed picture of glucose-water and water-water interactions in the vicinity of the glucose molecules at

  18. Potential improvements in horizontal very broadband seismic data in the IRIS/USGS component of the Global Seismic Network

    USGS Publications Warehouse

    Ringler, Adam; Steim, J.M.; Zandt, T; Hutt, Charles R.; Wilson, David; Storm, Tyler

    2016-01-01

    The Streckeisen STS‐1 has been the primary vault‐type seismometer used in the over‐150‐station Global Seismographic Network (GSN). This sensor has long been known for its outstanding vertical, very long‐period (e.g., >100  s period), and low‐noise performance, although the horizontal long‐period noise performance is less well known. The STS‐1 is a limited, important resource, because it is no longer made or supported by the original manufacturer. We investigate the incoherent noise of horizontal‐component sensors, where coherent signals among sensors have been removed, giving an upper bound on the self‐noise of both the STS‐1 and STS‐2 horizontal components. Our findings suggest that a well‐installed STS‐2 could potentially produce data with similar or better incoherent noise levels to that of a horizontal‐component STS‐1. Along with our experimental investigation, we compare background noise levels for a calendar year at Incorporated Research Institutions for Seismology/U.S. Geological Survey network stations, which comprise approximately two‐thirds of the GSN, with collocated STS‐1 and STS‐2 seismometers. The use of an STS‐2‐class of sensor (flat to velocity to 120 s period) to acquire low‐frequency data in surface‐vault installations would allow network operators to focus more attention on improving vertical data. In order to deal with the difference in instrument response shapes between the two instruments, we detail two different time‐domain filters that would allow users to convert broadband STS‐2 data into very broadband data with a response similar to that of an STS‐1 (flat to velocity to 360 s period). We conclude that the complexity of the current primary horizontal vault sensors in the GSN may not be necessary until we are better able to isolate surface horizontal sensors from various noise sources.

  19. Mobile calibration based on laser metrology and approximation networks.

    PubMed

    Muñoz-Rodriguez, J Apolinar

    2010-01-01

    A mobile calibration technique for three-dimensional vision is presented. In this method, vision parameters are computed automatically by approximation networks built based on the position of a camera and image processing of a laser line. The networks also perform three-dimensional visualization. In the proposed system, the setup geometry can be modified online, whereby an online re-calibration is performed based on data provided by the network and the required modifications of extrinsic and intrinsic parameters are thus determined, overcoming any calibration limitations caused by the modification procedure. The mobile calibration also avoids procedures involving references, which are used in traditional online re-calibration methods. The proposed mobile calibration thus improves the accuracy and performance of the three-dimensional vision because online data of calibrated references are not passed on to the vision system. This work represents a contribution to the field of online re-calibration, as verified by a comparison with the results based on lighting methods, which are calibrated and re-calibrated via perspective projection. Processing time is also studied.

  20. Service Demand Discovery Mechanism for Mobile Social Networks

    PubMed Central

    Wu, Dapeng; Yan, Junjie; Wang, Honggang; Wang, Ruyan

    2016-01-01

    In the last few years, the service demand for wireless data over mobile networks has continually been soaring at a rapid pace. Thereinto, in Mobile Social Networks (MSNs), users can discover adjacent users for establishing temporary local connection and thus sharing already downloaded contents with each other to offload the service demand. Due to the partitioned topology, intermittent connection and social feature in such a network, the service demand discovery is challenging. In particular, the service demand discovery is exploited to identify the best relay user through the service registration, service selection and service activation. In order to maximize the utilization of limited network resources, a hybrid service demand discovery architecture, such as a Virtual Dictionary User (VDU) is proposed in this paper. Based on the historical data of movement, users can discover their relationships with others. Subsequently, according to the users activity, VDU is selected to facilitate the service registration procedure. Further, the service information outside of a home community can be obtained through the Global Active User (GAU) to support the service selection. To provide the Quality of Service (QoS), the Service Providing User (SPU) is chosen among multiple candidates. Numerical results show that, when compared with other classical service algorithms, the proposed scheme can improve the successful service demand discovery ratio by 25% under reduced overheads. PMID:27886096

  1. Service Demand Discovery Mechanism for Mobile Social Networks.

    PubMed

    Wu, Dapeng; Yan, Junjie; Wang, Honggang; Wang, Ruyan

    2016-11-23

    In the last few years, the service demand for wireless data over mobile networks has continually been soaring at a rapid pace. Thereinto, in Mobile Social Networks (MSNs), users can discover adjacent users for establishing temporary local connection and thus sharing already downloaded contents with each other to offload the service demand. Due to the partitioned topology, intermittent connection and social feature in such a network, the service demand discovery is challenging. In particular, the service demand discovery is exploited to identify the best relay user through the service registration, service selection and service activation. In order to maximize the utilization of limited network resources, a hybrid service demand discovery architecture, such as a Virtual Dictionary User (VDU) is proposed in this paper. Based on the historical data of movement, users can discover their relationships with others. Subsequently, according to the users activity, VDU is selected to facilitate the service registration procedure. Further, the service information outside of a home community can be obtained through the Global Active User (GAU) to support the service selection. To provide the Quality of Service (QoS), the Service Providing User (SPU) is chosen among multiple candidates. Numerical results show that, when compared with other classical service algorithms, the proposed scheme can improve the successful service demand discovery ratio by 25% under reduced overheads.

  2. Radiofrequency Exposure Amongst Employees of Mobile Network Operators and Broadcasters.

    PubMed

    Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom

    2016-10-13

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields.

  3. Traffic-driven epidemic spreading on networks of mobile agents

    NASA Astrophysics Data System (ADS)

    Yang, Han-Xin; Wang, Wen-Xu; Lai, Ying-Cheng; Wang, Bing-Hong

    2012-06-01

    The question as to how traffic or transportation processes on complex networks can shape the dynamics of epidemic spreading is of great interest for a number of areas. We study traffic-driven epidemic spreading on networks of mobile agents by incorporating two routing strategies: random and greedy. We find that for the case of infinite agent delivery capacity, increasing the moving velocity has opposite effects on the outbreak of epidemic spreading for the two routing strategies. However, expanding the communication range among agents can increase the transportation efficiency but counterintuitively suppress epidemic spreading. For finite delivery capacity, the emergence of traffic congestion can effectively inhibit epidemic spreading for both routing strategies. We provide a mean-field theory to explain the numerical findings. Our results can provide insights into devising effective strategies to suppress the spreading of harmful epidemics on time-varying networks.

  4. Voronoi-based localisation algorithm for mobile sensor networks

    NASA Astrophysics Data System (ADS)

    Guan, Zixiao; Zhang, Yongtao; Zhang, Baihai; Dong, Lijing

    2016-11-01

    Localisation is an essential and important part in wireless sensor networks (WSNs). Many applications require location information. So far, there are less researchers studying on mobile sensor networks (MSNs) than static sensor networks (SSNs). However, MSNs are required in more and more areas such that the number of anchor nodes can be reduced and the location accuracy can be improved. In this paper, we firstly propose a range-free Voronoi-based Monte Carlo localisation algorithm (VMCL) for MSNs. We improve the localisation accuracy by making better use of the information that a sensor node gathers. Then, we propose an optimal region selection strategy of Voronoi diagram based on VMCL, called ORSS-VMCL, to increase the efficiency and accuracy for VMCL by adapting the size of Voronoi area during the filtering process. Simulation results show that the accuracy of these two algorithms, especially ORSS-VMCL, outperforms traditional MCL.

  5. Duplicate Address Detection Table in IPv6 Mobile Networks

    NASA Astrophysics Data System (ADS)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  6. Human mobility monitoring in very low resolution visual sensor network.

    PubMed

    Bo, Nyan Bo; Deboeverie, Francis; Eldib, Mohamed; Guan, Junzhi; Xie, Xingzhe; Niño, Jorge; Van Haerenborgh, Dirk; Slembrouck, Maarten; Van de Velde, Samuel; Steendam, Heidi; Veelaert, Peter; Kleihorst, Richard; Aghajan, Hamid; Philips, Wilfried

    2014-11-04

    This paper proposes an automated system for monitoring mobility patterns using a network of very low resolution visual sensors (30 × 30 pixels). The use of very low resolution sensors reduces privacy concern, cost, computation requirement and power consumption. The core of our proposed system is a robust people tracker that uses low resolution videos provided by the visual sensor network. The distributed processing architecture of our tracking system allows all image processing tasks to be done on the digital signal controller in each visual sensor. In this paper, we experimentally show that reliable tracking of people is possible using very low resolution imagery. We also compare the performance of our tracker against a state-of-the-art tracking method and show that our method outperforms. Moreover, the mobility statistics of tracks such as total distance traveled and average speed derived from trajectories are compared with those derived from ground truth given by Ultra-Wide Band sensors. The results of this comparison show that the trajectories from our system are accurate enough to obtain useful mobility statistics.

  7. Human mobility networks and persistence of rapidly mutating pathogens

    PubMed Central

    Aleta, Alberto; Hisi, Andreia N. S.; Colizza, Vittoria; Moreno, Yamir

    2017-01-01

    Rapidly mutating pathogens may be able to persist in the population and reach an endemic equilibrium by escaping hosts’ acquired immunity. For such diseases, multiple biological, environmental and population-level mechanisms determine the dynamics of the outbreak, including pathogen's epidemiological traits (e.g. transmissibility, infectious period and duration of immunity), seasonality, interaction with other circulating strains and hosts’ mixing and spatial fragmentation. Here, we study a susceptible-infected-recovered-susceptible model on a metapopulation where individuals are distributed in sub-populations connected via a network of mobility flows. Through extensive numerical simulations, we explore the phase space of pathogen's persistence and map the dynamical regimes of the pathogen following emergence. Our results show that spatial fragmentation and mobility play a key role in the persistence of the disease whose maximum is reached at intermediate mobility values. We describe the occurrence of different phenomena including local extinction and emergence of epidemic waves, and assess the conditions for large-scale spreading. Findings are highlighted in reference to previous studies and to real scenarios. Our work uncovers the crucial role of hosts’ mobility on the ecological dynamics of rapidly mutating pathogens, opening the path for further studies on disease ecology in the presence of a complex and heterogeneous environment.

  8. Dissemination of optical-comb-based ultra-broadband frequency reference through a fiber network.

    PubMed

    Nagano, Shigeo; Kumagai, Motohiro; Li, Ying; Ido, Tetsuya; Ishii, Shoken; Mizutani, Kohei; Aoki, Makoto; Otsuka, Ryohei; Hanado, Yuko

    2016-08-22

    We disseminated an ultra-broadband optical frequency reference based on a femtosecond (fs)-laser optical comb through a kilometer-scale fiber link. Its spectrum ranged from 1160 nm to 2180 nm without additional fs-laser combs at the end of the link. By employing a fiber-induced phase noise cancellation technique, the linewidth and fractional frequency instability attained for all disseminated comb modes were of order 1 Hz and 10-18 in a 5000 s averaging time. The ultra-broad optical frequency reference, for which absolute frequency is traceable to Japan Standard Time, was applied in the frequency stabilization of an injection-seeded Q-switched 2051 nm pulse laser for a coherent light detection and ranging LIDAR system.

  9. Seismic source and structure estimation in the western Mediterranean using a sparse broadband network

    NASA Astrophysics Data System (ADS)

    Thio, Hong Kie; Song, Xi; Saikia, Chandan K.; Helmberger, Donald V.; Woods, Bradley B.

    1999-01-01

    We present a study of regional earthquakes in the western Mediterranean geared toward the development of methodologies and path calibrations for source characterization using regional broadband stations. The results of this study are useful for the monitoring and discrimination of seismic events under a comprehensive test ban treaty, as well as the routine analysis of seismicity and seismic hazard using a sparse array of stations. The area consists of several contrasting geological provinces with distinct seismic properties, which complicates the modeling of seismic wave propagation. We started by analyzing surface wave group velocities throughout the region and developed a preliminary model for each of the major geological provinces. We found variations of crustal thickness ranging from 45 km under the Atlas and Betic mountains and 37 km under the Saharan shield, to 20 km for the oceanic crust of the western Mediterranean Sea, which is consistent with earlier works. Throughout most of the region, the upper mantle velocities are low which is typical for tectonically active regions. The most complex areas in terms of wave propagation are the Betic Cordillera in southern Spain and its north African counterparts, the Rif and Tell Atlas mountains, as well as the Alboran Sea, between Spain and Morocco. The complexity of the wave propagation in these regions is probably due to the sharp velocity contrasts between the oceanic and continental regions as well as the the existence of deep sedimentary basins that have a very strong influence on the surface wave dispersion. We used this preliminary regionalized velocity model to correct the surface wave source spectra for propagation effects which we then inverted for source mechanism. We found that this method, which is in use in many parts of the world, works very well, provided that data from several stations are available. In order to study the events in the region using very few broadband stations or even a single station

  10. Broadband dispersion-compensating fiber for high-bit-rate transmission network use

    NASA Astrophysics Data System (ADS)

    Semenov, V. A.; Belov, A. V.; Dianov, E. M.; Abramov, A. A.; Bubnov, M. M.; Semjonov, S. L.; Shchebunjaev, A. G.; Khopin, V. F.; Guryanov, A. N.; Vechkanov, N. N.

    1995-08-01

    The optimum refractive-index profile and drawing temperature were investigated so as to maximize the figure of merit for multicladding broadband dispersion-compensating fibers. Based on the results of the investigation, the authors have fabricated a highly bend-resistant fiber with a 92.6-ps/(nm dB) figure of merit using the modified chemical-vapor deposition method for dispersion compensation in the 1.5-1.6- mu m wavelength region. The manufactured dispersion compensator does not suffer bend loss at 1.55 mu m for curvatures of radia of 6.3 and 3.3 cm, and it has a 1.1-dB/km bend loss at a curvature of radius of 1.6 cm. Codoping the germanium silicate core with fluorine diminishes the optical loss down to 0.70 dB/km at a 1.55- mu m wavelength.

  11. Mobile Network Data for Public Health: Opportunities and Challenges

    PubMed Central

    Oliver, Nuria; Matic, Aleksandar; Frias-Martinez, Enrique

    2015-01-01

    The ubiquity of mobile phones worldwide is generating an unprecedented amount of human behavioral data both at an individual and aggregated levels. The study of this data as a rich source of information about human behavior emerged almost a decade ago. Since then, it has grown into a fertile area of research named computational social sciences with a wide variety of applications in different fields such as social networks, urban and transport planning, economic development, emergency relief, and, recently, public health. In this paper, we briefly describe the state of the art on using mobile phone data for public health, and present the opportunities and challenges that this kind of data presents for public health. PMID:26301211

  12. Mobile Network Data for Public Health: Opportunities and Challenges.

    PubMed

    Oliver, Nuria; Matic, Aleksandar; Frias-Martinez, Enrique

    2015-01-01

    The ubiquity of mobile phones worldwide is generating an unprecedented amount of human behavioral data both at an individual and aggregated levels. The study of this data as a rich source of information about human behavior emerged almost a decade ago. Since then, it has grown into a fertile area of research named computational social sciences with a wide variety of applications in different fields such as social networks, urban and transport planning, economic development, emergency relief, and, recently, public health. In this paper, we briefly describe the state of the art on using mobile phone data for public health, and present the opportunities and challenges that this kind of data presents for public health.

  13. 76 FR 32901 - The Provision of Fixed and Mobile Broadband Access, Educational and Other Advanced Services in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-07

    ... subscriber station and base station with a typical cell radius of 3 to 10 kilometers. WiMAX can support fixed... satellite service (MSS) system with the downlink (satellite to mobile earth stations) in the 2483.5-2500 MHz... of 6 MHz or the actual emission bandwidth as defined in Sec. 27.53(m)(6). Mobile Satellite...

  14. Dynamic optical resource allocation for mobile core networks with software defined elastic optical networking.

    PubMed

    Zhao, Yongli; Chen, Zhendong; Zhang, Jie; Wang, Xinbo

    2016-07-25

    Driven by the forthcoming of 5G mobile communications, the all-IP architecture of mobile core networks, i.e. evolved packet core (EPC) proposed by 3GPP, has been greatly challenged by the users' demands for higher data rate and more reliable end-to-end connection, as well as operators' demands for low operational cost. These challenges can be potentially met by software defined optical networking (SDON), which enables dynamic resource allocation according to the users' requirement. In this article, a novel network architecture for mobile core network is proposed based on SDON. A software defined network (SDN) controller is designed to realize the coordinated control over different entities in EPC networks. We analyze the requirement of EPC-lightpath (EPCL) in data plane and propose an optical switch load balancing (OSLB) algorithm for resource allocation in optical layer. The procedure of establishment and adjustment of EPCLs is demonstrated on a SDON-based EPC testbed with extended OpenFlow protocol. We also evaluate the OSLB algorithm through simulation in terms of bandwidth blocking ratio, traffic load distribution, and resource utilization ratio compared with link-based load balancing (LLB) and MinHops algorithms.

  15. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  16. 77 FR 60680 - Development of the Nationwide Interoperable Public Safety Broadband Network

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... nationwide wireless network called for under the Act, including ubiquitous coverage, reliable, redundant, and... particularly interested in receiving innovative ideas on how it can deploy a reliable, ubiquitous,...

  17. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    ERIC Educational Resources Information Center

    Briscoe, Patricia; Pollock, Katina; Campbell, Carol; Carr-Harris, Shasta

    2015-01-01

    The use of networks in public education is one of many knowledge mobilization (KMb) strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to mobilize knowledge through networks. The purpose of this paper is to explore how networks work. Data were collected from virtual discussions for an…

  18. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks

    PubMed Central

    Xu, Lingwei; Zhang, Hao; Gulliver, T. Aaron

    2016-01-01

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance. PMID:26907282

  19. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    accumulate between these entities.” Capra [34] proposes to use a human trust model based on human interactions in a trust model for fully distributed...network environments such as MANETs. Capra defines trust as the degree of a belief about the behavior of other entities (or agents). Li and Singhal [35...2004. [34] L. Capra , “Toward a Human Trust Model for Mobile Ad-hoc Net- works,” Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University

  20. Channel allocation and load balancing in totally mobile wireless networks

    NASA Astrophysics Data System (ADS)

    Cui, Wei; Bassiouni, Mostafa A.

    2000-07-01

    Previous studies on totally mobile wireless networks (TMWN) have been limited to non-hierarchical architectures. In this paper, we study a two-tier cellular architecture for TMWN. Under the constraints of equal power consumption, the two tier system achieves improvement over the one-tier system, especially at light and medium load levels. Performance tests have also shown that handoff prioritization can be achieved by restricting the use of the umbrella channels. Further improvement for the two-tier system was obtained by load balancing strategies with respect to the allocation of channels to the different cells.

  1. Low noise omnidirectional optical receiver for the mobile FSO networks

    NASA Astrophysics Data System (ADS)

    Witas, Karel; Hejduk, Stanislav; Vasinek, Vladimir; Vitasek, Jan; Latal, Jan

    2013-05-01

    A high sensitive optical receiver design for the mobile free space optical (FSO) networks is presented. There is an array of photo-detectors and preamplifiers working into same load. It is the second stage sum amplifier getting all signals together. This topology creates a parallel amplifier with an excellent signal to noise ratio (SNR). An automatic gain control (AGC) feature is included also. As a result, the effective noise suppression at the receiver side increases optical signal coverage even with the transmitter power being constant. The design has been verified on the model car which was able to respond beyond the line of sight (LOS).

  2. Exploring mobile health in a private online social network.

    PubMed

    Memon, Qurban A; Mustafa, Asma Fayes

    2015-01-01

    Health information is very vulnerable. Certain individuals or corporate organisations will continue to steal it similar to bank account data once data is on wireless channels. Once health information is part of a social network, corresponding privacy issues also surface. Insufficiently trained employees at hospitals that pay less attention to creating a privacy-aware culture will suffer loss when mobile devices containing health information are lost, stolen or sniffed. In this work, a social network system is explored as a m-health system from a privacy perspective. A model is developed within a framework of data-driven privacy and implemented on Android operating system. In order to check feasibility of the proposed model, a prototype application is developed on Facebook for different services, including: i) sharing user location; ii) showing nearby friends; iii) calculating and sharing distance moved, and calories burned; iv) calculating, tracking and sharing user heart rate; etc.

  3. 47 CFR 90.18 - Public Safety 700 MHz Nationwide Broadband Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... MHz Public/Private Partnership with the licensee of the adjacent Upper 700 MHz D Block license... specific provisions relating to the 700 MHz Public/Private Partnership are set forth in subpart AA of this... SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.18 Public...

  4. 47 CFR 90.18 - Public Safety 700 MHz Nationwide Broadband Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MHz Public/Private Partnership with the licensee of the adjacent Upper 700 MHz D Block license... specific provisions relating to the 700 MHz Public/Private Partnership are set forth in subpart AA of this... SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.18 Public...

  5. Space Mobile Network: A Near Earth Communications and Navigation Architecture

    NASA Technical Reports Server (NTRS)

    Israel, David J.; Heckler, Gregory W.; Menrad, Robert J.

    2016-01-01

    This paper shares key findings of NASA's Earth Regime Network Evolution Study (ERNESt) team resulting from its 18-month effort to define a wholly new architecture-level paradigm for the exploitation of space by civil space and commercial sector organizations. Since the launch of Sputnik in October 1957 spaceflight missions have remained highly scripted activities from launch through disposal. The utilization of computer technology has enabled dramatic increases in mission complexity; but, the underlying premise that the diverse actions necessary to meet mission goals requires minute-by-minute scripting, defined weeks in advance of execution, for the life of the mission has remained. This archetype was appropriate for a "new frontier" but now risks overtly constraining the potential market-based opportunities for the innovation considered necessary to efficiently address the complexities associated with meeting communications and navigation requirements projected to be characteristics of the next era of space exploration: a growing number of missions in simultaneous execution, increased variance of mission types and growth in location/orbital regime diversity. The resulting ERNESt architectural cornerstone - the Space Mobile Network (SMN) - was envisioned as critical to creating an environment essential to meeting these future challenges in political, programmatic, technological and budgetary terms. The SMN incorporates technologies such as: Disruption Tolerant Networking (DTN) and optical communications, as well as new operations concepts such as User Initiated Services (UIS) to provide user services analogous to today's terrestrial mobile network user. Results developed in collaboration with NASA's Space Communications and Navigation (SCaN) Division and field centers are reported on. Findings have been validated via briefings to external focus groups and initial ground-based demonstrations. The SMN opens new niches for exploitation by the marketplace of mission

  6. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    DTIC Science & Technology

    2015-03-01

    IN MOBILE AD HOC NETWORKS UTILIZING REACTIVE PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate...EFFECTS OF DATA REPLICATION ON DATA EXFILTRATION IN MOBILE AD HOC NETWORKS UTILIZING REACTIVE PROTOCOLS THESIS Corey T. Willinger, Captain, USAF AFIT...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENG-MS-15-M-035 EFFECTS OF DATA REPLICATION ON DATA EXFILTRATION IN MOBILE AD HOC NETWORKS

  7. Evaluation of QoS supported in Network Mobility NEMO environments

    NASA Astrophysics Data System (ADS)

    Hussien, L. F.; Abdalla, A. H.; Habaebi, M. H.; Khalifa, O. O.; Hassan, W. H.

    2013-12-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN).

  8. The Networked Naturalist - Mobile devices for Citizen Science

    NASA Astrophysics Data System (ADS)

    Estrin, D.; Graham, E. A.

    2010-12-01

    Citizen science projects engage individual volunteers or groups to observe, measure, and contribute data to scientific studies. CENS is developing mobile phone and web-based tools for formal and informal observation of ecosystems. We are collaborating with national environmental education campaigns, such as Project BudBurst, and with the National Park Service to increase participation in citizen scientist campaigns and to support park service personnel in day to day data gathering. The overarching goals of the Networked Naturalist set of projects are to enhance participatory learning experiences through citizen science campaigns and to facilitate scientific and environmental data collection. Our experience with volunteers at UCLA and at the National Park Service has demonstrated that mobile phones are an efficient, effective and engaging method for collecting environmental and location data and hold great potential for both raising public awareness of environmental issues and collecting data that is valuable for both ecosystem management and research. CENS is an NSF-funded Science and Technology Center and this project represents collaboration among ecologists, computer scientist, and statisticians. Our mobile applications are free for download on Android and iPhone App stores and the source code is made available through open source licenses.

  9. 76 FR 51271 - Implementing a Nationwide, Broadband, Interoperable Public Safety Network in the 700 MHz Band

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ... deployment and evolution of the nationwide network. DATES: Effective: August 18, 2011, except Sec. 90.1407(f.... The Commission designated Long Term Evolution (LTE), in particular at least 3GPP Standard,...

  10. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    ERIC Educational Resources Information Center

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  11. Mic Flocks in the Cloud: Harnessing Mobile Ubiquitous Sensor Networks

    NASA Astrophysics Data System (ADS)

    Garces, M. A.; Christe, A.

    2015-12-01

    Smartphones provide a commercial, off-the-shelf solution to capture, store, analyze, and distribute infrasound using on-board or external microphones (mics) as well as on-board barometers. Free iOS infrasound apps can be readily downloaded from the Apple App Store, and Android versions are in progress. Infrasound propagates for great distances, has low sample rates, and provides a tractable pilot study scenario for open distributed sensor networks at regional and global scales using one of the most ubiquitous sensors on Earth - microphones. Data collection is no longer limited to selected vendors at exclusive prices: anybody on Earth can record and stream infrasound, and the diversity of recording systems and environments is rapidly expanding. Global deployment may be fast and easy (www.redvox.io), but comes with the cost of increasing data volume, velocity, variety, and complexity. Flocking - the collective motion of mobile agents - is a natural human response to threats or events of interest. Anticipating, modeling and harnessing flocking sensor topologies will be necessary for adaptive array and network processing. The increasing data quantity and complexity will exceed the processing capacity of human analysts and most research servers. We anticipate practical real-time applications will require the on-demand adaptive scalability and resources of the Cloud. Cloud architectures for such heterogeneous sensor networks will consider eventual integration into the Global Earth Observation System of Systems (GEOSS).

  12. Directedness of information flow in mobile phone communication networks.

    PubMed

    Peruani, Fernando; Tabourier, Lionel

    2011-01-01

    Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social) network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional) information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  13. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    NASA Astrophysics Data System (ADS)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  14. 76 FR 10295 - Implementing a Nationwide, Broadband, Interoperable Public Safety Network in the 700 MHz Band

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ..., namely (1) Internet access; (2) Virtual Private Network (VPN) access to any authorized site and to home... additional requirements to further promote and enable nationwide interoperability among public safety... the instructions for submitting comments. Agency Web Site: http://www.fcc.gov . Follow...

  15. Broadband network on-line data acquisition system with web based interface for control and basic analysis

    NASA Astrophysics Data System (ADS)

    Polkowski, Marcin; Grad, Marek

    2016-04-01

    Passive seismic experiment "13BB Star" is operated since mid 2013 in northern Poland and consists of 13 broadband seismic stations. One of the elements of this experiment is dedicated on-line data acquisition system comprised of both client (station) side and server side modules with web based interface that allows monitoring of network status and provides tools for preliminary data analysis. Station side is controlled by ARM Linux board that is programmed to maintain 3G/EDGE internet connection, receive data from digitizer, send data do central server among with additional auxiliary parameters like temperatures, voltages and electric current measurements. Station side is controlled by set of easy to install PHP scripts. Data is transmitted securely over SSH protocol to central server. Central server is a dedicated Linux based machine. Its duty is receiving and processing all data from all stations including auxiliary parameters. Server side software is written in PHP and Python. Additionally, it allows remote station configuration and provides web based interface for user friendly interaction. All collected data can be displayed for each day and station. It also allows manual creation of event oriented plots with different filtering abilities and provides numerous status and statistic information. Our solution is very flexible and easy to modify. In this presentation we would like to share our solution and experience. National Science Centre Poland provided financial support for this work via NCN grant DEC-2011/02/A/ST10/00284.

  16. Modeling of Channel Allocation in Broadband Powerline Communications Access Networks as a Multi-Criteria Optimization Problem

    NASA Astrophysics Data System (ADS)

    Haidine, Abdelfatteh; Lehnert, Ralf

    The planning process of the Broadband Powerline communications access networks contains two main problem parts: theGeneralized Base Station Placement (GBSP) problem and the PLC Channel Allocation Problem (P-CAP). The GBSP is investigated/solved in our previous works. In this paper, we focus on the P-CAP. The task of the P-CAP consists in allocating a sub-set of channels from an available set of PLC channels to each base station in the B-PLC site. Two optimization objectives are considered for the solution of this problem; namely the maximization of the resource reuse and the minimization of the generated interferences in the site. These objectives are conflicting, since the optimization of one of them results in the deterioration of the other. Therefore, this problem is modeled as a Multi-objective (or multi-criteria) Optimization Problem (MOP). Three variants of Pareto-based multi-objective algorithms, using evolutionary search, are used to solve it. Their performances are evaluated on four problem instances.

  17. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    PubMed Central

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-01-01

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409

  18. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    PubMed

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  19. Progress Toward Standards for the Seamless Interoperability of Broadband Satellite Communication Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Glover, Daniel R.; vonDeak, Thomas C.; Bhasin, Kul B.

    1998-01-01

    The realization of the full potential of the National Information Infrastructure (NH) and Global Information Infrastructure (GII) requires seamless interoperability of emerging satellite networks with terrestrial networks. This requires a cooperative effort between industry, academia and government agencies to develop and advocate new, satellite-friendly communication protocols and modifications to existing communication protocol standards. These groups have recently come together to actively participating in a number of standards making bodies including: the Internet Engineering Task Force (IETF), the Asynchronous Transfer Mode (ATM) Forum, the International Telecommunication Union (ITU) and the Telecommunication Industry Association MA) to ensure that issues regarding efficient use of these protocols over satellite links are not overlooked. This paper will summarize the progress made toward standards development to achieve seamless integration and accelerate the deployment of multimedia applications.

  20. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  1. Remote Upload of Evidence over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Ray, Indrajit

    In this work, we report on one aspect of an autonomous robot-based digital evidence acquisition system that we are developing. When forensic investigators operate within a hostile environment they may use remotely operated unmanned devices to gather digital evidence. These systems periodically upload the evidence to a remote central server using a mobile ad hoc network. In such cases, large pieces of information need to be fragmented and transmitted in an appropriate manner. To support proper forensic analysis, certain properties must ensured for each fragment of evidence — confidentiality during communication, authenticity and integrity of the data, and, most importantly, strong evidence of membership for fragments. This paper describes a framework to provide these properties for the robot-based evidence acquisition system under development.

  2. Analysis of the communities of an urban mobile phone network

    PubMed Central

    Botta, Federico; del Genio, Charo I.

    2017-01-01

    Being able to characterise the patterns of communications between individuals across different time scales is of great importance in understanding people’s social interactions. Here, we present a detailed analysis of the community structure of the network of mobile phone calls in the metropolitan area of Milan revealing temporal patterns of communications between people. We show that circadian and weekly patterns can be found in the evolution of communities, presenting evidence that these cycles arise not only at the individual level but also at that of social groups. Our findings suggest that these trends are present across a range of time scales, from hours to days and weeks, and can be used to detect socially relevant events. PMID:28334003

  3. Characterizing Mobility and Contact Networks in Virtual Worlds

    NASA Astrophysics Data System (ADS)

    Machado, Felipe; Santos, Matheus; Almeida, Virgílio; Guedes, Dorgival

    Virtual worlds have recently gained wide recognition as an important field of study in Computer Science. In this work we present an analysis of the mobility and interactions among characters in World of Warcraft (WoW) and Second Life based on the contact opportunities extracted from actual user data in each of those domains. We analyze character contacts in terms of their spatial and temporal characteristics, as well as the social network derived from such contacts. Our results show that the contacts observed may be more influenced by the nature of the interactions and goals of the users in each situation than by the intrinsic structure of such worlds. In particular, observations from a city in WoW are closer to those of Second Life than to other areas in WoW itself.

  4. Transfer Error and Correction Approach in Mobile Network

    NASA Astrophysics Data System (ADS)

    Xiao-kai, Wu; Yong-jin, Shi; Da-jin, Chen; Bing-he, Ma; Qi-li, Zhou

    With the development of information technology and social progress, human demand for information has become increasingly diverse, wherever and whenever people want to be able to easily, quickly and flexibly via voice, data, images and video and other means to communicate. Visual information to the people direct and vivid image, image / video transmission also been widespread attention. Although the third generation mobile communication systems and the emergence and rapid development of IP networks, making video communications is becoming the main business of the wireless communications, however, the actual wireless and IP channel will lead to error generation, such as: wireless channel multi- fading channels generated error and blocking IP packet loss and so on. Due to channel bandwidth limitations, the video communication compression coding of data is often beyond the data, and compress data after the error is very sensitive to error conditions caused a serious decline in image quality.

  5. Control of a nonholonomic mobile robot using neural networks.

    PubMed

    Fierro, R; Lewis, F L

    1998-01-01

    A control structure that makes possible the integration of a kinematic controller and a neural network (NN) computed-torque controller for nonholonomic mobile robots is presented. A combined kinematic/torque control law is developed using backstepping and stability is guaranteed by Lyapunov theory. This control algorithm can be applied to the three basic nonholonomic navigation problems: tracking a reference trajectory, path following, and stabilization about a desired posture. Moreover, the NN controller proposed in this work can deal with unmodeled bounded disturbances and/or unstructured unmodeled dynamics in the vehicle. On-line NN weight tuning algorithms do no require off-line learning yet guarantee small tracking errors and bounded control signals are utilized.

  6. A proposed architecture for a satellite-based mobile communications network - The lowest three layers

    NASA Technical Reports Server (NTRS)

    Yan, T. Y.; Naderi, F. M.

    1986-01-01

    Architecture for a commercial mobile satellite network is proposed. The mobile satellite system (MSS) is composed of a network management center, mobile terminals, base stations, and gateways; the functions of each component are described. The satellite is a 'bent pipe' that performs frequency translations, and it has multiple UHF beams. The development of the MSS design based on the seven-layer open system interconnection model is examined. Consideration is given to the functions of the physical, data link, and network layers and the integrated adaptive mobile access protocol.

  7. 78 FR 69018 - Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ...In this document, the Federal Communications Commission seeks comment on measures to promote the resiliency and transparency of mobile wireless networks. This document considers and seeks comment on, among other measures, a requirement that mobile wireless network providers report for public disclosure on a daily basis during major disasters the percentages of their cell sites that are......

  8. MSAT: A booster for land based mobile radiocommunication networks?

    NASA Technical Reports Server (NTRS)

    Boulay, Guy

    1990-01-01

    It is demonstrated that the foreseen phenomenal growth of mobilesat services will impact positively existing terrestrial mobile radio services. Mobilesat systems will not displace the existing terrestrial market in the near future, partly due to the high cost of their terminal units and associated airtime, but also due to some technical limitations, such as lack of spectrum efficiency and high susceptibility to shadowing. However, the ubiquity of mobilesat services will open new market to terrestrial radio technologies. The latter is expected to be the most economical way of extending locally mobilesat services to many users. Conversely, mobilesat systems will be used to extend the capabilities of terrestrial radio systems in areas where the former cannot be implemented cost effectively. It is believed that terrestrial mobile network operators using these service extension capabilities will have a competitive advantage over those who do not. Overall, it is expected that emerging mobilesat services, far from being a threat to terrestrial radio systems, will rather provide these with numerous opportunities of incrementing their base market.

  9. Adaptation of mobile ad-hoc network protocols for sensor networks to vehicle control applications

    NASA Astrophysics Data System (ADS)

    Sato, Kenya; Matsui, Yosuke; Koita, Takahiro

    2005-12-01

    As sensor network applications to monitor and control the physical environment from remote locations, a mobile ad-hoc network (MANET) has been the focus of many recent research and development efforts. A MANET, autonomous system of mobile hosts, is characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Many kinds of routing protocols for ad-hoc network have been proposed and still actively updated, because each application has different characteristics and requirements. Since the current studies show it is almost impossible to design an efficient routing protocol to be adapted for all kinds of applications. We, therefore, have focused a certain application, inter-vehicle communication for ITS (Intelligent Transport Systems), to evaluate the routing protocols. In our experiment, we defined several traffic flow models for inter-vehicle communication applications. By using simulation, we evaluated end-to-end delay and throughput performance of data transmission for inter-vehicle communications with the existing routing protocols. The result confirms the feasibility of using some routing protocols for inter-vehicle communication services.

  10. Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network

    PubMed Central

    Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost. PMID:24311982

  11. Design and analysis of a dynamic mobility management scheme for wireless mesh network.

    PubMed

    Majumder, Abhishek; Roy, Sudipta

    2013-01-01

    Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M(3)), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M(3), and WMM with respect to total cost.

  12. 75 FR 3791 - Broadband Technology Opportunities Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-22

    ... that provide high-speed Middle Mile networks to connect community anchor institutions, including... operating broadband networks or public computer centers; (iii) broadband-related outreach, training, or... centers for people with disabilities, community health centers, and Neighborhood Network Centers in...

  13. Functional recognition imaging using artificial neural networks: applications to rapid cellular identification via broadband electromechanical response

    NASA Astrophysics Data System (ADS)

    Nikiforov, M. P.; Reukov, V. V.; Thompson, G. L.; Vertegel, A. A.; Guo, S.; Kalinin, S. V.; Jesse, S.

    2009-10-01

    Functional recognition imaging in scanning probe microscopy (SPM) using artificial neural network identification is demonstrated. This approach utilizes statistical analysis of complex SPM responses at a single spatial location to identify the target behavior, which is reminiscent of associative thinking in the human brain, obviating the need for analytical models. We demonstrate, as an example of recognition imaging, rapid identification of cellular organisms using the difference in electromechanical activity over a broad frequency range. Single-pixel identification of model Micrococcus lysodeikticus and Pseudomonas fluorescens bacteria is achieved, demonstrating the viability of the method.

  14. Epidemic spreading on dual-structure networks with mobile agents

    NASA Astrophysics Data System (ADS)

    Yao, Yiyang; Zhou, Yinzuo

    2017-02-01

    The rapid development of modern society continually transforms the social structure which leads to an increasingly distinct dual structure of higher population density in urban areas and lower density in rural areas. Such structure may induce distinctive spreading behavior of epidemics which does not happen in a single type structure. In this paper, we study the epidemic spreading of mobile agents on dual structure networks based on SIRS model. First, beyond the well known epidemic threshold for generic epidemic model that when the infection rate is below the threshold a pertinent infectious disease will die out, we find the other epidemic threshold which appears when the infection rate of a disease is relatively high. This feature of two thresholds for the SIRS model may lead to the elimination of infectious disease when social network has either high population density or low population density. Interestingly, however, we find that when a high density area is connected to a low density may cause persistent spreading of the infectious disease, even though the same disease will die out when it spreads in each single area. This phenomenon indicates the critical role of the connection between the two areas which could radically change the behavior of spreading dynamics. Our findings, therefore, provide new understanding of epidemiology pertinent to the characteristic modern social structure and have potential to develop controlling strategies accordingly.

  15. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers.

    PubMed

    Comulada, W Scott

    2014-12-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and intervention delivery, e.g. mobile users can video chat with counselors. This is due in part to privacy issues and other barriers that are more difficult to address outside of academic settings where most mobile research to date has taken place. In this article, we aim to inform a broader discussion on mobile research. In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total participants). HIV-transmission and general health behaviors were reported through a mobile phone-based daily assessment that was administered through study participants' own mobile phones. Phone log information was collected from gay men with Android phones. Benefits and challenges to mobile implementation are discussed, along with the application of multi-level models to the type of longitudinal egocentric data that we collected.

  16. Application of Mobile-ip to Space and Aeronautical Networks

    NASA Technical Reports Server (NTRS)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  17. Teledesic Global Wireless Broadband Network: Space Infrastructure Architecture, Design Features and Technologies

    NASA Technical Reports Server (NTRS)

    Stuart, James R.

    1995-01-01

    The Teledesic satellites are a new class of small satellites which demonstrate the important commercial benefits of using technologies developed for other purposes by U.S. National Laboratories. The Teledesic satellite architecture, subsystem design features, and new technologies are described. The new Teledesic satellite manufacturing, integration, and test approaches which use modern high volume production techniques and result in surprisingly low space segment costs are discussed. The constellation control and management features and attendant software architecture features are addressed. After briefly discussing the economic and technological impact on the USA commercial space industries of the space communications revolution and such large constellation projects, the paper concludes with observations on the trend toward future system architectures using networked groups of much smaller satellites.

  18. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    NASA Astrophysics Data System (ADS)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  19. Application of Fiber-Optical Techniques in the Access Transmission and Backbone Transport of Mobile Networks

    NASA Astrophysics Data System (ADS)

    Hilt, Attila; Pozsonyi, László

    2012-09-01

    Fixed access networks widely employ fiber-optical techniques due to the extremely wide bandwidth offered to subscribers. In the last decade, there has also been an enormous increase of user data visible in mobile systems. The importance of fiber-optical techniques within the fixed transmission/transport networks of mobile systems is therefore inevitably increasing. This article summarizes a few reasons and gives examples why and how fiber-optic techniques are employed efficiently in second-generation networks.

  20. Mobile sensor network noise reduction and recalibration using a Bayesian network

    NASA Astrophysics Data System (ADS)

    Xiang, Y.; Tang, Y.; Zhu, W.

    2016-02-01

    People are becoming increasingly interested in mobile air quality sensor network applications. By eliminating the inaccuracies caused by spatial and temporal heterogeneity of pollutant distributions, this method shows great potential for atmospheric research. However, systems based on low-cost air quality sensors often suffer from sensor noise and drift. For the sensing systems to operate stably and reliably in real-world applications, those problems must be addressed. In this work, we exploit the correlation of different types of sensors caused by cross sensitivity to help identify and correct the outlier readings. By employing a Bayesian network based system, we are able to recover the erroneous readings and recalibrate the drifted sensors simultaneously. Our method improves upon the state-of-art Bayesian belief network techniques by incorporating the virtual evidence and adjusting the sensor calibration functions recursively.Specifically, we have (1) designed a system based on the Bayesian belief network to detect and recover the abnormal readings, (2) developed methods to update the sensor calibration functions infield without requirement of ground truth, and (3) extended the Bayesian network with virtual evidence for infield sensor recalibration. To validate our technique, we have tested our technique with metal oxide sensors measuring NO2, CO, and O3 in a real-world deployment. Compared with the existing Bayesian belief network techniques, results based on our experiment setup demonstrate that our system can reduce error by 34.1 % and recover 4 times more data on average.

  1. A sub-terahertz broadband detector based on a GaN high-electron-mobility transistor with nanoantennas

    NASA Astrophysics Data System (ADS)

    Hou, Haowen; Liu, Zhihong; Teng, Jinghua; Palacios, Tomás; Chua, Soo-Jin

    2017-01-01

    We report a sub-terahertz (THz) detector based on a 0.25-µm-gate-length AlGaN/GaN high-electron-mobility transistor (HEMT) on a Si substrate with nanoantennas. The fabricated device shows excellent performance with a maximum responsivity (R v) of 15 kV/W and a minimal noise equivalent power (NEP) of 0.58 pW/Hz0.5 for 0.14 THz radiation at room temperature. We consider these excellent results as due to the design of asymmetric nanoantennas. From simulation, we show that indeed such nanoantennas can effectively enhance the local electric field induced by sub-THz radiation and thereby improve the detection response. The excellent results indicate that GaN HEMTs with nanoantennas are future competitive detectors for sub-THz and THz imaging applications.

  2. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  3. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    SciTech Connect

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  4. High Efficiency Automatic-Power-Controlled and Gain-Clamped EDFA for Broadband Passive Optical Networking Systems

    NASA Astrophysics Data System (ADS)

    Shen, Jyi-Lai; Wei, Shui-Ken; Lin, Chin-Yuan; Iong Li, Ssu; Huang, Chih-Chuan

    2010-04-01

    The configuration of a simple improved high efficiency automatic-power-controlled and gain-clamped EDFA (APC-GC-EDFA) for broadband passive optical networking systems (BPON) is presented here. In order to compensate the phase and amplitude variation due to the different distance between the optical line terminal (OLT) and optical network units (ONU), the APC-GC-EDFA need to be employed. A single 980 nm laser module is employed as the primary pump. To extend the bandwidth, all C-band ASE is recycled as the secondary pump to enhance the gain efficiency. An electrical feedback circuit is used as a multi-wavelength channel transmitter monitor for the automatic power control to improve the gain-flattened flatness for stable amplification. The experimental results prove that the EDFA system can provide flatter clamped gain in both C-band and L-band configurations. The gain flatness wavelength ranging from 1530 to 1610 nm is within 32.83 ± 0.64 dB, i.e. below 1.95 %. The gains are clamped at 33.85 ± 0.65 dB for the input signal power of -40 dBm to -10 dBm. The range of noise figure is between 6.37 and 6.56, which is slightly lower compared to that of unclamped amplifiers. This will be very useful for measuring the gain flatness of APC-GC-EDFA. Finally, we have also demonstrated the records of the overall simultaneous dynamics measurements for the new system stabilization. The carrier to noise ratio (CNR) is 49.5 to 50.8 dBc which is above the National Television System Committee (NTSC) standard of 43 dBc, and both composite second order (CSO) 69.2 to 71.5 dBc and composite triple beat (CTB) of 69.8 to 72.2 dBc are above 53 dBc. The recorded corresponding rise-time of 1.087 ms indicates that the system does not exhibit any overshoot of gain or ASE variation due to the signal at the beginning of the pulse.

  5. Broadband radiometer

    DOEpatents

    Cannon, T.W.

    1994-07-26

    A broadband radiometer is disclosed including (a) an optical integrating sphere having generally spherical integrating chamber and an entry port for receiving light (e.g., having visible and ultraviolet fractions), (b) a first optical radiation detector for receiving light from the sphere and producing an electrical output signal corresponding to broadband radiation, (c) a second optical radiation detector for receiving light from the sphere and producing an electrical output signal corresponding to a predetermined wavelength fraction of the broadband radiation, and (d) an output for producing an electrical signal which is proportional to the difference between the two electrical output signals. The radiometer is very useful, for example, in measuring the absolute amount of ultraviolet light present in a given light sample. 8 figs.

  6. Broadband radiometer

    DOEpatents

    Cannon, Theodore W.

    1994-01-01

    A broadband radiometer including (a) an optical integrating sphere having a enerally spherical integrating chamber and an entry port for receiving light (e.g., having visible and ultraviolet fractions), (b) a first optical radiation detector for receiving light from the sphere and producing an electrical output signal corresponding to broadband radiation, (c) a second optical radiation detector for receiving light from the sphere and producing an electrical output signal corresponding to a predetermined wavelength fraction of the broadband radiation, and (d) an output for producing an electrical signal which is proportional to the difference between the two electrical output signals. The radiometer is very useful, for example, in measuring the absolute amount of ultraviolet light present in a given light sample.

  7. Addressing cancer disparities via community network mobilization and intersectoral partnerships: a social network analysis.

    PubMed

    Ramanadhan, Shoba; Salhi, Carmel; Achille, Erline; Baril, Nashira; D'Entremont, Kerrie; Grullon, Milagro; Judge, Christine; Oppenheimer, Sarah; Reeves, Chrasandra; Savage, Clara; Viswanath, Kasisomayajula

    2012-01-01

    Community mobilization and collaboration among diverse partners are vital components of the effort to reduce and eliminate cancer disparities in the United States. We studied the development and impact of intersectoral connections among the members of the Massachusetts Community Network for Cancer Education, Research, and Training (MassCONECT). As one of the Community Network Program sites funded by the National Cancer Institute, this infrastructure-building initiative utilized principles of Community-based Participatory Research (CBPR) to unite community coalitions, researchers, policymakers, and other important stakeholders to address cancer disparities in three Massachusetts communities: Boston, Lawrence, and Worcester. We conducted a cross-sectional, sociometric network analysis four years after the network was formed. A total of 38 of 55 members participated in the study (69% response rate). Over four years of collaboration, the number of intersectoral connections reported by members (intersectoral out-degree) increased, as did the extent to which such connections were reported reciprocally (intersectoral reciprocity). We assessed relationships between these markers of intersectoral collaboration and three intermediate outcomes in the effort to reduce and eliminate cancer disparities: delivery of community activities, policy engagement, and grants/publications. We found a positive and statistically significant relationship between intersectoral out-degree and community activities and policy engagement (the relationship was borderline significant for grants/publications). We found a positive and statistically significant relationship between intersectoral reciprocity and community activities and grants/publications (the relationship was borderline significant for policy engagement). The study suggests that intersectoral connections may be important drivers of diverse intermediate outcomes in the effort to reduce and eliminate cancer disparities. The findings

  8. Research of Network Security Situational Assessment Quantization Based on Mobile Agent

    NASA Astrophysics Data System (ADS)

    Xiaorong, Cheng; Su, Lang; Mingxuan, Li

    As the security situational assessment widely applying to the computer network field, scholars have designed and implemented a large number of network security situational assessment methods. However, most works are based on local area network and single host, which is hardly to meet the demand of large-scale network security assessment. In this paper, we based on quantitative hierarchical network security situational assessment model, introduced the mobile agent technology, designed the distributed computing for large-scale network and evaluated the whole network security situation for future prediction.

  9. LPTA: Location Predictive and Time Adaptive Data Gathering Scheme with Mobile Sink for Wireless Sensor Networks

    PubMed Central

    Rodrigues, Joel J. P. C.

    2014-01-01

    This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes. PMID:25302327

  10. A double herd krill based algorithm for location area optimization in mobile wireless cellular network.

    PubMed

    Vincylloyd, F; Anand, B

    2015-01-01

    In wireless communication systems, mobility tracking deals with determining a mobile subscriber (MS) covering the area serviced by the wireless network. Tracking a mobile subscriber is governed by the two fundamental components called location updating (LU) and paging. This paper presents a novel hybrid method using a krill herd algorithm designed to optimize the location area (LA) within available spectrum such that total network cost, comprising location update (LU) cost and cost for paging, is minimized without compromise. Based on various mobility patterns of users and network architecture, the design of the LR area is formulated as a combinatorial optimization problem. Numerical results indicate that the proposed model provides a more accurate update boundary in real environment than that derived from a hexagonal cell configuration with a random walk movement pattern. The proposed model allows the network to maintain a better balance between the processing incurred due to location update and the radio bandwidth utilized for paging between call arrivals.

  11. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2014-12-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol.

  12. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    SciTech Connect

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  13. Design mobile satellite system architecture as an integral part of the cellular access digital network

    NASA Technical Reports Server (NTRS)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  14. Space-Time Processing for Tactical Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-08-01

    electrical engineering of antenna array design and electronics; computer science of networking; and the mathematics of information and control theory...MIMO networks at this time. The COST 259 model does provide improvements over the GSM model since it adds direction of arrival statistics to the...an open research issue especially because the channel statistics are not yet known for mobile MIMO networks. Physical and network diversity could be

  15. The Mobile Learning Network: Getting Serious about Games Technologies for Learning

    ERIC Educational Resources Information Center

    Petley, Rebecca; Parker, Guy; Attewell, Jill

    2011-01-01

    The Mobile Learning Network currently in its third year, is a unique collaborative initiative encouraging and enabling the introduction of mobile learning in English post-14 education. The programme, funded jointly by the Learning and Skills Council and participating colleges and schools and supported by LSN has involved nearly 40,000 learners and…

  16. Inter-Domain Roaming Mechanism Transparent to Mobile Nodes among PMIPv6 Networks

    NASA Astrophysics Data System (ADS)

    Park, Soochang; Lee, Euisin; Jin, Min-Sook; Kim, Sang-Ha

    In Proxy Mobile IPv6 (PMIPv6), when a Mobile Node (MN) enters a PMIPv6 domain and attaches to an access link, the router on the access link detects attachment of the MN by the link-layer access. All elements of PMIPv6 including the router then provide network-based mobility management service for the MN. If the MN moves to another router in this PMIPv6 domain, the new router emulates attachment to the previous router by providing same network prefix to the MN. In other words, PMIPv6 provides rapid mobility management based on layer-2 attachment and transparent mobility support to the MN by emulating layer-3 attachment with respect to intra-domain roaming. However, when the MN moves to other PMIPv6 domains, although the domains also provide the network-based mobility management service, the MN should exploit the host-based mobility management protocol, i.e. Mobile IPv6 (MIPv6), for the inter-domain roaming. Hence, this letter proposes the rapid and transparent inter-domain roaming mechanism controlled by the networks adopting PMIPv6.

  17. Mobile Applications and 4G Wireless Networks: A Framework for Analysis

    ERIC Educational Resources Information Center

    Yang, Samuel C.

    2012-01-01

    Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…

  18. Control Based Mobile Ad Hoc Networking for Survivable, Dynamic, Mobile Special Operation Force Communications

    DTIC Science & Technology

    2009-09-01

    Edge Network Technologies ( SAPIENT ) ....................................................... 13 F. NETWORK LAYER...14]. 2. Situational Aware Protocols in Edge Network Technologies ( SAPIENT ) SAPIENT is another program running under DARPA to ease the bandwidth

  19. 47 CFR 90.1407 - Spectrum use in the network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Spectrum use in the network. 90.1407 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1407 Spectrum use in the network. (a) Spectrum use. The Shared Wireless Broadband Network will operate using spectrum...

  20. 47 CFR 90.1407 - Spectrum use in the network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Spectrum use in the network. 90.1407 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1407 Spectrum use in the network. (a) Spectrum use. The Shared Wireless Broadband Network will operate using spectrum...

  1. 47 CFR 90.1407 - Spectrum use in the network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Spectrum use in the network. 90.1407 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1407 Spectrum use in the network. (a) Spectrum use. The Shared Wireless Broadband Network will operate using spectrum...

  2. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... valuation methodology to determine the fair market value of the shared wireless broadband network assets. (j... 47 Telecommunication 5 2012-10-01 2012-10-01 false Network sharing agreement. 90.1410 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing...

  3. Advanced radio over fiber network technologies.

    PubMed

    Novak, Dalma; Waterhouse, Rod

    2013-09-23

    The evolution of wireless communication networks supporting emerging broadband services and applications offers new opportunities for realizing integrated optical and wireless network infrastructures. We report on some of our recent activities investigating advanced technologies for next generation converged optical wireless networks. Developments in Active Antenna Systems, mobile fronthaul architectures, and 60 GHz fiber distributed wireless networks are described. We also discuss the potential for analog radio over fiber distribution links as a viable solution for meeting the capacity requirements of new network architectures.

  4. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    PubMed

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  5. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  6. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    PubMed Central

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes. PMID:25379521

  7. Performance optimisation through EPT-WBC in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Agarwal, Ratish; Gupta, Roopam; Motwani, Mahesh

    2016-03-01

    Mobile ad hoc networks are self-organised, infrastructure-less networks in which each mobile host works as a router to provide connectivity within the network. Nodes out of reach to each other can communicate with the help of intermediate routers (nodes). Routing protocols are the rules which determine the way in which these routing activities are to be performed. In cluster-based architecture, some selected nodes (clusterheads) are identified to bear the extra burden of network activities like routing. Selection of clusterheads is a critical issue which significantly affects the performance of the network. This paper proposes an enhanced performance and trusted weight-based clustering approach in which a number of performance factors such as trust, load balancing, energy consumption, mobility and battery power are considered for the selection of clusterheads. Moreover, the performance of the proposed scheme is compared with other existing approaches to demonstrate the effectiveness of the work.

  8. PNNI routing support for ad hoc mobile networking: The multilevel case

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  9. A comparative analysis of the statistical properties of large mobile phone calling networks.

    PubMed

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  10. A comparative analysis of the statistical properties of large mobile phone calling networks

    PubMed Central

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N.

    2014-01-01

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks. PMID:24875444

  11. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    SciTech Connect

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  12. Proceedings of the Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications

    NASA Technical Reports Server (NTRS)

    Paul, Lori (Editor)

    1991-01-01

    The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.

  13. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    PubMed

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  14. SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  15. Sensor Sharing in Mobile Ad-Hoc Networks

    ERIC Educational Resources Information Center

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  16. 47 CFR 90.1403 - Public safety broadband license conditions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1403 Public safety broadband license conditions. (a) The Public Safety Broadband Licensee shall comply with all of... 47 Telecommunication 5 2011-10-01 2011-10-01 false Public safety broadband license conditions....

  17. 47 CFR 90.1403 - Public safety broadband license conditions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1403 Public safety broadband license conditions. (a) The Public Safety Broadband Licensee shall comply with all of... 47 Telecommunication 5 2010-10-01 2010-10-01 false Public safety broadband license conditions....

  18. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks

    PubMed Central

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-01

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator’s mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost. PMID:28098748

  19. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.

    PubMed

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-13

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

  20. Peer-to-peer model for the area coverage and cooperative control of mobile sensor networks

    NASA Astrophysics Data System (ADS)

    Tan, Jindong; Xi, Ning

    2004-09-01

    This paper presents a novel model and distributed algorithms for the cooperation and redeployment of mobile sensor networks. A mobile sensor network composes of a collection of wireless connected mobile robots equipped with a variety of sensors. In such a sensor network, each mobile node has sensing, computation, communication, and locomotion capabilities. The locomotion ability enhances the autonomous deployment of the system. The system can be rapidly deployed to hostile environment, inaccessible terrains or disaster relief operations. The mobile sensor network is essentially a cooperative multiple robot system. This paper first presents a peer-to-peer model to define the relationship between neighboring communicating robots. Delaunay Triangulation and Voronoi diagrams are used to define the geometrical relationship between sensor nodes. This distributed model allows formal analysis for the fusion of spatio-temporal sensory information of the network. Based on the distributed model, this paper discusses a fault tolerant algorithm for autonomous self-deployment of the mobile robots. The algorithm considers the environment constraints, the presence of obstacles and the nonholonomic constraints of the robots. The distributed algorithm enables the system to reconfigure itself such that the area covered by the system can be enlarged. Simulation results have shown the effectiveness of the distributed model and deployment algorithms.

  1. LingoBee and Social Media: Mobile Language Learners as Social Networkers

    ERIC Educational Resources Information Center

    Procter-Legg, Emma; Cacchione, Annamaria; Petersen, Sobah Abbas

    2012-01-01

    This paper presents language learners as social networkers and describes and discusses the types of users that can be identified by analysing the content created by them using a situated mobile language learning app, LingoBee, based on the idea of crowd sourcing. Borrowing ideas from other studies conducted on social network users, we can identify…

  2. Improving Success Ratio of Object Search in Highly-Dynamic Mobile P2P Networks

    NASA Astrophysics Data System (ADS)

    Takeshita, Kei; Sasabe, Masahiro; Nakano, Hirotaka

    Mobile Ad Hoc Networks (MANETs) are temporal and infrastructure-independent wireless networks that consist of mobile nodes. For instance, a MANET can be used as an emergent network for communication among people when a disaster occurred. Since there is no central server in the network, each node has to find out its desired information (objects) by itself. Constructing a mobile Peer-to-Peer (P2P) network over the MANET can support the object search. Some researchers proposed construction schemes of mobile P2P networks, such as Ekta and MADPastry. They integrated DHT-based application-layer routing and network-layer routing to increase search efficiency. Furthermore, MADPastry proposed a clustering method which groups the overlay nodes according to their physical distance. However, it has also been pointed out that the search efficiency deteriorates in highly dynamic environments where nodes quickly move around. In this paper, we focus on route disappearances in the network layer which cause the deterioration of search efficiency. We describe the detail of this problem and evaluate quantitatively it through simulation experiments. We extend MADPastry by introducing a method sharing objects among nodes in a cluster. Through simulation experiments, we show that the proposed method can achieve up to 2.5 times larger success rate of object search than MADPastry.

  3. Creating Entrepreneurial Networks: Academic Entrepreneurship, Mobility and Collaboration during PhD Education

    ERIC Educational Resources Information Center

    Bienkowska, Dzamila; Klofsten, Magnus

    2012-01-01

    Network-building activities of PhD students are an important area of study in furthering our understanding of academic entrepreneurship. This paper focuses on PhD students' participation in network-building activities defined as mobility and collaboration, as well as own interest in and perceived grade of support for commercialisation from various…

  4. Do Specific Types of Networking Predict Specific Mobility Outcomes? A Two-Year Prospective Study

    ERIC Educational Resources Information Center

    Wolff, Hans-Georg; Moser, Klaus

    2010-01-01

    Previous research has established a general relation between networking and career outcomes, as postulated by theories on protean careers and career self management. We suggest that specific facets of networking behavior differentially affect specific career mobility outcomes over time. In a 2-year prospective study, we examined the impact of six…

  5. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2008-08-01

    Maximization in Multi-User, MIMO Channels with Linear Processing...58 2.9 Using Feedback in Ad Hoc Networks....................................................................65 2.10 Feedback MIMO ...in MIMO Ad Hoc Interference Networks.......................................................................................................75 2.12

  6. On Mobility Management in Multi-Sink Sensor Networks for Geocasting of Queries

    PubMed Central

    Tüysüz Erman, Ayşegül; Dilo, Arta; van Hoesel, Lodewijk; Havinga, Paul

    2011-01-01

    In order to efficiently deal with location dependent messages in multi-sink wireless sensor networks (WSNs), it is key that the network informs sinks what geographical area is covered by which sink. The sinks are then able to efficiently route messages which are only valid in particular regions of the deployment. In our previous work (see the 5th and 6th cited documents), we proposed a combined coverage area reporting and geographical routing protocol for location dependent messages, for example, queries that are injected by sinks. In this paper, we study the case where we have static sinks and mobile sensor nodes in the network. To provide up-to-date coverage areas to sinks, we focus on handling node mobility in the network. We discuss what is a better method for updating the routing structure (i.e., routing trees and coverage areas) to handle mobility efficiently: periodic global updates initiated from sinks or local updates triggered by mobile sensors. Simulation results show that local updating perform very well in terms of query delivery ratio. Local updating has a better scalability to increasing network size. It is also more energy efficient than our previously proposed approach, where global updating in networks have medium mobility rate and speed. PMID:22247673

  7. The association between socioeconomic status and exposure to mobile telecommunication networks in children and adolescents.

    PubMed

    Thomas, Silke; Heinrich, Sabine; Kühnlein, Anja; Radon, Katja

    2010-01-01

    A potential association between socioeconomic status (SES) and self-reported use of mobile phones has been investigated in a few studies. If measured exposure to mobile phone networks differs by SES in children, it has not yet been studied. Interview data of 1,481 children and 1,505 adolescents on participants' mobile phone use, socio-demographic characteristics and potential confounders were taken from the German MobilEe-study. Sociodemographic data was used to stratify participants into three "status groups" (low, middle, high). Using a personal dosimeter, we obtained an exposure profile over 24 h for each of the participants. Exposure levels during waking hours were expressed as mean percentage of the reference level. Children with a low SES were more likely to own a mobile phone (OR 2.1; 95% CI: 1.1-3.9) and also reported to use their mobile phone longer per day (OR 2.4; 95% CI: 1.1-5.4) than children with a high SES. For adolescents, self-reported duration of mobile phone use per day was also higher with a low SES (OR: 3.4; 95% CI: 1.4-8.4) compared with a high SES. No association between SES and measured exposure to mobile telecommunication networks was seen for children or adolescents. Mobile phone use may differ between status groups with higher use among disadvantaged groups. However, this does not result in higher overall exposure to mobile telecommunication networks. Whether short duration of own mobile phone use or the small numbers of participants with a low SES are causal, have to be investigated in further studies.

  8. Path optimisation of a mobile robot using an artificial neural network controller

    NASA Astrophysics Data System (ADS)

    Singh, M. K.; Parhi, D. R.

    2011-01-01

    This article proposed a novel approach for design of an intelligent controller for an autonomous mobile robot using a multilayer feed forward neural network, which enables the robot to navigate in a real world dynamic environment. The inputs to the proposed neural controller consist of left, right and front obstacle distance with respect to its position and target angle. The output of the neural network is steering angle. A four layer neural network has been designed to solve the path and time optimisation problem of mobile robots, which deals with the cognitive tasks such as learning, adaptation, generalisation and optimisation. A back propagation algorithm is used to train the network. This article also analyses the kinematic design of mobile robots for dynamic movements. The simulation results are compared with experimental results, which are satisfactory and show very good agreement. The training of the neural nets and the control performance analysis has been done in a real experimental setup.

  9. Scalable Mobile Ad Hoc Network (MANET) to Enhance Situational Awareness in Distributed Small Unit Operations

    DTIC Science & Technology

    2015-06-01

    saying that he has called for “a network that would allow soldiers to tap their laptop or smart phone keyboards and obtain the information they need, as...AD HOC NETWORK (MANET) TO ENHANCE SITUATIONAL AWARENESS IN DISTRIBUTED SMALL UNIT OPERATIONS by Jonathan Clarke Driesslein June 2015...REPORT DATE June 2015 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE SCALABLE MOBILE AD HOC NETWORK (MANET) TO

  10. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    PubMed Central

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-01

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works. PMID:26840312

  11. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks.

    PubMed

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-29

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  12. Analysis of the Robustness Dynamics of Wireless Mobile Ad Hoc Networks via Time Varying Dual Basis Representation

    DTIC Science & Technology

    2015-01-08

    Analysis of the Robustness Dynamics of Wireless Mobile Ad Hoc Networks via Time Varying Dual Basis Representation Thomas Parker, Jamie Johnson...between nodes to analyze the robustness of a wireless mobile ad hoc network (MANET) with a time-varying wireless channel. This spectral analysis and...a single eigenvalue is evaluated. 1. Introduction Mobile ad hoc networks (MANETs) are complex systems that can be foreseen supporting

  13. Broadband ISDN architectures and technologies

    NASA Astrophysics Data System (ADS)

    Terry, Jack B.

    1993-02-01

    This paper brings together three concepts which together can be applied to tomorrow's broadband, mostly digital video, networks and services. These concepts are: high speed burst transmission of digital video from storage or service centers to local access or delivery networks, use of a ATM-threaded circuit switched paths for efficient transmission of blocks of digital video, and use of quadrature amplitude modulation methods to deliver digital video and data to the home, business or institution via fiber feeders and coaxial cable or twisted pair drops. Some business enabling factors and potential social implications of broadband services to the home are summarized.

  14. A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks

    PubMed Central

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-01-01

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107

  15. A comprehensive study of data collection schemes using mobile sinks in wireless sensor networks.

    PubMed

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-02-05

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink.

  16. Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    NASA Astrophysics Data System (ADS)

    Nakano, Tadashi; Okaie, Yutaka

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

  17. Inferring friendship network structure by using mobile phone data.

    PubMed

    Eagle, Nathan; Pentland, Alex Sandy; Lazer, David

    2009-09-08

    Data collected from mobile phones have the potential to provide insight into the relational dynamics of individuals. This paper compares observational data from mobile phones with standard self-report survey data. We find that the information from these two data sources is overlapping but distinct. For example, self-reports of physical proximity deviate from mobile phone records depending on the recency and salience of the interactions. We also demonstrate that it is possible to accurately infer 95% of friendships based on the observational data alone, where friend dyads demonstrate distinctive temporal and spatial patterns in their physical proximity and calling patterns. These behavioral patterns, in turn, allow the prediction of individual-level outcomes such as job satisfaction.

  18. Predictors of Mobile Phone and Social Networking Site Dependency in Adulthood.

    PubMed

    Burnell, Kaitlyn; Kuther, Tara L

    2016-10-01

    The present study explored social and psychological predictors of social networking site (SNS) and mobile phone dependency in a sample of emerging adults (ages 18-25, n = 159, M = 21.87, SD = 2.08) and young adults (ages 26-40, n = 97, M = 31.21, SD = 4.11). Path analysis revealed that SNS dependency mediated the relationship of social comparison, SNS support, and impulsivity on mobile phone dependency. Impulsivity also showed direct links to mobile phone dependency. The present findings suggest that individuals with a strong orientation toward social comparison, who perceive a strong sense of support through SNS networks, or who show difficulty with self-regulation may be at risk for SNS and mobile phone dependency.

  19. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  20. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  1. A mobile-agent based wireless sensing network for structural monitoring applications

    SciTech Connect

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2008-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field.

  2. TDMA-Based Dual-Mode Communication for Mobile Wireless Sensor Networks

    PubMed Central

    Mehta, Ankur; Kerkez, Branko; Glaser, Steven D.; Pister, Kristofer S. J.

    2012-01-01

    Small highly mobile robots, and in particular micro air vehicles (MAVs), are well suited to the task of exploring unknown indoor environments such as buildings and caves. Such a task imposes a number of requirements on the underlying communication infrastructure, with differing goals during various stages of the mission. This work addresses those requirements with a hybrid communications infrastructure consisting of a stationary mesh network along with the mobile nodes. The combined network operates in two independent modes, coupling a highly efficient, low duty cycle, low throughput mode for routing and persistent sensing with a burst mode for high data rate communication. By strategically distributing available frequency channels between the mobile agents and the stationary nodes, the overall network provides reliable long-term communication paths while maximizing data throughput when needed. PMID:23443374

  3. TDMA-based dual-mode communication for mobile wireless sensor networks.

    PubMed

    Mehta, Ankur; Kerkez, Branko; Glaser, Steven D; Pister, Kristofer S J

    2012-11-22

    Small highly mobile robots, and in particular micro air vehicles (MAVs), are well suited to the task of exploring unknown indoor environments such as buildings and caves. Such a task imposes a number of requirements on the underlying communication infrastructure, with differing goals during various stages of the mission. This work addresses those requirements with a hybrid communications infrastructure consisting of a stationary mesh network along with the mobile nodes. The combined network operates in two independent modes, coupling a highly efficient, low duty cycle, low throughput mode for routing and persistent sensing with a burst mode for high data rate communication. By strategically distributing available frequency channels between the mobile agents and the stationary nodes, the overall network provides reliable long-term communication paths while maximizing data throughput when needed.

  4. Homeless Families' Education Networks: An Examination of Access and Mobilization

    ERIC Educational Resources Information Center

    Miller, Peter M.

    2011-01-01

    Purpose: This study sought deeper understanding of how sheltered families accessed and mobilized educationally related relationships and resources during periods of homelessness. Such work is posited to be especially relevant considering that there is a growing crisis of family homelessness in the United States and school- and community-based…

  5. Social Networks and Educational Mobility: The Experiences of UK Students

    ERIC Educational Resources Information Center

    Brooks, Rachel; Waters, Johanna

    2010-01-01

    A recurrent theme in the literature on transnational mobility--and particularly that pertaining to the young and/or highly skilled--is the "individualised" nature of such movement, as people move to take advantage of opportunities in an increasingly interdependent world. Drawing on research with 85 young adults who had moved overseas for…

  6. Designing a diabetes mobile application with social network support.

    PubMed

    Chomutare, Taridzo; Tatara, Naoe; Årsand, Eirik; Hartvigsen, Gunnar

    2013-01-01

    Although mobile applications and social media have emerged as important facets of the Internet, their role in healthcare is still not well-understood. We present design artefacts, inspired by persuasive technology concepts, from a study of social media as part of a diabetes mHealth application. We used the design science approach for mobile application design, and real-life user testing and focus group meetings to test the application over a 12-week period with 7 participants. Based on the System Usability Score (SUS), the mobile application scored an average of 84.6 (SD=13.2), which represents a fairly high usability score compared to the literature. Regression analysis on the daily blood glucose levels showed significant decreases for some patients, and although the study is not powered, the HbA1c showed a promising trend, and self-efficacy marginally increased. Incorporating persuasive elements such as blood glucose tracking and visualisation, and social media access directly from the mobile application produced promising results that warrant a larger study of behaviour change for people with diabetes.

  7. Performance Analysis of Mobile Ad Hoc Networking Routing Protocols

    DTIC Science & Technology

    2004-12-01

    process of establishing the DAG is similar to the query and reply process as proposed in a light-weight mobile routing (LMR) [ Corson 1995]. Upon link...2004. [RIP RFC] RIP Version 2 RFC Website. http://www.faqs.org/rfcs/rfc2453.html accessed on 1 October 2004. [Royer 1999] Elizabeth M. Royer & C

  8. Is there a case for broadband utility communications networks? Valuing and pricing incremental communications capacity on electric utility smart grid networks

    SciTech Connect

    Heidell, James; Ware, Harold

    2010-01-15

    Analysis of the potential for selling non-utility uses of broadband capability constructed in conjunction with Smart Grid/AMI deserves careful consideration. These services can be provided in a manner that neither creates unfair competition nor results in cross-subsidization of unregulated services by regulated services. (author)

  9. Deadline-aware energy-efficient query scheduling in Wireless Sensor Networks with mobile sink.

    PubMed

    Karakaya, Murat

    2013-01-01

    Mobile sinks are proposed to save sensor energy spent for multihop communication in transferring data to a base station (sink) in Wireless Sensor Networks. Due to relative low speed of mobile sinks, these approaches are mostly suitable for delay-tolerant applications. In this paper, we study the design of a query scheduling algorithm for query-based data gathering applications using mobile sinks. However, these kinds of applications are sensitive to delays due to specified query deadlines. Thus, the proposed scheduling algorithm aims to minimize the number of missed deadlines while keeping the level of energy consumption at the minimum.

  10. Deadline-Aware Energy-Efficient Query Scheduling in Wireless Sensor Networks with Mobile Sink

    PubMed Central

    2013-01-01

    Mobile sinks are proposed to save sensor energy spent for multihop communication in transferring data to a base station (sink) in Wireless Sensor Networks. Due to relative low speed of mobile sinks, these approaches are mostly suitable for delay-tolerant applications. In this paper, we study the design of a query scheduling algorithm for query-based data gathering applications using mobile sinks. However, these kinds of applications are sensitive to delays due to specified query deadlines. Thus, the proposed scheduling algorithm aims to minimize the number of missed deadlines while keeping the level of energy consumption at the minimum. PMID:23818833

  11. Self-Construction of Aggregation Tree for Gathering Mobile Data in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Lee, Sangbin; Kim, Songmin; Kim, Sungjun; Ko, Doohyun; Kim, Bumjin; An, Sunshin

    A network of sensors can be used to obtain state based data from the area in which they are deployed. To reduce costs, the data sent via intermediate sensors to a sink are often aggregated. In this letter, we introduce Self-Construction of Aggregation Tree (SCAT) scheme which uses a novel data aggregation scheme utilizing the knowledge of the mobile node and the infrastructure (static node tree) in gathering the data from the mobile node. The static nodes can construct a near- optimal aggregation tree by themselves, using the knowledge of the mobile node, which is a process similar to forming the centralized aggregation tree.

  12. Place-based attributes predict community membership in a mobile phone communication network.

    PubMed

    Caughlin, T Trevor; Ruktanonchai, Nick; Acevedo, Miguel A; Lopiano, Kenneth K; Prosper, Olivia; Eagle, Nathan; Tatem, Andrew J

    2013-01-01

    Social networks can be organized into communities of closely connected nodes, a property known as modularity. Because diseases, information, and behaviors spread faster within communities than between communities, understanding modularity has broad implications for public policy, epidemiology and the social sciences. Explanations for community formation in social networks often incorporate the attributes of individual people, such as gender, ethnicity or shared activities. High modularity is also a property of large-scale social networks, where each node represents a population of individuals at a location, such as call flow between mobile phone towers. However, whether or not place-based attributes, including land cover and economic activity, can predict community membership for network nodes in large-scale networks remains unknown. We describe the pattern of modularity in a mobile phone communication network in the Dominican Republic, and use a linear discriminant analysis (LDA) to determine whether geographic context can explain community membership. Our results demonstrate that place-based attributes, including sugar cane production, urbanization, distance to the nearest airport, and wealth, correctly predicted community membership for over 70% of mobile phone towers. We observed a strongly positive correlation (r = 0.97) between the modularity score and the predictive ability of the LDA, suggesting that place-based attributes can accurately represent the processes driving modularity. In the absence of social network data, the methods we present can be used to predict community membership over large scales using solely place-based attributes.

  13. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    PubMed Central

    Madhusudhanan, B.; Chitra, S.; Rajan, C.

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. PMID:25834838

  14. Mobility based key management technique for multicast security in mobile ad hoc networks.

    PubMed

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  15. Mobility and Cloud: Operating in Intermittent, Austere Network Conditions

    DTIC Science & Technology

    2014-09-01

    35 viii 2. Piracy Interdiction Use Case.............................................................38 E...38 Figure 11. Operational view: Piracy interdiction operation. .............................................40...Storage Service SAR Search and Rescue SATCOM satellite communications SIPRNET Secret Internet Protocol Router Network SSAS Ship Security Alert System

  16. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2007-08-01

    In both cases the impact of jamming and hostile intercept is being considered. The possibility of hostile action to deny services or exploit the...network accessing to a common access point. We see that the ace-only scheme is ur future plan includes orks under partial loading (as opposed to...time scheme and the sp remarkable. Future plan : O • Effect of channel estimation errors on throughput of large networks • Fundamental understanding

  17. IPv6 Autoconfiguration for Mobile Ad-Hoc Networks: AUTOLSR

    DTIC Science & Technology

    2010-09-01

    these are the MANET border routers ( MBR ). Each network partition is characterized by a network parameter set (NPS) which includes sufficient...of time ; and depending on operative conditions, later may be joined. MBR ware gateways for communication between tactical MANETs and command centers...list have already been applied, a random suffix is generated. 1.4 MANET border router The MBR (MANET Border Router) has two roles: it serves as a

  18. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    PubMed Central

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-01-01

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy. PMID:26404278

  19. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  20. Composite Social Network for Predicting Mobile Apps Installation

    DTIC Science & Technology

    2011-06-02

    Gatica-Perez 2010] Farrahi, K., and Gatica- Perez, D. 2010. Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data . Selected Topics in...discovery and data mining , 1019–1028. ACM. [Granovetter and Soong 1983] Granovetter, M., and Soong, R. 1983. Threshold models of diffusion and...discovery and data mining , 137–146. ACM. [Leskovec, Adamic, and Huberman 2007] Leskovec, J.; Adamic, L.; and Huberman, B. 2007. The dynamics of viral

  1. Developing a Conceptual Unmanned Aerial Vehicle Communications Mobile AD Hoc Network Simulation Model

    DTIC Science & Technology

    2002-06-01

    Elizabeth Royer described the Ad Hoc On-Demand Distance Vector (AODV) routing protocol as “providing quick and efficient route establishment between...Network.” Thesis, Naval Postgraduate School, December 2000. 8. Das, Samir R., Perkins, Charles E., and Royer, Elizabeth M. “ The Ad-hoc On-Demand...Lidong. “Securing Ad Hoc Networks.” Paper Cornell University, Itaca, New York, NY. 16. Corson , Scott S., and Macker, J. “Mobile Ad Hoc

  2. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing agreement. The relationship between the Upper 700 MHz D Block licensee, the Public Safety Broadband Licensee, and... concerning the 700 MHz Public/Private Partnership. (b) Network specifications that comply with § 27.1305...

  3. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing agreement. The relationship between the Upper 700 MHz D Block licensee, the Public Safety Broadband Licensee, and... concerning the 700 MHz Public/Private Partnership. (b) Network specifications that comply with § 27.1305...

  4. A Distance-Aware Replica Adaptive Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks

    PubMed Central

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node’s limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes. PMID:22163839

  5. Energy-Efficient Crowdsensing of Human Mobility and Signal Levels in Cellular Networks

    PubMed Central

    Foremski, Paweł; Gorawski, Michał; Grochla, Krzysztof; Polys, Konrad

    2015-01-01

    The paper presents a practical application of the crowdsensing idea to measure human mobility and signal coverage in cellular networks. Currently, virtually everyone is carrying a mobile phone, which may be used as a sensor to gather research data by measuring, e.g., human mobility and radio signal levels. However, many users are unwilling to participate in crowdsensing experiments. This work begins with the analysis of the barriers for engaging people in crowdsensing. A survey showed that people who agree to participate in crowdsensing expect a minimum impact on their battery lifetime and phone usage habits. To address these requirements, this paper proposes an application for measuring the location and signal strength data based on energy-efficient GPS tracking, which allows one to perform the measurements of human mobility and radio signal levels with minimum energy utilization and without any engagement of the user. The method described combines measurements from the accelerometer with effective management of the GPS to monitor the user mobility with the decrease in battery lifetime by approximately 20%. To show the applicability of the proposed platform, the sample results of signal level distribution and coverage maps gathered for an LTE network and representing human mobility are shown. PMID:26340633

  6. Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks.

    PubMed

    Rashed, Sarmad; Soyturk, Mujdat

    2017-02-20

    Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, datacollectionbecomesoneofthemajorissues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage-especially Unmanned Aerial Vehicles (UAVs)-is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern.

  7. An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks

    PubMed Central

    Raza, Waseem; Arshad, Farzana; Ahmed, Imran; Abdul, Wadood; Ghouzali, Sanaa; Niaz, Iftikhar Azim; Javaid, Nadeem

    2016-01-01

    In this paper, a novel routing strategy to cater the energy consumption and delay sensitivity issues in deep underwater wireless sensor networks is proposed. This strategy is named as ESDR: Event Segregation based Delay sensitive Routing. In this strategy sensed events are segregated on the basis of their criticality and, are forwarded to their respective destinations based on forwarding functions. These functions depend on different routing metrics like: Signal Quality Index, Localization free Signal to Noise Ratio, Energy Cost Function and Depth Dependent Function. The problem of incomparable values of previously defined forwarding functions causes uneven delays in forwarding process. Hence forwarding functions are redefined to ensure their comparable values in different depth regions. Packet forwarding strategy is based on the event segregation approach which forwards one third of the generated events (delay sensitive) to surface sinks and two third events (normal events) are forwarded to mobile sinks. Motion of mobile sinks is influenced by the relative distribution of normal nodes. We have also incorporated two different mobility patterns named as; adaptive mobility and uniform mobility for mobile sinks. The later one is implemented for collecting the packets generated by the normal nodes. These improvements ensure optimum holding time, uniform delay and in-time reporting of delay sensitive events. This scheme is compared with the existing ones and outperforms the existing schemes in terms of network lifetime, delay and throughput. PMID:27827905

  8. Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks

    PubMed Central

    Rashed, Sarmad; Soyturk, Mujdat

    2017-01-01

    Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage—especially Unmanned Aerial Vehicles (UAVs)—is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern. PMID:28230727

  9. Mobilizing Community Museum Networks in Mexico--and Beyond.

    ERIC Educational Resources Information Center

    Healy, Kevin

    2003-01-01

    Since the late 1980s, a network of community museums has spread throughout Oaxaca (Mexico), serving as an autonomous force for broad-based cultural development, supporting the maintenance and revitalization of local Indigenous cultures, countering Western cultural hegemony, and involving Indigenous communities in museum development and related…

  10. Mobile Ad Hoc Networks: An Evaluation of Smartphone Technologies

    DTIC Science & Technology

    2011-10-01

    dans un tel environnement et offre une comparaison des diverses plateformes de téléphone intel- ligent disponibles à l’égard de leurs capacités et...CORA CR 2011-169 5 Networking and the Open System Interconnection Model The International Organization for Standardization (ISO) began working on a

  11. Social Network Analysis of the Farabi Exchange Program: Student Mobility

    ERIC Educational Resources Information Center

    Ugurlu, Zeynep

    2016-01-01

    Problem Statement: Exchange programs offer communication channels created through student and instructor exchanges; a flow of information takes place through these channels. The Farabi Exchange Program (FEP) is a student and instructor exchange program between institutions of higher education. Through the use of social network analysis and…

  12. Credible Mobile and Ad Hoc Network Simulation-Based Studies

    DTIC Science & Technology

    2006-10-26

    packet radio. In Proceed- ings of the 9th ARRL /CRRL Amateur Radio Computer Networking Conference, pages 134-140, 1990. [45] H. Kee. NAM support for...Selected Areas in Communications (JSAC), pages 1335-1346, 2004. [102] P. Welch. The Computer Performance Modeling Handbook , chapter The Statis- tical

  13. Autonomous telemetry system by using mobile networks for a long-term seismic observation

    NASA Astrophysics Data System (ADS)

    Hirahara, S.; Uchida, N.; Nakajima, J.

    2012-04-01

    When a large earthquake occurs, it is important to know the detailed distribution of aftershocks immediately after the main shock for the estimation of the fault plane. The large amount of seismic data is also required to determine the three-dimensional seismic velocity structure around the focal area. We have developed an autonomous telemetry system using mobile networks, which is specialized for aftershock observations. Because the newly developed system enables a quick installation and real-time data transmission by using mobile networks, we can construct a dense online seismic network even in mountain areas where conventional wired networks are not available. This system is equipped with solar panels that charge lead-acid battery, and enables a long-term seismic observation without maintenance. Furthermore, this system enables a continuous observation at low costs with flat-rate or prepaid Internet access. We have tried to expand coverage areas of mobile communication and back up Internet access by configuring plural mobile carriers. A micro server embedded with Linux consists of automatic control programs of the Internet connection and data transmission. A status monitoring and remote maintenance are available via the Internet. In case of a communication failure, an internal storage can back up data for two years. The power consumption of communication device ranges from 2.5 to 4.0 W. With a 50 Ah lead-acid battery, this system continues to record data for four days if the battery charging by solar panels is temporarily unavailable.

  14. Mobile Device Management in the DOD Enterprise Network: Factors for Risk Management, Integration, and It Acquisition

    DTIC Science & Technology

    2013-03-01

    Community IDS Intrusion Detection System IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IMEI...traffic with an 10 intrusion detection system (IDS; GAO, 2012; see Appendix D). Automated software tools can provide real-time status reports... intrusion prevention software to examine traffic entering the network from mobile devices. Monitor and control Devices can be monitored and

  15. Structuring and Regulating Collaborative Learning in Higher Education with Wireless Networks and Mobile Tools

    ERIC Educational Resources Information Center

    Jarvela, Sanna; Naykki, Piia; Laru, Jari; Luokkanen, Tiina

    2007-01-01

    In our recent research we have explored possibilities to scaffold collaborative learning in higher education with wireless networks and mobile tools. The pedagogical ideas are grounded on concepts of collaborative learning, including the socially shared origin of cognition, as well as self-regulated learning theory. This paper presents our three…

  16. Networks of International Student Mobility: Enlargement and Consolidation of the European Transnational Education Space?

    ERIC Educational Resources Information Center

    Vögtle, Eva Maria; Windzio, Michael

    2016-01-01

    In this paper, we investigate the impact of membership in the Bologna Process on patterns and driving forces of cross-national student mobility. Student exchange flows are analyzed for almost all Bologna Process member states and non-Bologna OECD members over a ten-year period (from 2000 to 2010). We apply a social network approach focusing on…

  17. Delivering Diagnostic Quality Video over Mobile Wireless Networks for Telemedicine.

    PubMed

    Rao, Sira P; Jayant, Nikil S; Stachura, Max E; Astapova, Elena; Pearson-Shaver, Anthony

    2009-01-01

    In real-time remote diagnosis of emergency medical events, mobility can be enabled by wireless video communications. However, clinical use of this potential advance will depend on definitive and compelling demonstrations of the reliability of diagnostic quality video. Because the medical domain has its own fidelity criteria, it is important to incorporate diagnostic video quality criteria into any video compression system design. To this end, we used flexible algorithms for region-of-interest (ROI) video compression and obtained feedback from medical experts to develop criteria for diagnostically lossless (DL) quality. The design of the system occurred in three steps-measurement of bit rate at which DL quality is achieved through evaluation of videos by medical experts, incorporation of that information into a flexible video encoder through the notion of encoder states, and an encoder state update option based on a built-in quality criterion. Medical experts then evaluated our system for the diagnostic quality of the video, allowing us to verify that it is possible to realize DL quality in the ROI at practical communication data transfer rates, enabling mobile medical assessment over bit-rate limited wireless channels. This work lays the scientific foundation for additional validation through prototyped technology, field testing, and clinical trials.

  18. Self-Organized Link State Aware Routing for Multiple Mobile Agents in Wireless Network

    NASA Astrophysics Data System (ADS)

    Oda, Akihiro; Nishi, Hiroaki

    Recently, the importance of data sharing structures in autonomous distributed networks has been increasing. A wireless sensor network is used for managing distributed data. This type of distributed network requires effective information exchanging methods for data sharing. To reduce the traffic of broadcasted messages, reduction of the amount of redundant information is indispensable. In order to reduce packet loss in mobile ad-hoc networks, QoS-sensitive routing algorithm have been frequently discussed. The topology of a wireless network is likely to change frequently according to the movement of mobile nodes, radio disturbance, or fading due to the continuous changes in the environment. Therefore, a packet routing algorithm should guarantee QoS by using some quality indicators of the wireless network. In this paper, a novel information exchanging algorithm developed using a hash function and a Boolean operation is proposed. This algorithm achieves efficient information exchanges by reducing the overhead of broadcasting messages, and it can guarantee QoS in a wireless network environment. It can be applied to a routing algorithm in a mobile ad-hoc network. In the proposed routing algorithm, a routing table is constructed by using the received signal strength indicator (RSSI), and the neighborhood information is periodically broadcasted depending on this table. The proposed hash-based routing entry management by using an extended MAC address can eliminate the overhead of message flooding. An analysis of the collision of hash values contributes to the determination of the length of the hash values, which is minimally required. Based on the verification of a mathematical theory, an optimum hash function for determining the length of hash values can be given. Simulations are carried out to evaluate the effectiveness of the proposed algorithm and to validate the theory in a general wireless network routing algorithm.

  19. A mobility enabled inpatient monitoring system using a ZigBee medical sensor network.

    PubMed

    Tung, Hoi Ching; Tsang, Kim Fung; Lam, Ka Lun; Tung, Hoi Yan; Li, Benjamin Yee Shing; Yeung, Lam Fat; Ko, King Tim; Lau, Wing Hong; Rakocevic, Veselin

    2014-01-30

    This paper presents a ZigBee In-Patient Monitoring system embedded with a new ZigBee mobility management solution. The system enables ZigBee device mobility in a fixed ZigBee network. The usage, the architecture and the mobility framework are discussed in details in the paper. The evaluation shows that the new algorithm offers a good efficiency, resulting in a low management cost. In addition, the system can save lives by providing a panic button and can be used as a location tracking service. A case study focused on the Princes of Wales Hospital in Hong Kong is presented and findings are given. This investigation reveals that the developed mobile solutions offer promising value-added services for many potential ZigBee applications.

  20. Effects of fading and interference in narrowband land-mobile networks

    NASA Astrophysics Data System (ADS)

    Linnartz, Johan Paul Marie Gerard

    1991-05-01

    The performance of mobile radio systems with narrowband radio channels is studied. Several results of previous research are included. In particular, the effects of multipath and shadow 'fading' and of mutual 'interference' between mobile users is investigated. To this end, initially the relevant propagation mechanisms are addressed, focusing on statistical channel models. For the planning of real systems, the suitability of some propagation models using terrain data is empirically evaluated. The statistical channel description is used to compute the performance of mobile radio links. Expressions are given for the outage probability and for the average duration of fades, taking account of mutual interference between users. A simplified model for the bit error rate in digital transmission is proposed. Numerical results are given for mobile telephone networks.

  1. A Mobility Enabled Inpatient Monitoring System Using a ZigBee Medical Sensor Network

    PubMed Central

    Tung, Hoi Ching; Tsang, Kim Fung; Lam, Ka Lun; Tung, Hoi Yan; Li, Benjamin Yee Shing; Yeung, Lam Fat; Ko, King Tim; Lau, Wing Hong; Rakocevic, Veselin

    2014-01-01

    This paper presents a ZigBee In-Patient Monitoring system embedded with a new ZigBee mobility management solution. The system enables ZigBee device mobility in a fixed ZigBee network. The usage, the architecture and the mobility framework are discussed in details in the paper. The evaluation shows that the new algorithm offers a good efficiency, resulting in a low management cost. In addition, the system can save lives by providing a panic button and can be used as a location tracking service. A case study focused on the Princes of Wales Hospital in Hong Kong is presented and findings are given. This investigation reveals that the developed mobile solutions offer promising value-added services for many potential ZigBee applications. PMID:24487623

  2. Robust message routing for mobile (wireless) ad hoc networks.

    SciTech Connect

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie; Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M.

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  3. Real-Time Mobile Applications in Intermittently Connected Networks

    DTIC Science & Technology

    2014-10-28

    Delay Tolerant Networking) bundle protocol used for message delivery – Modified open-source implementation • DTN Metadata Extension Blocks...construction • Pre-caching of mission-relevant data ISE Core SEI-JDTN with metadata extension SA Prediction C onnectivity Assistant IS E+ 6 Fall...2014 SEI Research Review Presenter Last Name and Date © 2014 Carnegie Mellon University Metadata Supports Forwarding Decisions Use DTN metadata

  4. Intelligent Middle-Ware Architecture for Mobile Networks

    NASA Astrophysics Data System (ADS)

    Rayana, Rayene Ben; Bonnin, Jean-Marie

    Recent advances in electronic and automotive industries as well as in wireless telecommunication technologies have drawn a new picture where each vehicle became “fully networked”. Multiple stake-holders (network operators, drivers, car manufacturers, service providers, etc.) will participate in this emerging market, which could grow following various models. To free the market from technical constraints, it is important to return to the basics of the Internet, i.e., providing embarked devices with a fully operational Internet connectivity (IPv6).

  5. Idiotypic immune networks in mobile-robot control.

    PubMed

    Whitbrook, Amanda M; Aickelin, Uwe; Garibaldi, Jonathan M

    2007-12-01

    Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved the most popular artificial immune system (AIS) model for incorporation into behavior-based robotics, but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with nonidiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic AIS network with a reinforcement-learning (RL)-based control system is described, and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic RL, a simplified hybrid AIS-RL that implements idiotypic selection independently of derived concentration levels, and a full hybrid AIS-RL scheme are examined. The test bed takes the form of a simulated Pioneer robot that is required to navigate through maze worlds detecting and tracking door markers.

  6. Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility

    PubMed Central

    Jin, Yichao; Vural, Serdar; Gluhak, Alexander; Moessner, Klaus

    2013-01-01

    This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines. PMID:24135992

  7. Adaptive threshold determination for efficient channel sensing in cognitive radio network using mobile sensors

    NASA Astrophysics Data System (ADS)

    Morshed, M. N.; Khatun, S.; Kamarudin, L. M.; Aljunid, S. A.; Ahmad, R. B.; Zakaria, A.; Fakir, M. M.

    2017-03-01

    Spectrum saturation problem is a major issue in wireless communication systems all over the world. Huge number of users is joining each day to the existing fixed band frequency but the bandwidth is not increasing. These requirements demand for efficient and intelligent use of spectrum. To solve this issue, the Cognitive Radio (CR) is the best choice. Spectrum sensing of a wireless heterogeneous network is a fundamental issue to detect the presence of primary users' signals in CR networks. In order to protect primary users (PUs) from harmful interference, the spectrum sensing scheme is required to perform well even in low signal-to-noise ratio (SNR) environments. Meanwhile, the sensing period is usually required to be short enough so that secondary (unlicensed) users (SUs) can fully utilize the available spectrum. CR networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary user's licensed frequency bands. In this paper, we have proposed an adaptive threshold detection method to detect presence of PU signal using free space path loss (FSPL) model in 2.4 GHz WLAN network. The model is designed for mobile sensors embedded in smartphones. The mobile sensors acts as SU while the existing WLAN network (channels) works as PU. The theoretical results show that the desired threshold range detection of mobile sensors mainly depends on the noise floor level of the location in consideration.

  8. Dynamic task allocation in multi-hop multimedia wireless sensor networks with low mobility.

    PubMed

    Jin, Yichao; Vural, Serdar; Gluhak, Alexander; Moessner, Klaus

    2013-10-16

    This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.

  9. Training a Network of Electronic Neurons for Control of a Mobile Robot

    NASA Astrophysics Data System (ADS)

    Vromen, T. G. M.; Steur, E.; Nijmeijer, H.

    An adaptive training procedure is developed for a network of electronic neurons, which controls a mobile robot driving around in an unknown environment while avoiding obstacles. The neuronal network controls the angular velocity of the wheels of the robot based on the sensor readings. The nodes in the neuronal network controller are clusters of neurons rather than single neurons. The adaptive training procedure ensures that the input-output behavior of the clusters is identical, even though the constituting neurons are nonidentical and have, in isolation, nonidentical responses to the same input. In particular, we let the neurons interact via a diffusive coupling, and the proposed training procedure modifies the diffusion interaction weights such that the neurons behave synchronously with a predefined response. The working principle of the training procedure is experimentally validated and results of an experiment with a mobile robot that is completely autonomously driving in an unknown environment with obstacles are presented.

  10. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility

    PubMed Central

    Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios

    2016-01-01

    Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability. PMID:27007373

  11. Full-state tracking control of a mobile robot using neural networks.

    PubMed

    Chaitanya, V Sree Krishna

    2005-10-01

    In this paper a nonholonomic mobile robot with completely unknown dynamics is discussed. A mathematical model has been considered and an efficient neural network is developed, which ensures guaranteed tracking performance leading to stability of the system. The neural network assumes a single layer structure, by taking advantage of the robot regressor dynamics that expresses the highly nonlinear robot dynamics in a linear form in terms of the known and unknown robot dynamic parameters. No assumptions relating to the boundedness is placed on the unmodeled disturbances. It is capable of generating real-time smooth and continuous velocity control signals that drive the mobile robot to follow the desired trajectories. The proposed approach resolves speed jump problem existing in some previous tracking controllers. Further, this neural network does not require offline training procedures. Lyapunov theory has been used to prove system stability. The practicality and effectiveness of the proposed tracking controller are demonstrated by simulation and comparison results.

  12. Issues for the integration of satellite and terrestrial cellular networks for mobile communications

    NASA Astrophysics Data System (ADS)

    Delre, Enrico; Mistretta, Ignazio; Dellipriscoli, Francesco; Settimo, Franco

    1991-09-01

    Satellite and terrestrial cellular systems naturally complement each other for land mobile communications, even though present systems have been developed independently. The main advantages of the integrated system are a faster wide area coverage, a better management of overloading traffic conditions, an extension to geographical areas not covered by the terrestrial network and, in perspective, the provision of only one integrated system for all mobile communications (land, aeronautical, and maritime). To achieve these goals, as far as possible the same protocols of the terrestrial network should be used also for the satellite network. Discussed here are the main issues arising from the requirements of the main integrated system. Some results are illustrated, and possible future improvements due to technical solutions are presented.

  13. ACTS broadband aeronautical experiment

    NASA Technical Reports Server (NTRS)

    Abbe, Brian S.; Jedrey, Thomas C.; Estabrook, Polly; Agan, Martin J.

    1993-01-01

    In the last decade, the demand for reliable data, voice, and video satellite communication links between aircraft and ground to improve air traffic control, airline management, and to meet the growing demand for passenger communications has increased significantly. It is expected that in the near future, the spectrum required for aeronautical communication services will grow significantly beyond that currently available at L-band. In anticipation of this, JPL is developing an experimental broadband aeronautical satellite communications system that will utilize NASA's Advanced Communications Technology Satellite (ACTS) as a satellite of opportunity and the technology developed under JPL's ACTS Mobile Terminal (AMT) Task to evaluate the feasibility of using K/Ka-band for these applications. The application of K/Ka-band for aeronautical satellite communications at cruise altitudes is particularly promising for several reasons: (1) the minimal amount of signal attenuation due to rain; (2) the reduced drag due to the smaller K/Ka-band antennas (as compared to the current L-band systems); and (3) the large amount of available bandwidth. The increased bandwidth available at these frequencies is expected to lead to significantly improved passenger communications - including full-duplex compressed video and multiple channel voice. A description of the proposed broadband experimental system will be presented including: (1) applications of K/Ka-band aeronautical satellite technology to U.S. industry; (2) the experiment objectives; (3) the experiment set-up; (4) experimental equipment description; and (5) industrial participation in the experiment and the benefits.

  14. Neural network recognition of chemical class information in mobility spectra obtained at high temperatures

    NASA Technical Reports Server (NTRS)

    Bell, S.; Nazarov, E.; Wang, Y. F.; Rodriguez, J. E.; Eiceman, G. A.

    2000-01-01

    A minimal neural network was applied to a large library of high-temperature mobility spectra drawn from 16 chemical classes including 154 substances with 2000 spectra at various concentrations. A genetic algorithm was used to create a representative subset of points from the mobility spectrum as input to a cascade-type back-propagation network. This network demonstrated that significant information specific to chemical class was located in the spectral region near the reactant ions. This network failed to generalize the solution to unfamiliar compounds necessitating the use of complete spectra in network processing. An extended back-propagation network classified unfamiliar chemicals by functional group with a mean for average values of 0.83 without sulfides and 0.79 with sulfides. Further experiments confirmed that chemical class information was resident in the spectral region near the reactant ions. Deconvolution of spectra demonstrated the presence of ions, merged with the reactant ion peaks that originated from introduced samples. The ability of the neural network to generalize the solution to unfamiliar compounds suggests that these ions are distinct and class specific.

  15. Statistically validated mobile communication networks: the evolution of motifs in European and Chinese data

    NASA Astrophysics Data System (ADS)

    Li, Ming-Xia; Palchykov, Vasyl; Jiang, Zhi-Qiang; Kaski, Kimmo; Kertész, János; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N.

    2014-08-01

    Big data open up unprecedented opportunities for investigating complex systems, including society. In particular, communication data serve as major sources for computational social sciences, but they have to be cleaned and filtered as they may contain spurious information due to recording errors as well as interactions, like commercial and marketing activities, not directly related to the social network. The network constructed from communication data can only be considered as a proxy for the network of social relationships. Here we apply a systematic method, based on multiple-hypothesis testing, to statistically validate the links and then construct the corresponding Bonferroni network, generalized to the directed case. We study two large datasets of mobile phone records, one from Europe and the other from China. For both datasets we compare the raw data networks with the corresponding Bonferroni networks and point out significant differences in the structures and in the basic network measures. We show evidence that the Bonferroni network provides a better proxy for the network of social interactions than the original one. Using the filtered networks, we investigated the statistics and temporal evolution of small directed 3-motifs and concluded that closed communication triads have a formation time scale, which is quite fast and typically intraday. We also find that open communication triads preferentially evolve into other open triads with a higher fraction of reciprocated calls. These stylized facts were observed for both datasets.

  16. Ireland Array: A new broadband seismic network targets the structure, evolution and seismicity of Ireland and surroundings

    NASA Astrophysics Data System (ADS)

    Lebedev, S.; Horan, C.; Readman, P. W.; Schaeffer, A. J.; Agius, M. R.; Collins, L.; Hauser, F.; O'Reilly, B. M.; Blake, T.

    2012-04-01

    Ireland Array is a new array of broadband seismic stations deployed across Ireland. The backbone component of the array is formed by 20 stations, equipped with Trillium 120PA seismometers and distributed uniformly across Ireland. These 20 stations have been installed in 2010-2012 and will be deployed for 5 years. Deployments of additional 10 stations (each with a Guralp 40T seismometer) will be used to complement the backbone-component coverage and to target fine structure of the subsurface in specific target areas. Ireland Array is a major new geophysical facility, producing abundant seismic data. It will reveal Ireland's deep structure and evolution in unprecedented detail. Ireland Array will also underpin geothermal energy research by illuminating in detail the physical structure of Ireland's crust and entire lithosphere. New insight into 3-D regional lithospheric structure and evolution will also benefit basin-evolution research, relevant for hydrocarbon exploration. Yet another target of Ireland Array will be Ireland's seismicity, modest but insufficiently understood at present. Ireland Array is generating important new data for research on both regional and North-Atlantic scale problems and is aimed to benefit the entire Earth science community. Web: http://www.dias.ie/ireland_array

  17. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  18. Quantitative analysis of volatile organic compounds using ion mobility spectra and cascade correlation neural networks

    NASA Technical Reports Server (NTRS)

    Harrington, Peter DEB.; Zheng, Peng

    1995-01-01

    Ion Mobility Spectrometry (IMS) is a powerful technique for trace organic analysis in the gas phase. Quantitative measurements are difficult, because IMS has a limited linear range. Factors that may affect the instrument response are pressure, temperature, and humidity. Nonlinear calibration methods, such as neural networks, may be ideally suited for IMS. Neural networks have the capability of modeling complex systems. Many neural networks suffer from long training times and overfitting. Cascade correlation neural networks train at very fast rates. They also build their own topology, that is a number of layers and number of units in each layer. By controlling the decay parameter in training neural networks, reproducible and general models may be obtained.

  19. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.

    PubMed

    Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  20. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    PubMed Central

    Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880

  1. Mobile Ad-Hoc Networking on Android Devices

    DTIC Science & Technology

    2014-03-01

    2012 Android and iOS devices dominated the market share with 75.0% and 14.9%, respectively (5). This strongly suggested Android devices as our platform...networks, it lacks the ability to create them. This lack of ability and the fact that the Android operating system is open source, while iOS is very...Battlefield Scenarios; U.S. Army Research Laboratory: Aberdeen Proving Ground, MD To be published in 2014. 4. Kerr, D. Android beats iOS 5-to-1 in Q3

  2. Bandwidth, Broadband, and Planning for Public Access

    ERIC Educational Resources Information Center

    Blowers, Helene

    2012-01-01

    Broadband and bandwidth allocation is an essential technology planning activity that libraries should address on a continual basis. There are five key factors that will impact your network's performance: 1. infrastructure, 2. network load, 3. workstation performance, 4. prioritization of services, and 5. network management. The author thinks it's…

  3. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    PubMed

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  4. A mobile wireless sensor network platform for use with optical fibre sensors

    NASA Astrophysics Data System (ADS)

    Zhou, Bochao; Yang, Shuo; Sun, Tong; Grattan, Kenneth T. V.

    2013-05-01

    This paper presents a novel design of a system for using smart mobile robots to deploy a Wireless Sensor Network (WSN) for different optical fibre sensors, allowing for potential applications where there is a remote and harsh monitoring environment and allowing for the advantages of the optical fibre technology for the sensor itself to be used. The platform which was designed is comprised of a smart mobile robot, an optical fibre sensor module and a WSN module integrated with a localization component based on Received Signal Strength Indicator (RSSI), which has important advantages for mobile sensing and tracking, flexible deployment and mesh networking. The design principle and implementation-related issues for the platform have been discussed in this study. To investigate the performance of the mobile WSN platform, an experiment simulating measurement in a real environment has been performed. With the positive experimental data obtained, the functionalities of the platform are successfully demonstrated, which enables the real-time monitoring and transmission of sensor data and in addition estimated positional information. The exploitation of this kind of mobile WSN platform with fibre optic sensors is expected to make an impact on many applications, including those where advanced optical fibre sensing is particularly advantageous, yet where conventional WSNs cannot meet the requirements of the total sensing system.

  5. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    PubMed Central

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  6. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  7. Mobility-Aware Caching and Computation Offloading in 5G Ultra-Dense Cellular Networks

    PubMed Central

    Chen, Min; Hao, Yixue; Qiu, Meikang; Song, Jeungeun; Wu, Di; Humar, Iztok

    2016-01-01

    Recent trends show that Internet traffic is increasingly dominated by content, which is accompanied by the exponential growth of traffic. To cope with this phenomena, network caching is introduced to utilize the storage capacity of diverse network devices. In this paper, we first summarize four basic caching placement strategies, i.e., local caching, Device-to-Device (D2D) caching, Small cell Base Station (SBS) caching and Macrocell Base Station (MBS) caching. However, studies show that so far, much of the research has ignored the impact of user mobility. Therefore, taking the effect of the user mobility into consideration, we proposes a joint mobility-aware caching and SBS density placement scheme (MS caching). In addition, differences and relationships between caching and computation offloading are discussed. We present a design of a hybrid computation offloading and support it with experimental results, which demonstrate improved performance in terms of energy cost. Finally, we discuss the design of an incentive mechanism by considering network dynamics, differentiated user’s quality of experience (QoE) and the heterogeneity of mobile terminals in terms of caching and computing capabilities. PMID:27347975

  8. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  9. Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks.

    PubMed

    Khan, Majid I; Gansterer, Wilfried N; Haring, Guenter

    2013-05-15

    Over the last decade a large number of routing protocols has been designed for achieving energy efficiency in data collecting wireless sensor networks. The drawbacks of using a static sink are well known. It has been argued in the literature that a mobile sink may improve the energy dissipation compared to a static one. Some authors focus on minimizing Emax, the maximum energy dissipation of any single node in the network, while others aim at minimizing Ebar, the average energy dissipation over all nodes. In our paper we take a more holistic view, considering both Emax and Ebar. The main contribution of this paper is to provide a simulation-based analysis of the energy efficiency of WSNs with static and mobile sinks. The focus is on two important configuration parameters: mobility path of the sink and duty cycling value of the nodes. On the one hand, it is well known that in the case of a mobile sink with fixed trajectory the choice of the mobility path influences energy efficiency. On the other hand, in some types of applications sensor nodes spend a rather large fraction of their total lifetime in idle mode, and therefore higher energy efficiency can be achieved by using the concept of reduced duty cycles. In particular, we quantitatively analyze the influence of duty cycling and the mobility radius of the sink as well as their interrelationship in terms of energy consumption for a well-defined model scenario. The analysis starts from general load considerations and is refined into a geometrical model. This model is validated by simulations which are more realistic in terms of duty cycling than previous work. It is illustrated that over all possible configuration scenarios in terms of duty cycle and mobility radius of the sink the energy dissipation in the WSN can vary up to a factor of nine in terms of Emax and up to a factor of 17 in terms of Ebar. It turns out that in general the choice of the duty cycle value is more important for achieving energy efficiency

  10. A Mobile Sensor Network to Map CO2 in Urban Environments

    NASA Astrophysics Data System (ADS)

    Lee, J.; Christen, A.; Nesic, Z.; Ketler, R.

    2014-12-01

    Globally, an estimated 80% of all fuel-based CO2 emissions into the atmosphere are attributable to cities, but there is still a lack of tools to map, visualize and monitor emissions to the scales at which emissions reduction strategies can be implemented - the local and urban scale. Mobile CO2 sensors, such as those attached to taxis and other existing mobile platforms, may be a promising way to observe and map CO2 mixing ratios across heterogenous urban environments with a limited number of sensors. Emerging modular open source technologies, and inexpensive compact sensor components not only enable rapid prototyping and replication, but also are allowing for the miniaturization and mobilization of traditionally fixed sensor networks. We aim to optimize the methods and technologies for monitoring CO2 in cities using a network of CO2 sensors deployable on vehicles and bikes. Our sensor technology is contained in a compact weather-proof case (35.8cm x 27.8cm x 11.8cm), powered independently by battery or by car, and includes the Li-Cor Li-820 infrared gas analyzer (Licor Inc, lincoln, NB, USA), Arduino Mega microcontroller (Arduino CC, Italy) and Adafruit GPS (Adafruit Technologies, NY, USA), and digital air temperature thermometer which measure CO2 mixing ratios (ppm), geolocation and speed, pressure and temperature, respectively at 1-second intervals. With the deployment of our sensor technology, we will determine if such a semi-autonomous mobile approach to monitoring CO2 in cities can determine excess urban CO2 mixing ratios (i.e. the 'urban CO2 dome') when compared to values measured at a fixed, remote background site. We present results from a pilot study in Vancouver, BC, where the a network of our new sensors was deployed both in fixed network and in a mobile campaign and examine the spatial biases of the two methods.

  11. Fuzzy mobile-robot positioning in intelligent spaces using wireless sensor networks.

    PubMed

    Herrero, David; Martínez, Humberto

    2011-01-01

    This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  12. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  13. Classification of ion mobility spectra by functional groups using neural networks

    NASA Technical Reports Server (NTRS)

    Bell, S.; Nazarov, E.; Wang, Y. F.; Eiceman, G. A.

    1999-01-01

    Neural networks were trained using whole ion mobility spectra from a standardized database of 3137 spectra for 204 chemicals at various concentrations. Performance of the network was measured by the success of classification into ten chemical classes. Eleven stages for evaluation of spectra and of spectral pre-processing were employed and minimums established for response thresholds and spectral purity. After optimization of the database, network, and pre-processing routines, the fraction of successful classifications by functional group was 0.91 throughout a range of concentrations. Network classification relied on a combination of features, including drift times, number of peaks, relative intensities, and other factors apparently including peak shape. The network was opportunistic, exploiting different features within different chemical classes. Application of neural networks in a two-tier design where chemicals were first identified by class and then individually eliminated all but one false positive out of 161 test spectra. These findings establish that ion mobility spectra, even with low resolution instrumentation, contain sufficient detail to permit the development of automated identification systems.

  14. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  15. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  16. Connecting Land-Based Networks to Ships

    DTIC Science & Technology

    2012-09-01

    Broadband Global Area Network ( BGAN ) ....................43 5. Client and Server Laptops...43 Figure 24. Hughes 9450 BGAN Mobile Satellite Terminal...Figure 33. 2G/3G cellular connection speed test result on land ........................................67 Figure 34. Hughes 9450 INMARSAT BGAN

  17. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  18. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  19. An extra power saving scheme for prolonging lifetime of mobile handset in the 4G mobile networks.

    PubMed

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    In the fourth generation or next generation networks, services of non-real-time variable bit rate (NRT-VBR) and best effort (BE) will dominate over 85% of the total traffic in the networks. In this paper, we study the power saving mechanism of NRT-VBR and BE services for mobile handsets (MHs) to prolong their battery lifetime (i.e., the sustained operation duration) in the fourth generation networks. Because the priority of NRT-VBR and BE is lower than that of real-time VBR (RT-VBR) or guaranteed bit rate (GBR) services, we investigate an extended sleep mode for lower priority services (e.g., NRT-VBR and BE) in an MH to conserve the energy. The extended sleep mode is used when the MH wakes up from the sleep mode but it cannot obtain the bandwidth from base station (BS). The proposed mechanism, named extra power saving scheme (EPSS), uses the M/M/k/k Markovian queuing model to estimate the extended sleep duration to let MHs conserve their battery energy when the networks traffic is congested. To study the performance of EPSS, an accurate analysis model of energy is presented and validated by taking a series of simulations. Numerical experiments show that EPSS can achieve 43% extra energy conservation at most when downlink resource is saturated. We conclude that the energy of MHs can be conserved further by applying EPSS when the traffic load is saturated. The effect of energy saving becomes more obvious when the portion of NRT-VBR and BE services is greater than that of RT-VBR and GBR services.

  20. An Extra Power Saving Scheme for Prolonging Lifetime of Mobile Handset in the 4G Mobile Networks

    PubMed Central

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    In the fourth generation or next generation networks, services of non-real-time variable bit rate (NRT-VBR) and best effort (BE) will dominate over 85% of the total traffic in the networks. In this paper, we study the power saving mechanism of NRT-VBR and BE services for mobile handsets (MHs) to prolong their battery lifetime (i.e., the sustained operation duration) in the fourth generation networks. Because the priority of NRT-VBR and BE is lower than that of real-time VBR (RT-VBR) or guaranteed bit rate (GBR) services, we investigate an extended sleep mode for lower priority services (e.g., NRT-VBR and BE) in an MH to conserve the energy. The extended sleep mode is used when the MH wakes up from the sleep mode but it cannot obtain the bandwidth from base station (BS). The proposed mechanism, named extra power saving scheme (EPSS), uses the Markovian queuing model to estimate the extended sleep duration to let MHs conserve their battery energy when the networks traffic is congested. To study the performance of EPSS, an accurate analysis model of energy is presented and validated by taking a series of simulations. Numerical experiments show that EPSS can achieve 43% extra energy conservation at most when downlink resource is saturated. We conclude that the energy of MHs can be conserved further by applying EPSS when the traffic load is saturated. The effect of energy saving becomes more obvious when the portion of NRT-VBR and BE services is greater than that of RT-VBR and GBR services. PMID:25089822

  1. Using analytic network process for evaluating mobile text entry methods.

    PubMed

    Ocampo, Lanndon A; Seva, Rosemary R

    2016-01-01

    This paper highlights a preference evaluation methodology for text entry methods in a touch keyboard smartphone using analytic network process (ANP). Evaluation of text entry methods in literature mainly considers speed and accuracy. This study presents an alternative means for selecting text entry method that considers user preference. A case study was carried out with a group of experts who were asked to develop a selection decision model of five text entry methods. The decision problem is flexible enough to reflect interdependencies of decision elements that are necessary in describing real-life conditions. Results showed that QWERTY method is more preferred than other text entry methods while arrangement of keys is the most preferred criterion in characterizing a sound method. Sensitivity analysis using simulation of normally distributed random numbers under fairly large perturbation reported the foregoing results reliable enough to reflect robust judgment. The main contribution of this paper is the introduction of a multi-criteria decision approach in the preference evaluation of text entry methods.

  2. TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks

    NASA Astrophysics Data System (ADS)

    Wang, Zhiliang; Yin, Xia; Xiang, Yang; Zhu, Ruiping; Gao, Shirui; Wu, Xin; Liu, Shijian; Gao, Song; Zhou, Li; Li, Peng

    Mobile broadcast service is one of the emerging most important new services in 3G networks. To better operate and manage mobile broadcast services, mobile broadcast business management system (MBBMS) should be designed and developed. Such a system, with its distributed nature, complicated XML data and security mechanism, faces many challenges in testing technology. In this paper, we study the conformance testing methodology of MBBMS, and design and implement a MBBMS protocol conformance testing tool based on TTCN-3, a standardized test description language that can be used in black-box testing of reactive and distributed system. In this methodology and testing tool, we present a semi-automatic XML test data generation method of TTCN-3 test suite and use HMSC model to help the design of test suite. In addition, we also propose an integrated testing method for hierarchical MBBMS security architecture. This testing tool has been used in industrial level’s testing.

  3. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  4. Adaptive AOA-aided TOA self-positioning for mobile wireless sensor networks.

    PubMed

    Wen, Chih-Yu; Chan, Fu-Kai

    2010-01-01

    Location-awareness is crucial and becoming increasingly important to many applications in wireless sensor networks. This paper presents a network-based positioning system and outlines recent work in which we have developed an efficient principled approach to localize a mobile sensor using time of arrival (TOA) and angle of arrival (AOA) information employing multiple seeds in the line-of-sight scenario. By receiving the periodic broadcasts from the seeds, the mobile target sensors can obtain adequate observations and localize themselves automatically. The proposed positioning scheme performs location estimation in three phases: (I) AOA-aided TOA measurement, (II) Geometrical positioning with particle filter, and (III) Adaptive fuzzy control. Based on the distance measurements and the initial position estimate, adaptive fuzzy control scheme is applied to solve the localization adjustment problem. The simulations show that the proposed approach provides adaptive flexibility and robust improvement in position estimation.

  5. Routing Protocols to Minimize the Number of Route Disconnections for Communication in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-09-01

    Broch , "DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad hoc Networks," in Ad hoc Networking, Chapter 5, C. E. Perkins, Eds. Addison...Project Report: 09/23/2008 to 09/22/2009 W911NF-08-2-0061 References [I] J. Broch , D. A. Maltz, D. B. Johnson, Y. C. Hu and J. Jetcheva, "A...and Mobile Computing, Vol. 2, pp. 723 - 726, Sept. 2005. [4] D. B. Johnson, D. A. Maltz and J. Broch , "DSR: The Dynamic Source Routing Protocol for

  6. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  7. Statistical properties of urban mobility from location-based travel networks

    NASA Astrophysics Data System (ADS)

    Tang, Jinjun; Zhang, Shen; Zhang, Wenhui; Liu, Fang; Zhang, Weibin; Wang, Yinhai

    2016-11-01

    This study explores urban mobility from a network-based perspective. The data samples used in study were collected from more than 1100 taxi drivers during a half year period in the city of Harbin in China. We extract trips from the original dataset and analyze operational efficiency. Then, by constructing travel networks based on occupied and vacant taxi trips, we calculate some statistical properties of the network such as degree, strength, edge weight, betweenness, clustering coefficient and network structure entropy. Analysis of such properties allows for a deep exploration of travel mobility. We also analyze the correlation between strength and betweenness to evaluate the importance of nodes in the network. Furthermore, two traditional community detection algorithms: the Louvain method and the visualization of similarities (VOS) method are applied to divide traffic zones in the mainland area of Harbin city. Two indices, the Rand index (RI) and the Fowkles-Mallows index (FMI) are adopted to evaluate recognition performance, which shows the similarity between administrative division and results from the algorithms. Finally, a dilatation index based on the weighted average distance among trips is applied to analyze the spatial structure of an urban city. Furthermore, hotspots are identified from local density of locations with different thresholds as determined by the Lorenz curve.

  8. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  9. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  10. Tracking control of two-wheel driven mobile robot using compound sine function neural networks

    NASA Astrophysics Data System (ADS)

    Ye, Jun

    2013-06-01

    The purpose of this paper is to propose a compound sine function neural network (NN) with continuous learning algorithm for the velocity and orientation angle tracking control of a mobile robot. Herein, two NN controllers embedded in the closed-loop control system are capable of on-line continuous learning and do not require any knowledge of the dynamics model. The neuron function of the hidden layer in the three-layer feed-forward network structure is on the basis of combining a sine function with a unipolar sigmoid function. In the NN algorithm, the weight values are only adjusted between the nodes in hidden layer and the output nodes, while the weight values between the input layer and the hidden layer are one, that is, constant, without the weight adjustment. The developed NN controllers have simple algorithm and fast learning convergence. Therefore, the proposed NN controllers can be suitable for the real-time tracking control of the mobile robots. The simulation results show that the proposed NN controller has better control performance in the tracking control of the mobile robot. The compound sine function NN provides a new way to solve tracking control problems for a mobile robot.

  11. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  12. Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks

    PubMed Central

    Yang, Jin; Liu, Fagui; Cao, Jianneng; Wang, Liangming

    2016-01-01

    Mobile sinks can achieve load-balancing and energy-consumption balancing across the wireless sensor networks (WSNs). However, the frequent change of the paths between source nodes and the sinks caused by sink mobility introduces significant overhead in terms of energy and packet delays. To enhance network performance of WSNs with mobile sinks (MWSNs), we present an efficient routing strategy, which is formulated as an optimization problem and employs the particle swarm optimization algorithm (PSO) to build the optimal routing paths. However, the conventional PSO is insufficient to solve discrete routing optimization problems. Therefore, a novel greedy discrete particle swarm optimization with memory (GMDPSO) is put forward to address this problem. In the GMDPSO, particle’s position and velocity of traditional PSO are redefined under discrete MWSNs scenario. Particle updating rule is also reconsidered based on the subnetwork topology of MWSNs. Besides, by improving the greedy forwarding routing, a greedy search strategy is designed to drive particles to find a better position quickly. Furthermore, searching history is memorized to accelerate convergence. Simulation results demonstrate that our new protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption. PMID:27428971

  13. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-06-01

    Slot IP Internet Protocol LAN Local Area Network MAC Medium Access Control MACAW Medium Access Protocol for Wireless LANs MANET Mobile Ad-hoc...Unforced state – It waits after entering the state until it is invoked by another process or an interrupt. It is in dark grey on this report, and red ... green in OPNET. A MAC process model is built for general initialisations of the MAC module, and to invoke the selected MAC protocol process model

  14. Simulation of satellite-supported packet radio networks in the laboratory - Modular experimental system simplifies the design of packet radio networks for land-mobile applications

    NASA Astrophysics Data System (ADS)

    Boettcher, Axel; Dippold, Michael; Jahn, Axel; Schaefer, Wolfgang

    1992-05-01

    A modular simulation system with hardware and software components is described which can be used for planning and testing land-mobile packet radio data networks. The system is shown to be simple, robust, and suitable for inner city environment.

  15. A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Khan, Jahangir; Hayder, Syed Irfan

    Mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves on a fly. In this paper we focus on the performance of the on-demand routing protocols such as DSR and AODV in ad-hoc networks. We have observed the performance change of each protocol through simulation with varying the data in intermediate nodes and to compare data throughput in each mobile modes of each protocol to analyze the packet fraction for application data. The objective of this work is to evaluate two routing protocols such as On-demand behavior, namely, Ad hoc Demand Distance vector (AODV) and Dynamic Source Routing (DSR), for wireless ad hoc networks based on performance of intermediate nodes for the delivery of data form source to destination and vice versa in order to compare the efficiency of throughput in the neighbors nodes. To overcome we have proposed OPNET simulator for performance comparison of hop to hop delivery of data packet in autonomous system.

  16. Online People Tagging: Social (Mobile) Network(ing) Services and Work-Based Learning

    ERIC Educational Resources Information Center

    Cook, John; Pachler, Norbert

    2012-01-01

    Social and mobile technologies offer users unprecedented opportunities for communicating, interacting, sharing, meaning-making, content and context generation. And, these affordances are in constant flux driven by a powerful interplay between technological innovation and emerging cultural practices. Significantly, also, they are starting to…

  17. UV index experimental values during the years 2000 and 2001 from the Spanish broadband UV-B radiometric network.

    PubMed

    Martínez-Lozano, José A; Marín, María J; Tena, Fernando; Utrillas, María P; Sánchez-Muniosguren, Luis; González-Frías, Carlos; Cuevas, Emilio; Redondas, Alberto; Lorente, Jerónimo; de Cabo, Xavier; Cachorro, Victoria; Vergaz, Ricardo; de Frutos, Angel; Díaz, Juan P; Expósito, Francisco J; de la Morena, Benito; Vilaplana, José M

    2002-08-01

    An analysis is made of experimental ultraviolet erythemal solar radiation data measured during the years 2000 and 2001 by the Spanish UV-B radiation evaluation and prediction network. This network consists of 16 Robertson-Berger type pyranometers for evaluating solar erythemal radiation and five Brewer spectroradiometers for evaluating the stratospheric ozone. On the basis of these data the Ultraviolet Index (UVI) was evaluated for the measuring stations that are located either in coastal regions or in the more densely populated regions inland on the Iberian Peninsula. It has been checked that in most cases the maximum irradiance values corresponded to solar noon, although there were exceptions that could be explained by cloudiness. The maximum experimental values of the UVI were around 9 during the summer, though frequently passing this value at the inland measurement stations. The annual accumulated dose of irradiation on a horizontal plane has also been studied, as well as the evolution through the year in units of energy, standard erythemal doses and minimum erythemal doses, according to different phototypes.

  18. Networked Guidance and Control for Mobile Multi-Agent Systems: A Multi-Terminal (Network) Information Theoretic Approach

    DTIC Science & Technology

    2014-11-04

    AFRL-OSR-VA-TR-2014-0311 Networked Guidance and Control for Mobile Multi-Agent Nuno Martins MARYLAND UNIV COLLEGE PARK Final Report 11/04/2014...sponsored  work  on  fundamental  aspects  of  the  following  research   themes :       • Analysis  and  design  of...Systems, Ph.D. Thesis, University of Maryland at College Park , 2013 [4] Aditya Mahajan, Nuno C. Martins, Michael C. Rotkowitz and Serdar Yuksel

  19. Mobilization

    DTIC Science & Technology

    1987-01-01

    istic and romantic emotionalism that typifies this genre. Longino, James C., et al. “A Study of World War Procurement and Industrial Mobilization...States. Harrisburg, PA: Military Service Publishing Co., 1941. CARL 355.22 J72b. Written in rough prose , this World War II era document explains the

  20. The design and networking of dynamic satellite constellations for global mobile communication systems

    NASA Technical Reports Server (NTRS)

    Cullen, Cionaith J.; Benedicto, Xavier; Tafazolli, Rahim; Evans, Barry

    1993-01-01

    Various design factors for mobile satellite systems, whose aim is to provide worldwide voice and data communications to users with hand-held terminals, are examined. Two network segments are identified - the ground segment (GS) and the space segment (SS) - and are seen to be highly dependent on each other. The overall architecture must therefore be adapted to both of these segments, rather than each being optimized according to its own criteria. Terrestrial networks are grouped and called the terrestrial segment (TS). In the SS, of fundamental importance is the constellation altitude. The effect of the altitude on decisions such as constellation design choice and on network aspects like call handover statistics are fundamental. Orbit resonance is introduced and referred to throughout. It is specifically examined for its useful properties relating to GS/SS connectivities.

  1. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    PubMed

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach.

  2. Earth Regimes Network Evolution Study (ERNESt): Introducing the Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Menrad, Bob

    2016-01-01

    Speaker and Presenter at the Lincoln Laboratory Communications Workshop on April 5, 2016 at the Massachusetts Institute of Technology Lincoln Laboratory in Lexington, MA. A visual presentation titled Earth Regimes Network Evolution Study (ERNESt).

  3. EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.; Marathe, A.

    2001-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is

  4. Mathematically gifted adolescents mobilize enhanced workspace configuration of theta cortical network during deductive reasoning.

    PubMed

    Zhang, L; Gan, J Q; Wang, H

    2015-03-19

    Previous studies have established the importance of the fronto-parietal brain network in the information processing of reasoning. At the level of cortical source analysis, this eletroencepalogram (EEG) study investigates the functional reorganization of the theta-band (4-8Hz) neurocognitive network of mathematically gifted adolescents during deductive reasoning. Depending on the dense increase of long-range phase synchronizations in the reasoning process, math-gifted adolescents show more significant adaptive reorganization and enhanced "workspace" configuration in the theta network as compared with average-ability control subjects. The salient areas are mainly located in the anterior cortical vertices of the fronto-parietal network. Further correlation analyses have shown that the enhanced workspace configuration with respect to the global topological metrics of the theta network in math-gifted subjects is correlated with the intensive frontal midline theta (fm theta) response that is related to strong neural effort for cognitive events. These results suggest that by investing more cognitive resources math-gifted adolescents temporally mobilize an enhanced task-related global neuronal workspace, which is manifested as a highly integrated fronto-parietal information processing network during the reasoning process.

  5. Secure and Cost-Effective Distributed Aggregation for Mobile Sensor Networks.

    PubMed

    Guo, Kehua; Zhang, Ping; Ma, Jianhua

    2016-04-23

    Secure data aggregation (SDA) schemes are widely used in distributed applications, such as mobile sensor networks, to reduce communication cost, prolong the network life cycle and provide security. However, most SDA are only suited for a single type of statistics (i.e., summation-based or comparison-based statistics) and are not applicable to obtaining multiple statistic results. Most SDA are also inefficient for dynamic networks. This paper presents multi-functional secure data aggregation (MFSDA), in which the mapping step and coding step are introduced to provide value-preserving and order-preserving and, later, to enable arbitrary statistics support in the same query. MFSDA is suited for dynamic networks because these active nodes can be counted directly from aggregation data. The proposed scheme is tolerant to many types of attacks. The network load of the proposed scheme is balanced, and no significant bottleneck exists. The MFSDA includes two versions: MFSDA-I and MFSDA-II. The first one can obtain accurate results, while the second one is a more generalized version that can significantly reduce network traffic at the expense of less accuracy loss.

  6. Bipartite Network Analysis of the Archaeal Virosphere: Evolutionary Connections between Viruses and Capsidless Mobile Elements.

    PubMed

    Iranzo, Jaime; Koonin, Eugene V; Prangishvili, David; Krupovic, Mart

    2016-12-15

    Archaea and particularly hyperthermophilic crenarchaea are hosts to many unusual viruses with diverse virion shapes and distinct gene compositions. As is typical of viruses in general, there are no universal genes in the archaeal virosphere. Therefore, to obtain a comprehensive picture of the evolutionary relationships between viruses, network analysis methods are more productive than traditional phylogenetic approaches. Here we present a comprehensive comparative analysis of genomes and proteomes from all currently known taxonomically classified and unclassified, cultivated and uncultivated archaeal viruses. We constructed a bipartite network of archaeal viruses that includes two classes of nodes, the genomes and gene families that connect them. Dissection of this network using formal community detection methods reveals strong modularity, with 10 distinct modules and 3 putative supermodules. However, compared to similar previously analyzed networks of eukaryotic and bacterial viruses, the archaeal virus network is sparsely connected. With the exception of the tailed viruses related to bacteriophages of the order Caudovirales and the families Turriviridae and Sphaerolipoviridae that are linked to a distinct supermodule of eukaryotic and bacterial viruses, there are few connector genes shared by different archaeal virus modules. In contrast, most of these modules include, in addition to viruses, capsidless mobile elements, emphasizing tight evolutionary connections between the two types of entities in archaea. The relative contributions of distinct evolutionary origins, in particular from nonviral elements, and insufficient sampling to the sparsity of the archaeal virus network remain to be determined by further exploration of the archaeal virosphere.

  7. Output power distributions of terminals in a 3G mobile communication network.

    PubMed

    Persson, Tomas; Törnevik, Christer; Larsson, Lars-Eric; Lovén, Jan

    2012-05-01

    The objective of this study was to examine the distribution of the output power of mobile phones and other terminals connected to a 3G network in Sweden. It is well known that 3G terminals can operate with very low output power, particularly for voice calls. Measurements of terminal output power were conducted in the Swedish TeliaSonera 3G network in November 2008 by recording network statistics. In the analysis, discrimination was made between rural, suburban, urban, and dedicated indoor networks. In addition, information about terminal output power was possible to collect separately for voice and data traffic. Information from six different Radio Network Controllers (RNCs) was collected during at least 1 week. In total, more than 800000 h of voice calls were collected and in addition to that a substantial amount of data traffic. The average terminal output power for 3G voice calls was below 1 mW for any environment including rural, urban, and dedicated indoor networks. This is <1% of the maximum available output power. For data applications the average output power was about 6-8 dB higher than for voice calls. For rural areas the output power was about 2 dB higher, on average, than in urban areas.

  8. Secure mobile agent for telemedicine based on P2P networks.

    PubMed

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-06-01

    Exploring intelligent mobile agent (MA) technology for assisting medical services or transmitting personal patient-health information in telemedicine applications has been widely investigated. Conversely, peer-to-peer (P2P) networking has become one of the most popular applications used in the Internet because of its benefits for easy-to-manage resources and because it balances workloads. Therefore, constructing an agent-based telemedicine platform based on P2P networking architecture is necessary. The main purpose of this paper is to construct a safe agent-based telemedicine that based on P2P networking architecture. Two themes are addressed in this paper: (a) the P2P network architecture for an agent-based telemedicine service, and (b) the security mechanisms for the proposed telemedicine networking architecture. When an MA contains patient information and migrates from one host to another through the Internet, it can be attacked by other software agents or agent platforms that can illegally access patient information. The proposed P2P network architecture is based on the JXTA protocol and provides two types of telemedicine service models: the predictable service model and unpredictable service model. This architecture employs a two-layer safety mechanism for MAs (i.e., time-limited black boxes and RSA undetachable signature technologies), to provide a secure solution for agent-based telemedicine services.

  9. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  10. Minimum expected delay-based routing protocol (MEDR) for Delay Tolerant Mobile Sensor Networks.

    PubMed

    Feng, Yong; Liu, Ming; Wang, Xiaomin; Gong, Haigang

    2010-01-01

    It is a challenging work to develop efficient routing protocols for Delay Tolerant Mobile Sensor Networks (DTMSNs), which have several unique characteristics such as sensor mobility, intermittent connectivity, energy limit, and delay tolerability. In this paper, we propose a new routing protocol called Minimum Expected Delay-based Routing (MEDR) tailored for DTMSNs. MEDR achieves a good routing performance by finding and using the connected paths formed dynamically by mobile sensors. In MEDR, each sensor maintains two important parameters: Minimum Expected Delay (MED) and its expiration time. According to MED, messages will be delivered to the sensor that has at least a connected path with their hosting nodes, and has the shortest expected delay to communication directly with the sink node. Because of the changing network topology, the path is fragile and volatile, so we use the expiration time of MED to indicate the valid time of the path, and avoid wrong transmissions. Simulation results show that the proposed MEDR achieves a higher message delivery ratio with lower transmission overhead and data delivery delay than other DTMSN routing approaches.

  11. Effects of glycerol on the molecular mobility and hydrogen bond network in starch matrix.

    PubMed

    Liang, Jun; Ludescher, Richard D

    2015-01-22

    The effects of glycerol on molecular mobility and hydrogen bonding network in an amorphous glassy starch matrix were studied using phosphorescence and IR spectroscopy. Amorphous potato starch films containing varying amounts of glycerol (0, 5, 10, 20 and 30 wt.%) were formulated by rapidly dehydrating aqueous potato starch gel (5%, w/v) with a corresponding content of glycerol; X-ray diffraction data confirm that the films contained negligible content of crystalline starch. Erythrosin B (Ery B) phosphorescence was used to monitor the molecular mobility of these matrices over the temperature range from 0 to 100°C. Analysis of Ery B emission peak frequency, band width and intensity decay provided information about thermally-activated modes of molecular mobility in the matrix. Dipolar relaxation around the triplet state of Ery B was enhanced by addition of glycerol and the extent of relaxation increased at low and intermediate but decreased at higher temperature. The glycerol content-dependent onset temperature for this transition was 70°C for pure starch and decreased to 40°C for a matrix with 30% glycerol. Measurements of the rate of non-radiative decay from the Ery B triplet state indicated that glycerol plasticized the starch matrix above ∼10 wt.% while acting as an antiplastizer to increase the matrix molecular mobility at lower content. These matrix properties were related to glycerol-dependent increases in hydrogen bond strength as measured by IR.

  12. Integrating a mobile health setup in a chronic disease management network.

    PubMed

    Ding, Hang; Ireland, Derek; Jayasena, Rajiv; Curmi, Jamie; Karunanithi, Mohan

    2013-01-01

    Supporting self management of chronic disease in collaboration with primary healthcare has been a national priority in order to mitigate the emerging disease burden on the already strained healthcare system. However, in practice, the uptake of self-management programs and compliance with clinical guidelines remain poor. Time constraints due to work commitments and lack of efficient monitoring tools have been the major barrier to the uptake and compliance. In this paper, we present a newly integrated mobile health system with a clinical chronic disease management network called cdmNet, which has already been validated to facilitate General Practitioners (GPs) to provide collaborative disease management services. The newly integrated solution takes advantage of the latest mobile web and wireless Bluetooth communication techniques to enable patients to record health data entries through ubiquitous mobile phones, and allows the data to be simultaneously shared by multidisciplinary care teams. This integration would enable patients to self-manage their chronic disease conditions in collaboration with GPs and hence, improve the uptake and compliance. Additionally, the proposed integration will provide a useful framework encouraging the translation of innovative mobile health technologies into highly regulated healthcare systems.

  13. Scalable and reconfigurable generation of flat optical comb for WDM-based next-generation broadband optical access networks

    NASA Astrophysics Data System (ADS)

    Chen, Chen; Zhang, Chongfu; Zhang, Wei; Jin, Wei; Qiu, Kun

    2014-06-01

    A tunable comb generator (TCG) by cascading a single phase modulator (PM) with two identical intensity modulators (IMs) is proposed for the scalable and reconfigurable generation of flat optical comb. Detailed theoretical analysis is performed to find out the optimized condition for flat optical comb generation using the proposed TCG and the scalability of the generated optical comb is also analyzed under the optimized condition. An experiment is conducted to verify the feasibility of the TCG and the experimental results agree well with the theoretical prediction. The reconfigurability and stability of the obtained optical comb are discussed as well in the experiment. After that, the obtained optical comb is utilized as the optical source for a wavelength-division multiplexed radio-over-fiber (WDM-RoF) system and a hybrid WDM orthogonal frequency-division multiple access passive optical network (WDM-OFDMA-PON). Two corresponding experimental demonstrations are presented to verify the feasibility of employing the obtained flat optical comb as the WDM optical source, respectively. In the WDM-RoF system, 17 WDM channels each carrying 16×5 Gb/s non-return-to-zero (NRZ) data have been up-converted to 10 GHz simultaneously. In the hybrid WDM-OFDMA-PON, 17-channel OFDM-WDM double-sideband (DSB) signal achieving 10.85 Gb/s traffic per channel is successfully transmitted for both wired baseband OFDM access and wireless 10 GHz OFDM access.

  14. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    PubMed Central

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  15. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    PubMed

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  16. The Importance of Networks in the Transnational Mobility of Higher Education Students: Attraction and Satisfaction of Foreign Mobility Students at a Public University

    ERIC Educational Resources Information Center

    Pedro, Eugénia; Franco, Mário

    2016-01-01

    Advancing the understanding of academic mobility becomes essential since this phenomenon is gaining prominence in the context of the internationalization of European higher education, with repercussions in economic terms for the host institution itself and its surrounding region. From a network theory perspective, this study intends to understand…

  17. 47 CFR 25.135 - Licensing provisions for earth station networks in the non-voice, non-geostationary mobile...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 2 2013-10-01 2013-10-01 false Licensing provisions for earth station networks... Applications and Licenses Earth Stations § 25.135 Licensing provisions for earth station networks in the non-voice, non-geostationary mobile-satellite service. (a) Each applicant for a blanket earth...

  18. 47 CFR 25.135 - Licensing provisions for earth station networks in the non-voice, non-geostationary mobile...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Licensing provisions for earth station networks... Applications and Licenses Earth Stations § 25.135 Licensing provisions for earth station networks in the non-voice, non-geostationary mobile-satellite service. (a) Each applicant for a blanket earth...

  19. 47 CFR 25.135 - Licensing provisions for earth station networks in the non-voice, non-geostationary Mobile...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Licensing provisions for earth station networks... Applications and Licenses Earth Stations § 25.135 Licensing provisions for earth station networks in the non-voice, non-geostationary Mobile-Satellite Service. (a) Each applicant for a blanket earth...

  20. Social Network Innovation in the Internet's Global Coffee Houses: Designing a Mobile Help Seeking Tool in Learning Layers

    ERIC Educational Resources Information Center

    Cook, John; Santos, Patricia

    2014-01-01

    In this paper, we argue that there is much that we can learn from the past as we explore the issues raised when designing innovative social media and mobile technologies for learning. Like the social networking that took place in coffee houses in the 1600s, the Internet-enabled social networks of today stand accused of being the so-called…

  1. Mobile social network services for families with children with developmental disabilities.

    PubMed

    Chou, Li-Der; Lai, Nien-Hwa; Chen, Yen-Wen; Chang, Yao-Jen; Yang, Jyun-Yan; Huang, Lien-Fu; Chiang, Wen-Ling; Chiu, Hung-Yi; Shin, Haw-Yun

    2011-07-01

    As Internet technologies evolve, their applications have changed various aspects of human life. Here, we attempt to examine their potential impact on services for families with developmentally delayed children. Our research is thus designed to utilize wireless mobile communication technologies, location services, and search technology in an effort to match families of specific needs with potential care providers. Based on the investigation conducted by our counselors, this paper describes a platform for smooth communication between professional communities and families with children with developmental disabilities (CDD). This research also looks into the impact of management of mobile social network services and training on the operation of these services. Interaction opportunities, care, and support to families with CDD are introduced.

  2. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  3. Anchor-free localization method for mobile targets in coal mine wireless sensor networks.

    PubMed

    Pei, Zhongmin; Deng, Zhidong; Xu, Shuo; Xu, Xiao

    2009-01-01

    Severe natural conditions and complex terrain make it difficult to apply precise localization in underground mines. In this paper, an anchor-free localization method for mobile targets is proposed based on non-metric multi-dimensional scaling (Multi-dimensional Scaling: MDS) and rank sequence. Firstly, a coal mine wireless sensor network is constructed in underground mines based on the ZigBee technology. Then a non-metric MDS algorithm is imported to estimate the reference nodes' location. Finally, an improved sequence-based localization algorithm is presented to complete precise localization for mobile targets. The proposed method is tested through simulations with 100 nodes, outdoor experiments with 15 ZigBee physical nodes, and the experiments in the mine gas explosion laboratory with 12 ZigBee nodes. Experimental results show that our method has better localization accuracy and is more robust in underground mines.

  4. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks

    PubMed Central

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination’s location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR. PMID:22315570

  5. A FD/DAMA network architecture for the first generation land mobile satellite services

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Wang, C.; Cheng, U.; Dessouky, K.; Rafferty, W.

    1989-01-01

    A frequency division/demand assigned multiple access (FD/DAMA) network architecture for the first-generation land mobile satellite services is presented. Rationales and technical approaches are described. In this architecture, each mobile subscriber must follow a channel access protocol to make a service request to the network management center before transmission for either open-end or closed-end services. Open-end service requests will be processed on a blocked call cleared basis, while closed-end requests will be processed on a first-come-first-served basis. Two channel access protocols are investigated, namely, a recently proposed multiple channel collision resolution scheme which provides a significantly higher useful throughput, and the traditional slotted Aloha scheme. The number of channels allocated for either open-end or closed-end services can be adaptively changed according to aggregated traffic requests. Both theoretical and simulation results are presented. Theoretical results have been verified by simulation on the JPL network testbed.

  6. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    PubMed

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.

  7. Integrated data lookup and replication scheme in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  8. Demonstration of UAV deployment and control of mobile wireless sensing networks for modal analysis of structures

    NASA Astrophysics Data System (ADS)

    Zhou, Hao; Hirose, Mitsuhito; Greenwood, William; Xiao, Yong; Lynch, Jerome; Zekkos, Dimitrios; Kamat, Vineet

    2016-04-01

    Unmanned aerial vehicles (UAVs) can serve as a powerful mobile sensing platform for assessing the health of civil infrastructure systems. To date, the majority of their uses have been dedicated to vision and laser-based spatial imaging using on-board cameras and LiDAR units, respectively. Comparatively less work has focused on integration of other sensing modalities relevant to structural monitoring applications. The overarching goal of this study is to explore the ability for UAVs to deploy a network of wireless sensors on structures for controlled vibration testing. The study develops a UAV platform with an integrated robotic gripper that can be used to install wireless sensors in structures, drop a heavy weight for the introduction of impact loads, and to uninstall wireless sensors for reinstallation elsewhere. A pose estimation algorithm is embedded in the UAV to estimate the location of the UAV during sensor placement and impact load introduction. The Martlet wireless sensor network architecture is integrated with the UAV to provide the UAV a mobile sensing capability. The UAV is programmed to command field deployed Martlets, aggregate and temporarily store data from the wireless sensor network, and to communicate data to a fixed base station on site. This study demonstrates the integrated UAV system using a simply supported beam in the lab with Martlet wireless sensors placed by the UAV and impact load testing performed. The study verifies the feasibility of the integrated UAV-wireless monitoring system architecture with accurate modal characteristics of the beam estimated by modal analysis.

  9. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks

    PubMed Central

    Beulah Jayakumari, R.; Jawahar Senthilkumar, V.

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  10. 78 FR 22198 - Connect America Fund; A National Broadband Plan for Our Future; Establishing Just and Reasonable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-15

    ... eligible telecommunications carriers relating to five-year build-out plans and broadband network testing... eligible telecommunications carriers (ETCs) relating to five-year build-out plans and broadband network... of broadband service build-out is reasonable over the five-year time period. B. Network...

  11. Online Variational Bayesian Filtering-Based Mobile Target Tracking in Wireless Sensor Networks

    PubMed Central

    Zhou, Bingpeng; Chen, Qingchun; Li, Tiffany Jing; Xiao, Pei

    2014-01-01

    The received signal strength (RSS)-based online tracking for a mobile node in wireless sensor networks (WSNs) is investigated in this paper. Firstly, a multi-layer dynamic Bayesian network (MDBN) is introduced to characterize the target mobility with either directional or undirected movement. In particular, it is proposed to employ the Wishart distribution to approximate the time-varying RSS measurement precision's randomness due to the target movement. It is shown that the proposed MDBN offers a more general analysis model via incorporating the underlying statistical information of both the target movement and observations, which can be utilized to improve the online tracking capability by exploiting the Bayesian statistics. Secondly, based on the MDBN model, a mean-field variational Bayesian filtering (VBF) algorithm is developed to realize the online tracking of a mobile target in the presence of nonlinear observations and time-varying RSS precision, wherein the traditional Bayesian filtering scheme cannot be directly employed. Thirdly, a joint optimization between the real-time velocity and its prior expectation is proposed to enable online velocity tracking in the proposed online tacking scheme. Finally, the associated Bayesian Cramer–Rao Lower Bound (BCRLB) analysis and numerical simulations are conducted. Our analysis unveils that, by exploiting the potential state information via the general MDBN model, the proposed VBF algorithm provides a promising solution to the online tracking of a mobile node in WSNs. In addition, it is shown that the final tracking accuracy linearly scales with its expectation when the RSS measurement precision is time-varying. PMID:25393784

  12. Application of neural networks to channel assignment for cellular CDMA networks with multiple services and mobile base stations

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    1996-03-01

    The use of artificial neural networks to the channel assignment problem for cellular code- division multiple access (CDMA) telecommunications systems is considered. CDMA takes advantage of voice activity and spatial isolation because its capacity is only interference limited, unlike time-division multiple access (TDMA) and frequency-division multiple access (FDMA) where capacities are bandwidth limited. Any reduction in interference in CDMA translates linearly into increased capacity. FDMA and TDMA use a frequency reuse pattern as a method to increase capacity, while CDMA reuses the same frequency for all cells and gains a reuse efficiency by means of orthogonal codes. The latter method can improve system capacity by factors of four to six over digital TDMA or FDMA. Cellular carriers are planning to provide multiple communication services using CDMA in the next generation cellular system infrastructure. The approach of this study is the use of neural network methods for automatic and local network control, based on traffic behavior in specific cell cites and demand history. The goal is to address certain problems associated with the management of mobile and personal communication services in a cellular radio communications environment. In planning a cellular radio network, the operator assigns channels to the radio cells so that the probability of the processed carrier-to-interference ratio, CII, exceeding a predefined value is sufficiently low. The RF propagation, determined from the topography and infrastructure in the operating area, is used in conjunction with the densities of expected communications traffic to formulate interference constraints. These constraints state which radio cells may use the same code (channel) or adjacent channels at a time. The traffic loading and the number of service grades can also be used to calculate the number of required channels (codes) for each cell. The general assignment problem is the task of assigning the required number

  13. Information spreading on mobile communication networks: A new model that incorporates human behaviors

    NASA Astrophysics Data System (ADS)

    Ren, Fei; Li, Sai-Ping; Liu, Chuang

    2017-03-01

    Recently, there is a growing interest in the modeling and simulation based on real social networks among researchers in multi-disciplines. Using an empirical social network constructed from the calling records of a Chinese mobile service provider, we here propose a new model to simulate the information spreading process. This model takes into account two important ingredients that exist in real human behaviors: information prevalence and preferential spreading. The fraction of informed nodes when the system reaches an asymptotically stable state is primarily determined by information prevalence, and the heterogeneity of link weights would slow down the information diffusion. Moreover, the sizes of blind clusters which consist of connected uninformed nodes show a power-law distribution, and these uninformed nodes correspond to a particular portion of nodes which are located at special positions in the network, namely at the edges of large clusters or inside the clusters connected through weak links. Since the simulations are performed on a real world network, the results should be useful in the understanding of the influences of social network structures and human behaviors on information propagation.

  14. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-06-01

    destination.  Wormhole attack: A group of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency...communication link called wormhole link, causing disruptions in normal traffic load and flow.  Black hole attack: A malicious node, the so called

  15. Social Learning Networks: Build Mobile Learning Networks Based on Collaborative Services

    ERIC Educational Resources Information Center

    Huang, Jeff J. S.; Yang, Stephen J. H.; Huang, Yueh-Min; Hsiao, Indy Y. T.

    2010-01-01

    Recently, the rising of Web 2.0 has made online community gradually become popular, like Facebook, blog, etc. As a result, the online knowledge sharing network formed by interpersonal interaction is now a major character of Web 2.0, and therefore, by this trend, we try to build up a collaborative service mechanism and further set up an analysis…

  16. Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks

    DTIC Science & Technology

    2010-08-19

    sensors is more prevalent than in an open field or underwater due to buildings, people, motor ve- hicles, and so on. We simulated the sensor network in an...roads arranged as a Manhattan -like grid (see Figure 6): pressure sensors, video sensors (cameras), and magnetic sensors. A large brown block represents

  17. Broadband optical equalizer using fault tolerant digital micromirrors.

    PubMed

    Riza, Nabeel; Mughal, M Junaid

    2003-06-30

    For the first time, the design and demonstration of a near continuous spectral processing mode broadband equalizer is described using the earlier proposed macro-pixel spatial approach for multiwavelength fiber-optic attenuation in combination with a high spectral resolution broadband transmissive volume Bragg grating. The demonstrated design features low loss and low polarization dependent loss with broadband operation. Such an analog mode spectral processor can impact optical applications ranging from test and instrumentation to dynamic alloptical networks.

  18. Cryogenic, low-noise high electron mobility transistor amplifiers for the Deep Space Network

    NASA Technical Reports Server (NTRS)

    Bautista, J. J.

    1993-01-01

    The rapid advances recently achieved by cryogenically cooled high electron mobility transistor (HEMT) low-noise amplifiers (LNA's) in the 1- to 10-GHz range are making them extremely competitive with maser amplifiers. In order to address future spacecraft navigation, telemetry, radar, and radio science needs, the Deep Space Network is investing both maser and HEMT amplifiers for its Ka-band (32-GHz) downlink capability. This article describes the current state cryogenic HEMT LNA development at Ka-band for the DSN. Noise performance results at S-band (2.3 GHz) and X-band (8.5 GHz) for HEMT's and masers are included for completeness.

  19. An Enhanced Multihoming Support Scheme with Proxy Mobile IPv6 for Convergent Networks

    NASA Astrophysics Data System (ADS)

    Li, Yang; Kum, Dong-Won; Kang, Ju-Eun; Cho, You-Ze

    This paper analyzes the limitations of the multihoming support in the Proxy Mobile IPv6 protocol, then proposes an enhanced multihoming support scheme based on a per-interface address configuration method. The proposed scheme can provide a more flexible multihoming support and also maintain application session continuity during a handoff between two interfaces by using IPv6 extension headers. Plus, flow distribution with filters is also used to realize the advantages of multihoming. Simulation results with the OPNET validate the proposed multihoming support scheme for convergent networks.

  20. Wireless sensor network for wide-area high-mobility applications

    NASA Astrophysics Data System (ADS)

    del Castillo, Ignacio; Esper-Chaín, Roberto; Tobajas, Félix; de Armas, Valentín.

    2013-05-01

    In recent years, IEEE 802.15.4-based Wireless Sensor Networks (WSN) have experienced significant growth, mainly motivated by the standard features, such as small size oriented devices, low power consumption nodes, wireless communication links, and sensing and data processing capabilities. In this paper, the development, implementation and deployment of a novel fully compatible IEEE 802.15.4-based WSN architecture for applications operating over extended geographic regions with high node mobility support, is described. In addition, a practical system implementation of the proposed WSN architecture is presented and described for experimental validation and characterization purposes.

  1. Cooperating Mobile GIS and Wireless Sensor Networks for Managing Transportation Infrastructures in Urban areas

    NASA Astrophysics Data System (ADS)

    Shad, R.; Abazari, N.; Alizadeh, A.; Choghooni, M.

    2013-10-01

    Time management is a major subject which, in order to optimize trip conditions, emphasizes on interpreting processes and classifying individual's information. In this paper, with the aim of providing an optimal system for urban commuting in proper time in Mashhad, each user using SMS and introducing some of his/her mental priorities to the system, will be able to select the best option depending on the timing of movement of the available public transport system. The present study adopts a newly developed method of time management which is evaluated for urban transportation considering dynamic conditions of a spatial database. For this purpose, regarding time management, processed data such as bus lines, taxi networks, and the subway system are combined in a spatial framework of a designed Mobile GIS based on a wireless network. So, multiple potential paths which end to a desirable destination.

  2. Rule-Based vs. Behavior-Based Self-Deployment for Mobile Wireless Sensor Networks

    PubMed Central

    Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco

    2016-01-01

    In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles. PMID:27399709

  3. An Improved Mobility-Based Control Protocol for Tolerating Clone Failures in Wireless Sensor Networks

    PubMed Central

    Zhou, Yuping; Xiong, Naixue; Tan, Mingxin; Huang, Rufeng; Kleonbet, Jon

    2016-01-01

    Nowadays, with the ubiquitous presence of the Internet of Things industry, the application of emerging sensor networks has become a focus of public attention. Unattended sensor nodes can be comprised and cloned to destroy the network topology. This paper proposes a novel distributed protocol and management technique for the detection of mobile replicas to tolerate node failures. In our scheme, sensors’ location claims are forwarded to obtain samples only when the corresponding witnesses meet. Meanwhile, sequential tests of statistical hypotheses are applied to further detect the cloned node by witnesses. The combination of randomized detection based on encountering and sequential tests drastically reduces the routing overhead and false positive/negative rate for detection. Theoretical analysis and simulation results show the detection efficiency and reasonable overhead of the proposed method. PMID:27886054

  4. Location-based social networking media for restaurant promotion and food review using mobile application

    NASA Astrophysics Data System (ADS)

    Luhur, H. S.; Widjaja, N. D.

    2014-03-01

    This paper is focusing on the development of a mobile application for searching restaurants and promotions with location based and social networking features. The main function of the application is to search restaurant information. Other functions are also available in this application such as add restaurant, add promotion, add photo, add food review, and other features including social networking features. The restaurant and promotion searching application will be developed under Android platform. Upon completion of this paper, heuristic evaluation and usability testing have been conducted. The result of both testing shows that the application is highly usable. Even though there are some usability problems discovered, the problems can be eliminated immediately by implementing the recommendations from the expert evaluators and the users as the testers of the application. Further improvement made to the application will ensure that the application can really be beneficial for the users of the application.

  5. Rule-Based vs. Behavior-Based Self-Deployment for Mobile Wireless Sensor Networks.

    PubMed

    Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco

    2016-07-07

    In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles.

  6. Evaluation of in-network adaptation of scalable high efficiency video coding (SHVC) in mobile environments

    NASA Astrophysics Data System (ADS)

    Nightingale, James; Wang, Qi; Grecos, Christos; Goma, Sergio

    2014-02-01

    High Efficiency Video Coding (HEVC), the latest video compression standard (also known as H.265), can deliver video streams of comparable quality to the current H.264 Advanced Video Coding (H.264/AVC) standard with a 50% reduction in bandwidth. Research into SHVC, the scalable extension to the HEVC standard, is still in its infancy. One important area for investigation is whether, given the greater compression ratio of HEVC (and SHVC), the loss of packets containing video content will have a greater impact on the quality of delivered video than is the case with H.264/AVC or its scalable extension H.264/SVC. In this work we empirically evaluate the layer-based, in-network adaptation of video streams encoded using SHVC in situations where dynamically changing bandwidths and datagram loss ratios require the real-time adaptation of video streams. Through the use of extensive experimentation, we establish a comprehensive set of benchmarks for SHVC-based highdefinition video streaming in loss prone network environments such as those commonly found in mobile networks. Among other results, we highlight that packet losses of only 1% can lead to a substantial reduction in PSNR of over 3dB and error propagation in over 130 pictures following the one in which the loss occurred. This work would be one of the earliest studies in this cutting-edge area that reports benchmark evaluation results for the effects of datagram loss on SHVC picture quality and offers empirical and analytical insights into SHVC adaptation to lossy, mobile networking conditions.

  7. A smartphone-based platform to test the performance of wireless mobile networks and preliminary findings

    NASA Astrophysics Data System (ADS)

    Geng, Xinli; Xu, Hao; Qin, Xiaowei

    2016-10-01

    During the last several years, the amount of wireless network traffic data increased fast and relative technologies evolved rapidly. In order to improve the performance and Quality of Experience (QoE) of wireless network services, the analysis of field network data and existing delivery mechanisms comes to be a promising research topic. In order to achieve this goal, a smartphone based platform named Monitor and Diagnosis of Mobile Applications (MDMA) was developed to collect field data. Based on this tool, the web browsing service of High Speed Downlink Packet Access (HSDPA) network was tested. The top 200 popular websites in China were selected and loaded on smartphone for thousands times automatically. Communication packets between the smartphone and the cell station were captured for various scenarios (e.g. residential area, urban roads, bus station etc.) in the selected city. A cross-layer database was constructed to support the off-line analysis. Based on the results of client-side experiments and analysis, the usability of proposed portable tool was verified. The preliminary findings and results for existing web browsing service were also presented.

  8. Migration to Broadband and Ubiquitous Environments by Using Fiber-Optic Technologies in Access/Home Areas

    NASA Astrophysics Data System (ADS)

    Oguchi, Kimio

    2016-03-01

    The recent dramatic advances in information and communication technologies have yielded new environments. However, adoption still differs area by area. To realize the future broadband environment that everyone can enjoy everywhere, several technical issues have to be resolved before network penetration becomes ubiquitous. One such key is the use of fiber optics for the home and mobile services. This article overviews initial observations drawn from numerical survey data gathered over the last decade in several countries/regions, and gives some example scenarios for network/service evolution. One result implies that implementing new/future services must consider the gross domestic product impact.

  9. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  10. An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    PubMed Central

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches. PMID:25574490

  11. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility

    PubMed Central

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-01

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination’s home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination’s home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609

  12. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-01

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency. PMID:26840311

  13. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  14. SOMM: A new service oriented middleware for generic wireless multimedia sensor networks based on code mobility.

    PubMed

    Faghih, Mohammad Mehdi; Moghaddam, Mohsen Ebrahimi

    2011-01-01

    Although much research in the area of Wireless Multimedia Sensor Networks (WMSNs) has been done in recent years, the programming of sensor nodes is still time-consuming and tedious. It requires expertise in low-level programming, mainly because of the use of resource constrained hardware and also the low level API provided by current operating systems. The code of the resulting systems has typically no clear separation between application and system logic. This minimizes the possibility of reusing code and often leads to the necessity of major changes when the underlying platform is changed. In this paper, we present a service oriented middleware named SOMM to support application development for WMSNs. The main goal of SOMM is to enable the development of modifiable and scalable WMSN applications. A network which uses the SOMM is capable of providing multiple services to multiple clients at the same time with the specified Quality of Service (QoS). SOMM uses a virtual machine with the ability to support mobile agents. Services in SOMM are provided by mobile agents and SOMM also provides a t space on each node which agents can use to communicate with each other.

  15. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  16. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    PubMed Central

    Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Duca, Angelica Lo; Munafò, Andrea

    2012-01-01

    Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011. PMID:22438748

  17. An adaptive handover prediction scheme for seamless mobility based wireless networks.

    PubMed

    Sadiq, Ali Safa; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  18. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  19. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  20. Secure cooperation of autonomous mobile sensors using an underwater acoustic network.

    PubMed

    Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Lo Duca, Angelica; Munafò, Andrea

    2012-01-01

    Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles-AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  1. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.

    PubMed

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-18

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination's home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination's home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays.

  2. Real-time video streaming using H.264 scalable video coding (SVC) in multihomed mobile networks: a testbed approach

    NASA Astrophysics Data System (ADS)

    Nightingale, James; Wang, Qi; Grecos, Christos

    2011-03-01

    Users of the next generation wireless paradigm known as multihomed mobile networks expect satisfactory quality of service (QoS) when accessing streamed multimedia content. The recent H.264 Scalable Video Coding (SVC) extension to the Advanced Video Coding standard (AVC), offers the facility to adapt real-time video streams in response to the dynamic conditions of multiple network paths encountered in multihomed wireless mobile networks. Nevertheless, preexisting streaming algorithms were mainly proposed for AVC delivery over multipath wired networks and were evaluated by software simulation. This paper introduces a practical, hardware-based testbed upon which we implement and evaluate real-time H.264 SVC streaming algorithms in a realistic multihomed wireless mobile networks environment. We propose an optimised streaming algorithm with multi-fold technical contributions. Firstly, we extended the AVC packet prioritisation schemes to reflect the three-dimensional granularity of SVC. Secondly, we designed a mechanism for evaluating the effects of different streamer 'read ahead window' sizes on real-time performance. Thirdly, we took account of the previously unconsidered path switching and mobile networks tunnelling overheads encountered in real-world deployments. Finally, we implemented a path condition monitoring and reporting scheme to facilitate the intelligent path switching. The proposed system has been experimentally shown to offer a significant improvement in PSNR of the received stream compared with representative existing algorithms.

  3. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  4. Rich do not rise early: spatio-temporal patterns in the mobility networks of different socio-economic classes

    NASA Astrophysics Data System (ADS)

    Lotero, Laura; Hurtado, Rafael G.; Floría, Luis Mario; Gómez-Gardeñes, Jesús

    2016-10-01

    We analyse the urban mobility in the cities of Medellín and Manizales (Colombia). Each city is represented by six mobility networks, each one encoding the origin-destination trips performed by a subset of the population corresponding to a particular socio-economic status. The nodes of each network are the different urban locations whereas links account for the existence of a trip between two different areas of the city. We study the main structural properties of these mobility networks by focusing on their spatio-temporal patterns. Our goal is to relate these patterns with the partition into six socio-economic compartments of these two societies. Our results show that spatial and temporal patterns vary across these socio-economic groups. In particular, the two datasets show that as wealth increases the early-morning activity is delayed, the midday peak becomes smoother and the spatial distribution of trips becomes more localized.

  5. Rich do not rise early: spatio-temporal patterns in the mobility networks of different socio-economic classes.

    PubMed

    Lotero, Laura; Hurtado, Rafael G; Floría, Luis Mario; Gómez-Gardeñes, Jesús

    2016-10-01

    We analyse the urban mobility in the cities of Medellín and Manizales (Colombia). Each city is represented by six mobility networks, each one encoding the origin-destination trips performed by a subset of the population corresponding to a particular socio-economic status. The nodes of each network are the different urban locations whereas links account for the existence of a trip between two different areas of the city. We study the main structural properties of these mobility networks by focusing on their spatio-temporal patterns. Our goal is to relate these patterns with the partition into six socio-economic compartments of these two societies. Our results show that spatial and temporal patterns vary across these socio-economic groups. In particular, the two datasets show that as wealth increases the early-morning activity is delayed, the midday peak becomes smoother and the spatial distribution of trips becomes more localized.

  6. Rich do not rise early: spatio-temporal patterns in the mobility networks of different socio-economic classes

    PubMed Central

    Hurtado, Rafael G.; Floría, Luis Mario

    2016-01-01

    We analyse the urban mobility in the cities of Medellín and Manizales (Colombia). Each city is represented by six mobility networks, each one encoding the origin-destination trips performed by a subset of the population corresponding to a particular socio-economic status. The nodes of each network are the different urban locations whereas links account for the existence of a trip between two different areas of the city. We study the main structural properties of these mobility networks by focusing on their spatio-temporal patterns. Our goal is to relate these patterns with the partition into six socio-economic compartments of these two societies. Our results show that spatial and temporal patterns vary across these socio-economic groups. In particular, the two datasets show that as wealth increases the early-morning activity is delayed, the midday peak becomes smoother and the spatial distribution of trips becomes more localized. PMID:27853531

  7. High charge mobility in two-dimensional percolative networks of PbSe quantum dots connected by atomic bonds

    PubMed Central

    Evers, Wiel H.; Schins, Juleon M.; Aerts, Michiel; Kulkarni, Aditya; Capiod, Pierre; Berthe, Maxime; Grandidier, Bruno; Delerue, Christophe; van der Zant, Herre S. J.; van Overbeek, Carlo; Peters, Joep L.; Vanmaekelbergh, Daniel; Siebbeles, Laurens D. A.

    2015-01-01

    Two-dimensional networks of quantum dots connected by atomic bonds have an electronic structure that is distinct from that of arrays of quantum dots coupled by ligand molecules. We prepared atomically coherent two-dimensional percolative networks of PbSe quantum dots connected via atomic bonds. Here, we show that photoexcitation leads to generation of free charges that eventually decay via trapping. The charge mobility probed with an AC electric field increases with frequency from 150±15 cm2 V−1 s−1 at 0.2 terahertz to 260±15 cm2 V−1 s−1 at 0.6 terahertz. Gated four-probe measurements yield a DC electron mobility of 13±2 cm2 V−1 s−1. The terahertz mobilities are much higher than for arrays of quantum dots coupled via surface ligands and are similar to the highest DC mobilities reported for PbSe nanowires. The terahertz mobility increases only slightly with temperature in the range of 15–290 K. The extent of straight segments in the two-dimensional percolative networks limits the mobility, rather than charge scattering by phonons. PMID:26400049

  8. Broadband Faraday isolator.

    PubMed

    Berent, Michał; Rangelov, Andon A; Vitanov, Nikolay V

    2013-01-01

    Driving on an analogy with the technique of composite pulses in quantum physics, we theoretically propose a broadband Faraday rotator and thus a broadband optical isolator, which is composed of sequences of ordinary Faraday rotators and achromatic quarter-wave plates rotated at the predetermined angles.

  9. Broadband light-emitting diode

    DOEpatents

    Fritz, I.J.; Klem, J.F.; Hafich, M.J.

    1998-07-14

    A broadband light-emitting diode is disclosed. The broadband light-emitting diode (LED) comprises a plurality of III-V compound semiconductor layers grown on a semiconductor substrate, with the semiconductor layers including a pair of cladding layers sandwiched about a strained-quantum-well active region having a plurality of different energy bandgaps for generating light in a wavelength range of about 1.3--2 {micro}m. In one embodiment of the present invention, the active region may comprise a first-grown quantum-well layer and a last-grown quantum-well layer that are oppositely strained; whereas in another embodiment of the invention, the active region is formed from a short-period superlattice structure (i.e. a pseudo alloy) comprising alternating thin layers of InGaAs and InGaAlAs. The use a short-period superlattice structure for the active region allows different layers within the active region to be simply and accurately grown by repetitively opening and closing one or more shutters in an MBE growth apparatus to repetitively switch between different growth states therein. The broadband LED may be formed as either a surface-emitting LED or as an edge-emitting LED for use in applications such as chemical sensing, fiber optic gyroscopes, wavelength-divisionmultiplexed (WDM) fiber-optic data links, and WDM fiber-optic sensor networks for automobiles and aircraft. 10 figs.

  10. Broadband light-emitting diode

    DOEpatents

    Fritz, Ian J.; Klem, John F.; Hafich, Michael J.

    1998-01-01

    A broadband light-emitting diode. The broadband light-emitting diode (LED) comprises a plurality of III-V compound semiconductor layers grown on a semiconductor substrate, with the semiconductor layers including a pair of cladding layers sandwiched about a strained-quantum-well active region having a plurality of different energy bandgaps for generating light in a wavelength range of about 1.3-2 .mu.m. In one embodiment of the present invention, the active region may comprise a first-grown quantum-well layer and a last-grown quantum-well layer that are oppositely strained; whereas in another embodiment of the invention, the active region is formed from a short-period superlattice structure (i.e. a pseudo alloy) comprising alternating thin layers of InGaAs and InGaAlAs. The use a short-period superlattice structure for the active region allows different layers within the active region to be simply and accurately grown by repetitively opening and closing one or more shutters in an MBE growth apparatus to repetitively switch between different growth states therein. The broadband LED may be formed as either a surface-emitting LED or as an edge-emitting LED for use in applications such as chemical sensing, fiber optic gyroscopes, wavelength-division-multiplexed (WDM) fiber-optic data links, and WDM fiber-optic sensor networks for automobiles and aircraft.

  11. Robust tracking control of a unicycle-type wheeled mobile manipulator using a hybrid sliding mode fuzzy neural network

    NASA Astrophysics Data System (ADS)

    Cheng, Meng-Bi; Su, Wu-Chung; Tsai, Ching-Chih

    2012-03-01

    This article presents a robust tracking controller for an uncertain mobile manipulator system. A rigid robotic arm is mounted on a wheeled mobile platform whose motion is subject to nonholonomic constraints. The sliding mode control (SMC) method is associated with the fuzzy neural network (FNN) to constitute a robust control scheme to cope with three types of system uncertainties; namely, external disturbances, modelling errors, and strong couplings in between the mobile platform and the onboard arm subsystems. All parameter adjustment rules for the proposed controller are derived from the Lyapunov theory such that the tracking error dynamics and the FNN weighting updates are ensured to be stable with uniform ultimate boundedness (UUB).

  12. Broadband Optical Access Technologies to Converge towards a Broadband Society in Europe

    NASA Astrophysics Data System (ADS)

    Coudreuse, Jean-Pierre; Pautonnier, Sophie; Lavillonnière, Eric; Didierjean, Sylvain; Hilt, Benoît; Kida, Toshimichi; Oshima, Kazuyoshi

    This paper provides insights on the status of broadband optical access market and technologies in Europe and on the expected trends for the next generation optical access networks. The final target for most operators, cities or any other player is of course FTTH (Fibre To The Home) deployment although we can expect intermediate steps with copper or wireless technologies. Among the two candidate architectures for FTTH, PON (Passive Optical Network) is by far the most attractive and cost effective solution. We also demonstrate that Ethernet based optical access network is very adequate to all-IP networks without any incidence on the level of quality of service. Finally, we provide feedback from a FTTH pilot network in Colmar (France) based on Gigabit Ethernet PON technology. The interest of this pilot lies on the level of functionality required for broadband optical access networks but also on the development of new home network configurations.

  13. The influence of molecular mobility on the properties of networks of gold nanoparticles and organic ligands

    PubMed Central

    Kamalakar, M Venkata; Prendergast, Úna; Kübel, Christian; Lemma, Tibebe; Dayen, Jean-François

    2014-01-01

    Summary We prepare and investigate two-dimensional (2D) single-layer arrays and multilayered networks of gold nanoparticles derivatized with conjugated hetero-aromatic molecules, i.e., S-(4-{[2,6-bipyrazol-1-yl)pyrid-4-yl]ethynyl}phenyl)thiolate (herein S-BPP), as capping ligands. These structures are fabricated by a combination of self-assembly and microcontact printing techniques, and are characterized by electron microscopy, UV–visible spectroscopy and Raman spectroscopy. Selective binding of the S-BPP molecules to the gold nanoparticles through Au–S bonds is found, with no evidence for the formation of N–Au bonds between the pyridine or pyrazole groups of BPP and the gold surface. Subtle, but significant shifts with temperature of specific Raman S-BPP modes are also observed. We attribute these to dynamic changes in the orientation and/or increased mobility of the molecules on the gold nanoparticle facets. As for their conductance, the temperature-dependence for S-BPP networks differs significantly from standard alkanethiol-capped networks, especially above 220 K. Relating the latter two observations, we propose that dynamic changes in the molecular layers effectively lower the molecular tunnel barrier for BPP-based arrays at higher temperatures. PMID:25383278

  14. Leveraging socially networked mobile ICT platforms for the last-mile delivery problem.

    PubMed

    Suh, Kyo; Smith, Timothy; Linhoff, Michelle

    2012-09-04

    Increasing numbers of people are managing their social networks on mobile information and communication technology (ICT) platforms. This study materializes these social relationships by leveraging spatial and networked information for sharing excess capacity to reduce the environmental impacts associated with "last-mile" package delivery systems from online purchases, particularly in low population density settings. Alternative package pickup location systems (PLS), such as a kiosk on a public transit platform or in a grocery store, have been suggested as effective strategies for reducing package travel miles and greenhouse gas emissions, compared to current door-to-door delivery models (CDS). However, our results suggest that a pickup location delivery system operating in a suburban setting may actually increase travel miles and emissions. Only once a social network is employed to assist in package pickup (SPLS) are significant reductions in the last-mile delivery distance and carbon emissions observed across both urban and suburban settings. Implications for logistics management's decades-long focus on improving efficiencies of dedicated distribution systems through specialization, as well as for public policy targeting carbon emissions of the transport sector are discussed.

  15. Cross-border mobility and social networks: Laotians seeking medical treatment along the Thai border.

    PubMed

    Bochaton, Audrey

    2015-01-01

    Drawing upon research conducted on cross-border patients living in Laos and seeking care in Thailand, this paper examines the important role played by social networks in patients' decision-making and on the itineraries they choose to seek treatment on the Thai side of the border. Due to the vastly contrasting situations between the two countries in terms of healthcare supply, and considering Laotians' increasing demand for high quality healthcare, a number of them have managed to satisfy their needs by combining cross-border treatment with the use of the healthcare facilities provided by their own country. This study consisted first of household surveys conducted in five border areas (2006-2007) in Laos in order to quantify and map out cross-border healthcare-related travel patterns. Afterwards, interviews were conducted with cross-border patients (55), Laotian and Thai medical doctors (6), Thai social workers (5), and officials working in public institutions (12). While socioeconomic and spatial factors partly explain cross-border mobility, patients' social networks significantly influence treatment itineraries throughout the decision-making process, including logistical and financial considerations. The social networks existing at different geographical levels (neighbourhood, regional and global) are therefore a powerful analytical tool not only for understanding the emergence of these cross-border movements but also for justifying them in an authoritarian political environment such as Lao PDR's.

  16. Power prediction in mobile communication systems using an optimal neural-network structure.

    PubMed

    Gao, X M; Gao, X Z; Tanskanen, J A; Ovaska, S J

    1997-01-01

    Presents a novel neural-network-based predictor for received power level prediction in direct sequence code division multiple access (DS/CDMA) systems. The predictor consists of an adaptive linear element (Adaline) followed by a multilayer perceptron (MLP). An important but difficult problem in designing such a cascade predictor is to determine the complexity of the networks. We solve this problem by using the predictive minimum description length (PMDL) principle to select the optimal numbers of input and hidden nodes. This approach results in a predictor with both good noise attenuation and excellent generalization capability. The optimized neural networks are used for predictive filtering of very noisy Rayleigh fading signals with 1.8 GHz carrier frequency. Our results show that the optimal neural predictor can provide smoothed in-phase and quadrature signals with signal-to-noise ratio (SNR) gains of about 12 and 7 dB at the urban mobile speeds of 5 and 50 km/h, respectively. The corresponding power signal SNR gains are about 11 and 5 dB. Therefore, the neural predictor is well suitable for power control applications where ldquodelaylessrdquo noise attenuation and efficient reduction of fast fading are required.

  17. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    PubMed

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  18. A mobile sensor network to map carbon dioxide emissions in urban environments

    NASA Astrophysics Data System (ADS)

    Lee, Joseph K.; Christen, Andreas; Ketler, Rick; Nesic, Zoran

    2017-03-01

    A method for directly measuring carbon dioxide (CO2) emissions using a mobile sensor network in cities at fine spatial resolution was developed and tested. First, a compact, mobile system was built using an infrared gas analyzer combined with open-source hardware to control, georeference, and log measurements of CO2 mixing ratios on vehicles (car, bicycles). Second, two measurement campaigns, one in summer and one in winter (heating season) were carried out. Five mobile sensors were deployed within a 1 × 12. 7 km transect across the city of Vancouver, BC, Canada. The sensors were operated for 3.5 h on pre-defined routes to map CO2 mixing ratios at street level, which were then averaged to 100 × 100 m grid cells. The averaged CO2 mixing ratios of all grids in the study area were 417.9 ppm in summer and 442.5 ppm in winter. In both campaigns, mixing ratios were highest in the grid cells of the downtown core and along arterial roads and lowest in parks and well vegetated residential areas. Third, an aerodynamic resistance approach to calculating emissions was used to derive CO2 emissions from the gridded CO2 mixing ratio measurements in conjunction with mixing ratios and fluxes collected from a 28 m tall eddy-covariance tower located within the study area. These measured emissions showed a range of -12 to 226 CO2 ha-1 h-1 in summer and of -14 to 163 kg CO2 ha-1 h-1 in winter, with an average of 35.1 kg CO2 ha-1 h-1 (summer) and 25.9 kg CO2 ha-1 h-1 (winter). Fourth, an independent emissions inventory was developed for the study area using buildings energy simulations from a previous study and routinely available traffic counts. The emissions inventory for the same area averaged to 22.06 kg CO2 ha-1 h-1 (summer) and 28.76 kg CO2 ha-1 h-1 (winter) and was used to compare against the measured emissions from the mobile sensor network. The comparison on a grid-by-grid basis showed linearity between CO2 mixing ratios and the emissions inventory (R2 = 0. 53 in summer and R

  19. Learning from adaptive neural network output feedback control of a unicycle-type mobile robot.

    PubMed

    Zeng, Wei; Wang, Qinghui; Liu, Fenglin; Wang, Ying

    2016-03-01

    This paper studies learning from adaptive neural network (NN) output feedback control of nonholonomic unicycle-type mobile robots. The major difficulties are caused by the unknown robot system dynamics and the unmeasurable states. To overcome these difficulties, a new adaptive control scheme is proposed including designing a new adaptive NN output feedback controller and two high-gain observers. It is shown that the stability of the closed-loop robot system and the convergence of tracking errors are guaranteed. The unknown robot system dynamics can be approximated by radial basis function NNs. When repeating same or similar control tasks, the learned knowledge can be recalled and reused to achieve guaranteed stability and better control performance, thereby avoiding the tremendous repeated training process of NNs.

  20. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.