2010-09-01
secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless
DAWN: Dynamic Ad-hoc Wireless Network
2016-06-19
DAWN: Dynamic Ad-hoc Wireless Network The DAWN (Dynamic Ad-hoc Wireless Networks) project is developing a general theory of complex and dynamic... wireless communication networks. To accomplish this, DAWN adopts a very different approach than those followed in the past and summarized above. DAWN... wireless communication networks. The members of DAWN investigated difference aspects of wireless mobile ad hoc networks (MANET). The views, opinions and/or
Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Xiang, Ma
As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.
ARO PECASE: Information Assurance for Energy-Constrained Wireless Sensor Networks
2011-12-21
Distribution, 18th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), September 2007. 2. 2010 IEEE...received the following awards: Student Best Paper Award at the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC...Localization in Wireless Ad Hoc Networks – Many current and future appli- cations of mobile ad hoc networks, including disaster response and event
Analysis of Pervasive Mobile Ad Hoc Routing Protocols
NASA Astrophysics Data System (ADS)
Qadri, Nadia N.; Liotta, Antonio
Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.
Multistage Security Mechanism For Hybrid, Large-Scale Wireless Sensor Networks
2007-06-01
sensor network . Building on research in the areas of the wireless sensor networks (WSN) and the mobile ad hoc networks (MANET), this thesis proposes an...A wide area network consisting of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale mobile wireless
Performance Evaluation of Hyperbolic Position Location Technique in Cellular Wireless Networks
2002-03-13
number of applications called location - based services which can be defined as value added services that utilize the knowledge of the mobile user’s... Location based services “4-1-1”, location specific information such as local weather, mobile yellow pages, etc. and • Mobile e-commerce, wireless
A Survey on Trust Management for Mobile Ad Hoc Networks
2011-11-01
expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal
Capacity Limit, Link Scheduling and Power Control in Wireless Networks
ERIC Educational Resources Information Center
Zhou, Shan
2013-01-01
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
A Survey on Trust Management for Mobile Ad Hoc Networks
2010-07-01
betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks
Adaptive Flow Control for Enabling Quality of Service in Tactical Ad Hoc Wireless Networks
2010-12-01
environment in wireless networks , we use sensors in the network routers to detect and respond to congestion. We use backpressure techniques... wireless mesh network . In the current approach, we used OLSR as the routing scheme. However, B.A.T.M.A.N. offers the significant advantage of being based...Control and QoS Routing in Multi-Channel Wireless Mesh Networks ,” 68-77. ACM International Symposium on Mobile Ad Hoc Networking &
The effects of malicious nodes on performance of mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher
2006-05-01
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.
NASA Astrophysics Data System (ADS)
Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit
2008-12-01
Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.
World Without Wires: Is Your District Ready to Go Wireless?
ERIC Educational Resources Information Center
Villano, Matt
2005-01-01
In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…
2016-04-05
applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group
An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks
Penumalli, Chakradhar; Palanichamy, Yogesh
2015-01-01
A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627
Realizing Outdoor Independent Learning with a Butterfly-Watching Mobile Learning System
ERIC Educational Resources Information Center
Chen, Yuh-Shyan; Kao, Tai-Chien; Sheu, Jang-Ping
2005-01-01
In this article, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching learning system was designed in a wireless mobile ad-hoc learning environment. This is first result to provide a cognitive tool with supporting the independent…
2014-03-01
38 2. Mobile Ad Hoc Networks ..................................................................39 3. Wireless Ad Hoc Sensor Networks...59 Figure 32. RENEWS with WiMAX and Wave Relay AP at C-IED Site.............................59 Figure 33. RENEWS Wind Turbine and Solar Panels at Hat...worldwide interoperability for microwave access WSN wireless sensor network xv ACKNOWLEDGMENTS We would like to express our sincerest gratitude
Cross Layered Multi-Meshed Tree Scheme for Cognitive Networks
2011-06-01
Meshed Tree Routing protocol wireless ad hoc networks ,” Second IEEE International Workshop on Enabling Technologies and Standards for Wireless Mesh ...and Sensor Networks , 2004 43. Chen G.; Stojmenovic I., “Clustering and routing in mobile wireless networks ,” Technical Report TR-99-05, SITE, June...Cross-layer optimization, intra-cluster routing , packet forwarding, inter-cluster routing , mesh network communications,
Mobile access to the Internet: from personal bubble to satellites
NASA Astrophysics Data System (ADS)
Gerla, Mario
2001-10-01
Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.
Self-Organized Link State Aware Routing for Multiple Mobile Agents in Wireless Network
NASA Astrophysics Data System (ADS)
Oda, Akihiro; Nishi, Hiroaki
Recently, the importance of data sharing structures in autonomous distributed networks has been increasing. A wireless sensor network is used for managing distributed data. This type of distributed network requires effective information exchanging methods for data sharing. To reduce the traffic of broadcasted messages, reduction of the amount of redundant information is indispensable. In order to reduce packet loss in mobile ad-hoc networks, QoS-sensitive routing algorithm have been frequently discussed. The topology of a wireless network is likely to change frequently according to the movement of mobile nodes, radio disturbance, or fading due to the continuous changes in the environment. Therefore, a packet routing algorithm should guarantee QoS by using some quality indicators of the wireless network. In this paper, a novel information exchanging algorithm developed using a hash function and a Boolean operation is proposed. This algorithm achieves efficient information exchanges by reducing the overhead of broadcasting messages, and it can guarantee QoS in a wireless network environment. It can be applied to a routing algorithm in a mobile ad-hoc network. In the proposed routing algorithm, a routing table is constructed by using the received signal strength indicator (RSSI), and the neighborhood information is periodically broadcasted depending on this table. The proposed hash-based routing entry management by using an extended MAC address can eliminate the overhead of message flooding. An analysis of the collision of hash values contributes to the determination of the length of the hash values, which is minimally required. Based on the verification of a mathematical theory, an optimum hash function for determining the length of hash values can be given. Simulations are carried out to evaluate the effectiveness of the proposed algorithm and to validate the theory in a general wireless network routing algorithm.
2016-03-01
Infrastructure to Support Mobile Devices (Takai, 2012, p. 2). The objectives needed in order to meet this goal are to: evolve spectrum management, expand... infrastructure to support wireless capabilities, and establish a mobile device security architecture (Takai, 2012, p. 2). By expanding infrastructure to...often used on Mobile Ad-Hoc Networks (MANETs). MANETS are infrastructure -less networks that include, but are not limited to, mobile devices. These
Survey on Monitoring and Quality Controlling of the Mobile Biosignal Delivery.
Pawar, Pravin A; Edla, Damodar R; Edoh, Thierry; Shinde, Vijay; van Beijnum, Bert-Jan
2017-10-31
A Mobile Patient Monitoring System (MPMS) acquires patient's biosignals and transmits them using wireless network connection to the decision-making module or healthcare professional for the assessment of patient's condition. A variety of wireless network technologies such as wireless personal area networks (e.g., Bluetooth), mobile ad-hoc networks (MANET), and infrastructure-based networks (e.g., WLAN and cellular networks) are in practice for biosignals delivery. The wireless network quality-of-service (QoS) requirements of biosignals delivery are mainly specified in terms of required bandwidth, acceptable delay, and tolerable error rate. An important research challenge in the MPMS is how to satisfy QoS requirements of biosignals delivery in the environment characterized by patient mobility, deployment of multiple wireless network technologies, and variable QoS characteristics of the wireless networks. QoS requirements are mainly application specific, while available QoS is largely dependent on QoS provided by wireless network in use. QoS provisioning refers to providing support for improving QoS experience of networked applications. In resource poor conditions, application adaptation may also be required to make maximum use of available wireless network QoS. This survey paper presents a survey of recent developments in the area of QoS provisioning for MPMS. In particular, our contributions are as follows: (1) overview of wireless networks and network QoS requirements of biosignals delivery; (2) survey of wireless networks' QoS performance evaluation for the transmission of biosignals; and (3) survey of QoS provisioning mechanisms for biosignals delivery in MPMS. We also propose integrating end-to-end QoS monitoring and QoS provisioning strategies in a mobile patient monitoring system infrastructure to support optimal delivery of biosignals to the healthcare professionals.
High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks
2013-08-26
MIMO zero-forcing receiver in the presence of channel estimation error,” IEEE Transactions on Wireless Communications , vol. 6 , no. 3, pp. 805–810, Mar...Robert W. Heath, Nachiappan Valliappan. Antenna Subset Modulation for Secure Millimeter-Wave Wireless Communication , IEEE Transactions on...in MIMO Interference Alignment Networks, IEEE Transactions on Wireless Communications , (02 2012): 0. doi: 10.1109/TWC.2011.120511.111088 TOTAL: 2
Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia
NASA Astrophysics Data System (ADS)
Hortos, William S.
2001-03-01
The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two agents on a host station sharing a common goal can be merged or married to compose a new agent. Application of the two-layer set of algorithms for mobile agent evolution, performed in a distributed processing environment, is made to the QoS management functions of the IP multimedia IM sub-network of the third generation 3G Wideband Code-division Multiple Access W-CDMA wireless network.
A Context-Aware Paradigm for Information Discovery and Dissemination in Mobile Environments
ERIC Educational Resources Information Center
Lundquist, Doug
2011-01-01
The increasing power and ubiquity of mobile wireless devices is enabling real-time information delivery for many diverse applications. A crucial question is how to allocate finite network resources efficiently and fairly despite the uncertainty common in highly dynamic mobile ad hoc networks. We propose a set of routing protocols, Self-Balancing…
2012-03-01
detection and physical layer authentication in mobile Ad Hoc networks and wireless sensor networks (WSNs) have been investigated. Résume Le rapport...IEEE 802.16 d and e (WiMAX); (b) IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s (c) Sensor networks based on IEEE 802.15.4: Wireless USB, Bluetooth... sensor network are investigated for standard compatible wireless signals. The proposed signal existence detection and identification process consists
Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices.
Mehta, Rajvi; Nankivil, Derek; Zielinski, David J; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T; Kopper, Regis; Izatt, Joseph A; Kuo, Anthony N
2017-01-01
Optical coherence tomography (OCT) is widely used in ophthalmology clinics and has potential for more general medical settings and remote diagnostics. In anticipation of remote applications, we developed wireless interactive control of an OCT system using mobile devices. A web-based user interface (WebUI) was developed to interact with a handheld OCT system. The WebUI consisted of key OCT displays and controls ported to a webpage using HTML and JavaScript. Client-server relationships were created between the WebUI and the OCT system computer. The WebUI was accessed on a cellular phone mounted to the handheld OCT probe to wirelessly control the OCT system. Twenty subjects were imaged using the WebUI to assess the system. System latency was measured using different connection types (wireless 802.11n only, wireless to remote virtual private network [VPN], and cellular). Using a cellular phone, the WebUI was successfully used to capture posterior eye OCT images in all subjects. Simultaneous interactivity by a remote user on a laptop was also demonstrated. On average, use of the WebUI added only 58, 95, and 170 ms to the system latency using wireless only, wireless to VPN, and cellular connections, respectively. Qualitatively, operator usage was not affected. Using a WebUI, we demonstrated wireless and remote control of an OCT system with mobile devices. The web and open source software tools used in this project make it possible for any mobile device to potentially control an OCT system through a WebUI. This platform can be a basis for remote, teleophthalmology applications using OCT.
2015-03-01
information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance . Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with
Use of a wireless local area network in an orthodontic clinic.
Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M
2005-06-01
Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.
Application of Game Theory Approaches in Routing Protocols for Wireless Networks
NASA Astrophysics Data System (ADS)
Javidi, Mohammad M.; Aliahmadipour, Laya
2011-09-01
An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.
LinkMind: link optimization in swarming mobile sensor networks.
Ngo, Trung Dung
2011-01-01
A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.
LinkMind: Link Optimization in Swarming Mobile Sensor Networks
Ngo, Trung Dung
2011-01-01
A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation. PMID:22164070
Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices
Mehta, Rajvi; Nankivil, Derek; Zielinski, David J.; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T.; Kopper, Regis; Izatt, Joseph A.; Kuo, Anthony N.
2017-01-01
Purpose Optical coherence tomography (OCT) is widely used in ophthalmology clinics and has potential for more general medical settings and remote diagnostics. In anticipation of remote applications, we developed wireless interactive control of an OCT system using mobile devices. Methods A web-based user interface (WebUI) was developed to interact with a handheld OCT system. The WebUI consisted of key OCT displays and controls ported to a webpage using HTML and JavaScript. Client–server relationships were created between the WebUI and the OCT system computer. The WebUI was accessed on a cellular phone mounted to the handheld OCT probe to wirelessly control the OCT system. Twenty subjects were imaged using the WebUI to assess the system. System latency was measured using different connection types (wireless 802.11n only, wireless to remote virtual private network [VPN], and cellular). Results Using a cellular phone, the WebUI was successfully used to capture posterior eye OCT images in all subjects. Simultaneous interactivity by a remote user on a laptop was also demonstrated. On average, use of the WebUI added only 58, 95, and 170 ms to the system latency using wireless only, wireless to VPN, and cellular connections, respectively. Qualitatively, operator usage was not affected. Conclusions Using a WebUI, we demonstrated wireless and remote control of an OCT system with mobile devices. Translational Relevance The web and open source software tools used in this project make it possible for any mobile device to potentially control an OCT system through a WebUI. This platform can be a basis for remote, teleophthalmology applications using OCT. PMID:28138415
Ecology Based Decentralized Agent Management System
NASA Technical Reports Server (NTRS)
Peysakhov, Maxim D.; Cicirello, Vincent A.; Regli, William C.
2004-01-01
The problem of maintaining a desired number of mobile agents on a network is not trivial, especially if we want a completely decentralized solution. Decentralized control makes a system more r e bust and less susceptible to partial failures. The problem is exacerbated on wireless ad hoc networks where host mobility can result in significant changes in the network size and topology. In this paper we propose an ecology-inspired approach to the management of the number of agents. The approach associates agents with living organisms and tasks with food. Agents procreate or die based on the abundance of uncompleted tasks (food). We performed a series of experiments investigating properties of such systems and analyzed their stability under various conditions. We concluded that the ecology based metaphor can be successfully applied to the management of agent populations on wireless ad hoc networks.
GAPR2: A DTN Routing Protocol for Communications in Challenged, Degraded, and Denied Environments
2015-09-01
Transmission Speed Vs. Latency Figure 4.7: Helsinki Simulation Set 2, High Network Load and Small Buffers Analysis of Delivery Ratio in Helsinki Simulation...ipnsig.org/. [17] MANET routing, class notes for CS4554: Network modeling and analysis . 119 [18] S. Basagni et al. Mobile ad hoc networking . John...Wiley & Sons, 2004. [19] E. Royer et al. A review of current routing protocols for ad hoc mobile wireless networks . Personal Communications, IEEE, 6(2
NASA Astrophysics Data System (ADS)
Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali
2017-11-01
Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.
Innovative research of AD HOC network mobility model
NASA Astrophysics Data System (ADS)
Chen, Xin
2017-08-01
It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.
Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network
Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru
2014-01-01
This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371
Data delivery method based on neighbor nodes' information in a mobile ad hoc network.
Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru
2014-01-01
This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.
Adapting Future Wireless Technologies
2002-01-01
commercial satellite based systems remains to be proven. Even some of the more commercially successful satellite system (e.g.; the DirecTV direct...Space Data are all looking for private funds without much success . Once funded, estimated time frame for deploying first systems is minimum 3 to 4...of today. It is critical to the mission success that the terrestrial domain of the Army’s C4ISR is based on mobile, ad-hoc, self-healing wireless
Information Assurance in Wireless Networks
NASA Astrophysics Data System (ADS)
Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David
2001-09-01
Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.
Gholami, Mohammad; Brennan, Robert W
2016-01-06
In this paper, we investigate alternative distributed clustering techniques for wireless sensor node tracking in an industrial environment. The research builds on extant work on wireless sensor node clustering by reporting on: (1) the development of a novel distributed management approach for tracking mobile nodes in an industrial wireless sensor network; and (2) an objective comparison of alternative cluster management approaches for wireless sensor networks. To perform this comparison, we focus on two main clustering approaches proposed in the literature: pre-defined clusters and ad hoc clusters. These approaches are compared in the context of their reconfigurability: more specifically, we investigate the trade-off between the cost and the effectiveness of competing strategies aimed at adapting to changes in the sensing environment. To support this work, we introduce three new metrics: a cost/efficiency measure, a performance measure, and a resource consumption measure. The results of our experiments show that ad hoc clusters adapt more readily to changes in the sensing environment, but this higher level of adaptability is at the cost of overall efficiency.
Gholami, Mohammad; Brennan, Robert W.
2016-01-01
In this paper, we investigate alternative distributed clustering techniques for wireless sensor node tracking in an industrial environment. The research builds on extant work on wireless sensor node clustering by reporting on: (1) the development of a novel distributed management approach for tracking mobile nodes in an industrial wireless sensor network; and (2) an objective comparison of alternative cluster management approaches for wireless sensor networks. To perform this comparison, we focus on two main clustering approaches proposed in the literature: pre-defined clusters and ad hoc clusters. These approaches are compared in the context of their reconfigurability: more specifically, we investigate the trade-off between the cost and the effectiveness of competing strategies aimed at adapting to changes in the sensing environment. To support this work, we introduce three new metrics: a cost/efficiency measure, a performance measure, and a resource consumption measure. The results of our experiments show that ad hoc clusters adapt more readily to changes in the sensing environment, but this higher level of adaptability is at the cost of overall efficiency. PMID:26751447
Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu
Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).
Auto-Configuration Protocols in Mobile Ad Hoc Networks
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814
A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi
We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.
Lee, Ren-Guey; Lai, Chien-Chih; Chiang, Shao-Shan; Liu, Hsin-Sheng; Chen, Chun-Chang; Hsieh, Guan-Yu
2006-01-01
According to home healthcare requirement of chronic patients, this paper proposes a mobile-care system integrated with a variety of vital-sign monitoring, where all the front-end vital-sign measuring devices are portable and have the ability of short-range wireless communication. In order to make the system more suitable for home applications, the technology of wireless sensor network is introduced to transmit the captured vital signs to the residential gateway by means of multi-hop relay. Then the residential gateway uploads data to the care server via Internet to carry out patient's condition monitoring and the management of pathological data. Furthermore, the system is added in the alarm mechanism, which the portable care device is able to immediately perceive the critical condition of the patient and to send a warning message to medical and nursing personnels in order to achieve the goal of prompt rescue.
2009-09-01
Wireless Sensor Network (WSN) Simulator Research Personnel: Dr. Ali Abu-El Humos Task No. Task Current Status 1 Literature review and problem definition...networks.com/ [2] S. Dulman, P. Havinga, "A Simulation Template for Wireless Sensor Networks ," Supplement of the Sixth International Symposium on Autonomous... Sensor Network (WSN) Simulator 76 I Breakdown of the Research Activity to Tasks 76 II Description of the Tasks 76 Task 1 Literature Review and
Collaboration in a Wireless Grid Innovation Testbed by Virtual Consortium
NASA Astrophysics Data System (ADS)
Treglia, Joseph; Ramnarine-Rieks, Angela; McKnight, Lee
This paper describes the formation of the Wireless Grid Innovation Testbed (WGiT) coordinated by a virtual consortium involving academic and non-academic entities. Syracuse University and Virginia Tech are primary university partners with several other academic, government, and corporate partners. Objectives include: 1) coordinating knowledge sharing, 2) defining key parameters for wireless grids network applications, 3) dynamically connecting wired and wireless devices, content and users, 4) linking to VT-CORNET, Virginia Tech Cognitive Radio Network Testbed, 5) forming ad hoc networks or grids of mobile and fixed devices without a dedicated server, 6) deepening understanding of wireless grid application, device, network, user and market behavior through academic, trade and popular publications including online media, 7) identifying policy that may enable evaluated innovations to enter US and international markets and 8) implementation and evaluation of the international virtual collaborative process.
A novel Smart Routing Protocol for remote health monitoring in Medical Wireless Networks.
Sundararajan, T V P; Sumithra, M G; Maheswar, R
2014-01-01
In a Medical Wireless Network (MWN), sensors constantly monitor patient's physiological condition and movement. Inter-MWN communications are set up between the Patient Server and one or more Centralized Coordinators. However, MWNs require protocols with little energy consumption and the self-organizing attribute perceived in ad-hoc networks. The proposed Smart Routing Protocol (SRP) selects only the nodes with a higher residual energy and lower traffic density for routing. This approach enhances cooperation among the nodes of a Mobile Ad Hoc Network. Consequently, SRP produces better results than the existing protocols, namely Conditional Min-Max Battery Cost Routing, Min-Max Battery Cost Routing and AdHoc On-demand Distance Vector in terms of network parameters. The performance of the erstwhile schemes for routing protocols is evaluated using the network simulator Qualnet v 4.5.
Space-Time Processing for Tactical Mobile Ad Hoc Networks
2008-08-01
vision for multiple concurrent communication settings, i.e., a many-to-many framework where multi-packet transmissions (MPTs) and multi-packet...modelling framework of capacity-delay tradeoffs We have introduced the first unified modeling framework for the computation of fundamental limits o We...dalities in wireless n twor i-packet modelling framework to account for the use of m lti-packet reception (MPR) f ad hoc networks with MPT under
An Energy Efficient Power Control Protocol for Ad Hoc Networks Using Directional Antennas
NASA Astrophysics Data System (ADS)
Quiroz-Perez, Carlos; Gulliver, T. Aaron
A wireless ad hoc network is a collection of mobile nodes that can communicate with each other. Typically, nodes employ omnidirectional antennas. The use of directional antennas can increase spatial reuse, reduce the number of hops to a destination, reduce interference, and increase the transmission range in a specific direction. This is because omnidirectional antennas radiate equally in all directions, limiting the transmission range.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Cognitive Radio Networks for Tactical Wireless Communications
2014-12-01
exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
Performance Evaluation of AODV with Blackhole Attack
NASA Astrophysics Data System (ADS)
Dara, Karuna
2010-11-01
A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.
Adaptive MANET multipath routing algorithm based on the simulated annealing approach.
Kim, Sungwook
2014-01-01
Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. Due to characteristics like temporary topology and absence of centralized authority, routing is one of the major issues in ad hoc networks. In this paper, a new multipath routing scheme is proposed by employing simulated annealing approach. The proposed metaheuristic approach can achieve greater and reciprocal advantages in a hostile dynamic real world network situation. Therefore, the proposed routing scheme is a powerful method for finding an effective solution into the conflict mobile ad hoc network routing problem. Simulation results indicate that the proposed paradigm adapts best to the variation of dynamic network situations. The average remaining energy, network throughput, packet loss probability, and traffic load distribution are improved by about 10%, 10%, 5%, and 10%, respectively, more than the existing schemes.
Wang, Xinheng
2008-01-01
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.
Improving management performance of P2PSIP for mobile sensing in wireless overlays.
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-11-08
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.
Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays
Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María
2013-01-01
Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358
RFIC's challenges for third-generation wireless systems
NASA Astrophysics Data System (ADS)
Boric-Lubecke, Olga; Lin, Jenshan; Gould, Penny; Kermalli, Munawar
2001-11-01
Third generation (3G) cellular wireless systems are envisioned to offer low cost, high-capacity mobile communications with data rates of up to 2 Mbit/s, with global roaming and advanced data services. Besides adding mobility to the internet, 3G systems will provide location-based services, as well as personalized information and entertainment. Low cost, high dynamic-range radios, both for base stations (BS) and for mobile stations (MS) are required to enable worldwide deployment of such networks. A receiver's reference sensitivity, intermodulation characteristics, and blocking characteristics, set by a wireless standard, define performance requirements of individual components of a receiver front end. Since base station handles multiple signals from various distances simultaneously, its radio specifications are significantly more demanding than those for mobile devices. While high level of integration has already been achieved for second generation hand-sets using low-cost silicon technologies, the cost and size reduction of base stations still remains a challenge and necessity. While silicon RFIC technology is steadily improving, it is still difficult to achieve noise figure (NF), linearity, and phase noise requirements with presently available devices. This paper will discuss base station specification for 2G (GSM) and 3G (UMTS) systems, as well as the feasibility of implementing base station radios in low-cost silicon processes.
NASA Astrophysics Data System (ADS)
Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.
2016-05-01
A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.
Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Saeed Tanoli, Tariq; Khalid Khan, Muhammad
2013-12-01
Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.
Intrusion Detection and Forensics for Self-Defending Wireless Networks
2012-12-01
ICNP), Nov. 2007. 5. Yao Zhao, Yan Chen, Bo Li, and Qian Zhang, Hop ID: A Virtual Coordinate based Routing for Sparse Mobile Ad Hoc Networks, in...Liu, Hongbo Zhao, Kai Chen and Yan Chen, " DISCO : Memory Efficient and Accurate Flow Statistics for Network Measurement", in the Proc. of IEEE ICDCS
Park, Jung-Ho; Park, Sung-Ae; Yoon, Soon-Nyoung; Kang, Sung-Rye
2004-04-01
The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method/1 and Prototyping were adopted to develop the main network system. The detailed research process is as follows : 1)home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorithm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.
Power Aware Management Middleware for Multiple Radio Interfaces
NASA Astrophysics Data System (ADS)
Friedman, Roy; Kogan, Alex
Modern mobile phones and laptops are equipped with multiple wireless communication interfaces, such as WiFi and Bluetooth (BT), enabling the creation of ad-hoc networks. These interfaces significantly differ from one another in their power requirements, transmission range, bandwidth, etc. For example, BT is an order of magnitude more power efficient than WiFi, but its transmission range is an order of magnitude shorter. This paper introduces a management middleware that establishes a power efficient overlay for such ad-hoc networks, in which most devices can shut down their long range power hungry wireless interface (e.g., WiFi). Yet, the resulting overlay is fully connected, and for capacity and latency needs, no message ever travels more than 2k short range (e.g., BT) hops, where k is an arbitrary parameter. The paper describes the architecture of the solution and the management protocol, as well as a detailed simulations based performance study. The simulations largely validate the ability of the management infrastructure to obtain considerable power savings while keeping the network connected and maintaining reasonable latency. The performance study covers both static and mobile networks.
Mobility management techniques for the next-generation wireless networks
NASA Astrophysics Data System (ADS)
Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.
2001-10-01
The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.
Wireless security in mobile health.
Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan
2012-12-01
Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.
Reconfigurable Robust Routing for Mobile Outreach Network
NASA Technical Reports Server (NTRS)
Lin, Ching-Fang
2010-01-01
The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.
NASA Astrophysics Data System (ADS)
Hortos, William S.
2003-07-01
Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.
A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities
Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro
2017-01-01
The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds. PMID:29099745
A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities.
Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro
2017-11-03
The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.
802.11s Wireless Mesh Network Visualization Application
NASA Technical Reports Server (NTRS)
Mauldin, James Alexander
2014-01-01
Results of past experimentation at NASA Johnson Space Center showed that the IEEE 802.11s standard has better performance than the widely implemented alternative protocol B.A.T.M.A.N (Better Approach to Mobile Ad hoc Networking). 802.11s is now formally incorporated into the Wi- Fi 802.11-2012 standard, which specifies a hybrid wireless mesh networking protocol (HWMP). In order to quickly analyze changes to the routing algorithm and to support optimizing the mesh network behavior for our intended application a visualization tool was developed by modifying and integrating open source tools.
Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois
2017-07-01
A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.
Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.
Lee, HyungJune
2014-01-01
We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.
Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks
Lee, HyungJune
2014-01-01
We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736
Secure dissemination of electronic healthcare records in distributed wireless environments.
Belsis, Petros; Vassis, Dimitris; Skourlas, Christos; Pantziou, Grammati
2008-01-01
A new networking paradigm has emerged with the appearance of wireless computing. Among else ad-hoc networks, mobile and ubiquitous environments can boost the performance of systems in which they get applied. Among else, medical environments are a convenient example of their applicability. With the utilisation of wireless infrastructures, medical data may be accessible to healthcare practitioners, enabling continuous access to medical data. Due to the critical nature of medical information, the design and implementation of these infrastructures demands special treatment in order to meet specific requirements; among else, special care should be taken in order to manage interoperability, security, and in order to deal with bandwidth and hardware resource constraints that characterize the wireless topology. In this paper we present an architecture that attempts to deal with these issues; moreover, in order to prove the validity of our approach we have also evaluated the performance of our platform through simulation in different operating scenarios.
Design and implementation of location-based wireless targeted advertising
NASA Astrophysics Data System (ADS)
Li, Benjamin; Xu, Deyin
2001-10-01
As advertisements are time and location sensitive, a challenge for wireless marketing is to have advertisements delivered when and where they are most convenient. In this paper we introduce a two-stage auction model for location-based wireless targeted advertising. This system extends the notion of location-based service by using location information to target advertising, and does so specifically by enabling advertisers to specify their preferences and bid for advertisement delivery, where those preferences are then used in a subsequent automated auction of actual deliveries to wireless data users. The automated auction in the second stage is especially effective because it can use information about the individual user profile data, including customer relationship management system contents as well as location from the wireless system's location management service, including potentially location history such as current trajectory from recent history and longer-term historical trip records for that user. Through two-stage auction, real-time bidding by advertisers and matching ads contents to mobile users help advertising information reach maximal value.
NASA Astrophysics Data System (ADS)
Xin, Qin; Yao, Xiaolan; Engelstad, Paal E.
2010-09-01
Wireless Mesh Networking is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. We study here the minimum-latency communication primitive of gossiping (all-to-all communication) in multi-hop ad-hoc Wireless Mesh Networks (WMNs). Each mesh node in the WMN is initially given a message and the objective is to design a minimum-latency schedule such that each mesh node distributes its message to all other mesh nodes. Minimum-latency gossiping problem is well known to be NP-hard even for the scenario in which the topology of the WMN is known to all mesh nodes in advance. In this paper, we propose a new latency-efficient approximation scheme that can accomplish gossiping task in polynomial time units in any ad-hoc WMN under consideration of Large Interference Range (LIR), e.g., the interference range is much larger than the transmission range. To the best of our knowledge, it is first time to investigate such a scenario in ad-hoc WMNs under LIR, our algorithm allows the labels (e.g., identifiers) of the mesh nodes to be polynomially large in terms of the size of the WMN, which is the first time that the scenario of large labels has been considered in ad-hoc WMNs under LIR. Furthermore, our gossiping scheme can be considered as a framework which can be easily implied to the scenario under consideration of mobility-related issues since we assume that the mesh nodes have no knowledge on the network topology even for its neighboring mesh nodes.
The Use of Mobile-Wireless Technology for Education.
ERIC Educational Resources Information Center
Altalib, Hasan
This paper focuses on the use of mobile-wireless technology for education. The first section is an introduction which provides a definition of the terms. The second section discusses implementation of mobile-wireless technology in schools, providing examples from Latrobe Junior High School, where wireless laptops were issued to students and River…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... Mobile Phones and Tablets Institution of Investigation AGENCY: U.S. International Trade Commission... importation of certain wireless devices, including mobile phones and tablets by reason of infringement of... sale within the United States after importation of certain wireless devices, including mobile phones...
NASA Astrophysics Data System (ADS)
Hoomod, Haider K.; Kareem Jebur, Tuka
2018-05-01
Mobile ad hoc networks (MANETs) play a critical role in today’s wireless ad hoc network research and consist of active nodes that can be in motion freely. Because it consider very important problem in this network, we suggested proposed method based on modified radial basis function networks RBFN and Self-Organizing Map SOM. These networks can be improved by the use of clusters because of huge congestion in the whole network. In such a system, the performance of MANET is improved by splitting the whole network into various clusters using SOM. The performance of clustering is improved by the cluster head selection and number of clusters. Modified Radial Based Neural Network is very simple, adaptable and efficient method to increase the life time of nodes, packet delivery ratio and the throughput of the network will increase and connection become more useful because the optimal path has the best parameters from other paths including the best bitrate and best life link with minimum delays. Proposed routing algorithm depends on the group of factors and parameters to select the path between two points in the wireless network. The SOM clustering average time (1-10 msec for stall nodes) and (8-75 msec for mobile nodes). While the routing time range (92-510 msec).The proposed system is faster than the Dijkstra by 150-300%, and faster from the RBFNN (without modify) by 145-180%.
From teaching to learning in a mobile, wireless world.
Billings, Diane M
2005-08-01
What research evidence justifies this shift from teaching to learning in the mobile, wireless world? We do not need evidence to answer questions such as, "Will the mobile, wireless device technology support teaching and learning?" (we already know it will), or "Will distance learning with mobile, wireless devices be as effective as that in the classroom?" (abundant evidence indicates there will be no significant differences). However, we do need to know, "How can we use these learning technologies to improve student learning and the outcomes of our academic programs?" Answers to this question will ultimately help educators prepare students to deliver safe and competent patient care in the mobile, wireless world.
Proactive schema based link lifetime estimation and connectivity ratio.
Bachir, Bouamoud; Ali, Ouacha; Ahmed, Habbani; Mohamed, Elkoutbi
2014-01-01
The radio link between a pair of wireless nodes is affected by a set of random factors such as transmission range, node mobility, and environment conditions. The properties of such radio links are continually experienced when nodes status balances between being reachable and being unreachable; thereby on completion of each experience the statistical distribution of link lifetime is updated. This aspect is emphasized in mobile ad hoc network especially when it is deployed in some fields that require intelligent processing of data information such as aerospace domain.
Kim, Ju Young; Wineinger, Nathan E; Steinhubl, Steven R
2016-06-22
Active engagement in the management of hypertension is important in improving self-management behaviors and clinical outcomes. Mobile phone technology using wireless monitoring tools are now widely available to help individuals monitor their blood pressure, but little is known about the conditions under which such technology can effect positive behavior changes or clinical outcomes. To study the influence of wireless self-monitoring program and patient activation measures on health behaviors, medication adherence, and blood pressure levels as well as control of blood pressure in hypertensive patients. We examined a subset of 95 hypertensive participants from a 6-month randomized controlled trial designed to determine the utility of a wireless self-monitoring program (n=52 monitoring program, n=43 control), which consisted of a blood pressure monitoring device connected with a mobile phone, reminders for self-monitoring, a Web-based disease management program, and a mobile app for monitoring and education, compared with the control group receiving a standard disease management program. Study participants provided measures of patient activation, health behaviors including smoking, drinking, and exercise, medication adherence, and blood pressure levels. We assessed the influence of wireless self-monitoring as a moderator of the relationship between patient activation and health behaviors, medication adherence, and control of blood pressure. Improvements in patient activation were associated with improvements in cigarette smoking (beta=-0.46, P<.001) and blood pressure control (beta=0.04, P=.02). This relationship was further strengthened in reducing cigarettes (beta=-0.60, P<.001), alcohol drinking (beta=-0.26, P=.01), and systolic (beta=-0.27, P=.02) and diastolic blood pressure (beta=-0.34, P=.007) at 6 months among individuals participating in the wireless self-monitoring program. No differences were observed with respect to medication adherence. Participation in a wireless self-monitoring program provides individuals motivated to improve their health management with an added benefit above and beyond that of motivation alone. Hypertensive individuals eager to change health behaviors are excellent candidates for mobile health self-monitoring.. ClinicalTrials.gov NCT01975428, https://clinicaltrials.gov/ct2/show/NCT01975428 (Archived by WebCite at http://www.webcitation.org/6iSO5OgOG).
2014-04-01
must be done to determine current infrastructure and capabilities so that necessary updates and changes can be addressed up front. Mobile biometric...with existing satellite communications infrastructure . 20 PSTP 03-427BIOM 4 State of Mobile Biometric Device Market 4.1 Fingerprint...is a wireless information system highlighted by Real-time wireless data collection mobile device independence, wireless infrastructure independence
Wireless Fading Channel Models: From Classical to Stochastic Differential Equations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olama, Mohammed M; Djouadi, Seddik M; Charalambous, Prof. Charalambos
2010-01-01
The wireless communications channel constitutes the basic physical link between the transmitter and the receiver antennas. Its modeling has been and continues to be a tantalizing issue, while being one of the most fundamental components based on which transmitters and receivers are designed and optimized. The ultimate performance limits of any communication system are determined by the channel it operates in. Realistic channel models are thus of utmost importance for system design and testing. In addition to exponential power path-loss, wireless channels suffer from stochastic short term fading (STF) due to multipath, and stochastic long term fading (LTF) due tomore » shadowing depending on the geographical area. STF corresponds to severe signal envelope fluctuations, and occurs in densely built-up areas filled with lots of objects like buildings, vehicles, etc. On the other hand, LTF corresponds to less severe mean signal envelope fluctuations, and occurs in sparsely populated or suburban areas. In general, LTF and STF are considered as superimposed and may be treated separately. Ossanna was the pioneer to characterize the statistical properties of the signal received by a mobile user, in terms of interference of incident and reflected waves. His model was better suited for describing fading occurring mainly in suburban areas (LTF environments). It is described by the average power loss due to distance and power loss due to reflection of signals from surfaces, which when measured in dB's give rise to normal distributions, and this implies that the channel attenuation coefficient is log-normally distributed. Furthermore, in mobile communications, the LTF channel models are also characterized by their special correlation characteristics which have been reported. Clarke introduced the first comprehensive scattering model describing STF occurring mainly in urban areas. An easy way to simulate Clarke's model using a computer simulation is described. This model was later expanded to three-dimensions (3D) by Aulin. An indoor STF was introduced. Most of these STF models provide information on the frequency response of the channel, described by the Doppler power spectral density (DPSD). Aulin presented a methodology to find the Doppler power spectrum by computing the Fourier transform of the autocorrelation function of the channel impulse response with respect to time. A different approach, leading to the same Doppler power spectrum relation was presented by Gans. These STF models suggest various distributions for the received signal amplitude such as Rayleigh, Rician, or Nakagami. Models based on autoregressive and moving averages (AR) are proposed. However, these models assume that the channel state is completely observable, which in reality is not the case due to additive noise, and requires long observation intervals. First order Markov models for Raleigh fading have been proposed, and the usefulness of a finite-state Markov channel model is argued. Mobile-to-mobile (or ad hoc) wireless networks comprise nodes that freely and dynamically self-organize into arbitrary and/or temporary network topology without any fixed infrastructure support. They require direct communication between a mobile transmitter and a mobile receiver over a wireless medium. Such mobile-to-mobile communication systems differ from the conventional cellular systems, where one terminal, the base station, is stationary, and only the mobile station is moving. As a consequence, the statistical properties of mobile-to-mobile links are different from cellular ones. Copious ad hoc networking research exists on layers in the open system interconnection (OSI) model above the physical layer. However, neglecting the physical layer while modeling wireless environment is error prone and should be considered more carefully. The experimental results show that the factors at the physical layer not only affect the absolute performance of a protocol, but because their impact on different protocols is nonuniform, it can even change the relative ranking among protocols for the same scenario. The importance of the physical layer is demonstrated by evaluating the Medium Access Control (MAC) performance. Most of the research conducted on wireless channel modeling deals mainly with deterministic wireless channel models. In these models, the speeds of the nodes are assumed to be constant and the statistical characteristics of the received signal are assumed to be fixed with time. But in reality, the propagation environment varies continuously due to mobility of the nodes at variable speeds and movement of objects or scatter across transmitters and receivers resulting in appearance or disappearance of existing paths from one instant to the next. As a result, the current models that assume fixed statistics are unable to capture and track complex time variations in the propagation environment.« less
Gemini: Extending Information Management for Real Time Tactical Environments
2008-03-01
Mobile, Ad ‐ Hoc Networks.......................................................................................................49 8.4 Wired...networks, such as wireless ad ‐ hoc networks. This paper looked into the operating environments expected to be available to Unmanned Aircraft Systems...decentralized, ad ‐ hoc networks. The total peering capability of these networks may be very large. And, each network or access point may carry restrictions; for
Shed a light of wireless technology on portable mobile design of NIRS
NASA Astrophysics Data System (ADS)
Sun, Yunlong; Li, Ting
2016-03-01
Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.
vMon-mobile provides wireless connection to the electronic patient record
NASA Astrophysics Data System (ADS)
Oliveira, Pedro P., Jr.; Rebelo, Marina; Pilon, Paulo E.; Gutierrez, Marco A.; Tachinardi, Umberto
2002-05-01
This work presents the development of a set of tools to help doctors to continuously monitor critical patients. Real-time monitoring signals are displayed via a Web Based Electronic Patient Record (Web-EPR) developed at the Heart Institute. Any computer on the Hospital's Intranet can access the Web-EPR that will open a browser plug-in called vMon. Recently vMon was adapted to wireless mobile devices providing the same real-time visualization of vital signals of its desktop counterpart. The monitoring network communicates with the hospital network through a gateway using HL7 messages and has the ability to export waveforms in real time using the multicast protocol through an API library. A dedicated ActiveX component was built that establishes the streaming of the biomedical signals under monitoring and displays them on an Internet Explorer 5.x browser. The mobile version - called vMon-mobile - will parse the browser window and deliver it to a PDA device connected to a local area network. The result is a virtual monitor presenting real-time data on a mobile device. All parameters and signals acquired from the moment the patient is connected to the monitors are stored for a few days. The most clinically relevant information is added to patient's EPR.
47 CFR 51.5 - Terms and definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... technologies include, but are not limited to, traditional or new cable plant, wireless technologies, and power..., that maintains a collocation arrangement in an incumbent LEC wire center, with active electrical power... wireless service. A mobile wireless service is any mobile wireless telecommunications service, including...
Advanced wireless mobile collaborative sensing network for tactical and strategic missions
NASA Astrophysics Data System (ADS)
Xu, Hao
2017-05-01
In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.
Mobility based multicast routing in wireless mesh networks
NASA Astrophysics Data System (ADS)
Jain, Sanjeev; Tripathi, Vijay S.; Tiwari, Sudarshan
2013-01-01
There exist two fundamental approaches to multicast routing namely minimum cost trees and shortest path trees. The (MCT's) minimum cost tree is one which connects receiver and sources by providing a minimum number of transmissions (MNTs) the MNTs approach is generally used for energy constraint sensor and mobile ad hoc networks. In this paper we have considered node mobility and try to find out simulation based comparison of the (SPT's) shortest path tree, (MST's) minimum steiner trees and minimum number of transmission trees in wireless mesh networks by using the performance metrics like as an end to end delay, average jitter, throughput and packet delivery ratio, average unicast packet delivery ratio, etc. We have also evaluated multicast performance in the small and large wireless mesh networks. In case of multicast performance in the small networks we have found that when the traffic load is moderate or high the SPTs outperform the MSTs and MNTs in all cases. The SPTs have lowest end to end delay and average jitter in almost all cases. In case of multicast performance in the large network we have seen that the MSTs provide minimum total edge cost and minimum number of transmissions. We have also found that the one drawback of SPTs, when the group size is large and rate of multicast sending is high SPTs causes more packet losses to other flows as MCTs.
Addressing practical challenges in utility optimization of mobile wireless sensor networks
NASA Astrophysics Data System (ADS)
Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin
2008-04-01
This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.
Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco
2015-02-05
One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.
Immune Inspired Security Approach for Manets: a Case Study
NASA Astrophysics Data System (ADS)
Mohamed, Yasir Abdelgadir
2011-06-01
This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.
Multimedia information processing in the SWAN mobile networked computing system
NASA Astrophysics Data System (ADS)
Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John
1996-03-01
Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.
Collaboration and decision making tools for mobile groups
NASA Astrophysics Data System (ADS)
Abrahamyan, Suren; Balyan, Serob; Ter-Minasyan, Harutyun; Degtyarev, Alexander
2017-12-01
Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment-dependency creates difficulties and decelerates development and integration of such technologies. Also mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with help of ad-hoc wireless local networks could eliminate hardware-attachment and be useful also in terms of scientific approach. Solutions from basic internet-messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decisionmaking and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.
Design of a multimedia gateway for mobile devices
NASA Astrophysics Data System (ADS)
Hens, Raf; Goeminne, Nico; Van Hoecke, Sofie; Verdickt, Tom; Bouve, Thomas; Gielen, Frank; Demeester, Piet
2005-03-01
Although mobile users are currently offered a lot more capabilities on their mobile devices, they still experience some limitations. They can surf the Internet, read their e-mail and receive MMS messages, but they have limited processing power, storage capacity and bandwidth and are limited in their access to peripherals (e.g. printers). We have designed and implemented a multimedia gateway for mobile devices that reduces these limitations. It gives the mobile devices transparent access to high capacity devices connected to the gateway, which is built around a central, modularly extensible server that can run on any PC or home gateway. It manages two sets of modules: one set offering the actual services and another set handling the IP-based wireless interaction with the client applications on the mobile devices. These modules can be added and removed dynamically, offering new services on the fly. Currently services for storage, printing, domotics and playing music are provided. Others can easily be added later on. This paper discusses the architecture and development, the management of modules, the actual services and their benefits. Besides a proprietary implementation, it also looks into OSGi and how both platforms compare to each other, concerning design, architecture, ease of development, functionality, ...
Le, Duc Van; Oh, Hoon; Yoon, Seokhoon
2013-07-05
In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.
Van Le, Duc; Oh, Hoon; Yoon, Seokhoon
2013-01-01
In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134
ERIC Educational Resources Information Center
Gan, Chin Lay; Balakrishnan, Vimala
2014-01-01
The aim of this paper is to identify adoption factors of mobile wireless technology to increase interactivity between lecturers and students during lectures. A theoretical framework to ascertain lecturers' intentions to use mobile wireless technology during lectures (dependent variable) is proposed with seven independent variables. The…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... Mobile, LLC, Licensee of Various Authorizations in the Wireless Radio Services, Applicant for Modification of Various Authorizations in the Wireless Radio Services AGENCY: Federal Communications Commission... Confidential Treatment from Patricia J. Paoletta and Jonathan B. Mirsky, Counsel to Wireless Properties of...
An Integrated Multi-layer Approach for Seamless Soft Handoff in Mobile Ad Hoc Networks
2011-01-01
network to showcase how to leverage the IEEE 802.21 Media Independent Handover ( MIH ) framework [3] in our handoff solution. Moreover, to further...to the seamless handoff problem. The architecture leverages the IEEE 802.21 MIH standard to facilitate handover related decisions on multiple...provided by the MIH function (MIHF), the topology control manager dynamically activates/deactivates the wireless interfaces to ensure the network is
Design of transnational mobile e-payment application based on SIM card
NASA Astrophysics Data System (ADS)
Qian, Tang; Zhen, Li
2018-05-01
Facing the stronger demands of transnational mobile communications and internet-based mobile wireless value-added services, the interconnection and interworking of multiple communication operators and their win-win cooperations become a crucial target in the new round of mobile economic development. Previous researches showed that mobile communications and value-add services are not only technical problems, but also more economic problems.we design a general oncard operating system based on SIM card that could be responsible for coordinating and distributing card hardware and software resources. These applications such as transnational mobile payment, consumption management and many other supplemented functions share the API interfaces, hardware and software resources provided by the operation system, although they are independent of each other. The layer structure of SIM card design not only greatly reduces the complexity of COS development, but also saves the most tense card resources and extends SIM cards applications.
Organization model for Mobile Wireless Sensor Networks inspired in Artificial Bee Colony
NASA Astrophysics Data System (ADS)
Freire Roberto, Guilherme; Castilho Maschi, Luis Fernando; Pigatto, Daniel Fernando; Jaquie Castelo Branco, Kalinka Regina Lucas; Alves Neves, Leandro; Montez, Carlos; Sandro Roschildt Pinto, Alex
2015-01-01
The purpose of this study is to find a self-organizing model for MWSN based on bee colonies in order to reduce the number of messages transmitted among nodes, and thus reduce the overall consumption energy while maintaining the efficiency of message delivery. The results obtained in this article are originated from simulations carried out with SINALGO software, which demonstrates the effectiveness of the proposed approach. The BeeAODV (Bee Ad-Hoc On Demand Distance Vector) proposed in this paper allows to considerably reduce message exchanges whether compared to AODV (Ad-Hoc On Demand Distance Vector).
Calculating distance by wireless ethernet signal strength for global positioning method
NASA Astrophysics Data System (ADS)
Kim, Seung-Yong; Kim, Jeehong; Lee, Chang-goo
2005-12-01
This paper investigated mobile robot localization by using wireless Ethernet for global localization and INS for relative localization. For relative localization, the low-cost INS features self-contained was adopted. Low-cost MEMS-based INS has a short-period response and acceptable performance. Generally, variety sensor was used for mobile robot localization. In spite of precise modeling of the sensor, it leads inevitably to the accumulation of errors. The IEEE802.11b wireless Ethernet standard has been deployed in office building, museums, hospitals, shopping centers and other indoor environments. Many mobile robots already make use of wireless networking for communication. So location sensing with wireless Ethernet might be very useful for a low-cost robot. This research used wireless Ethernet card for compensation the accumulation of errors. So the mobile robot can use that for global localization through the installed many IEEE802.11b wireless Ethernets in indoor environments. The chief difficulty in localization with wireless Ethernet is predicting signal strength. As a sensor, RF signal strength measured indoors is non-linear with distance. So, there made the profiles of signal strength for points and used that. We wrote using function between signal strength profile and distance from the wireless Ethernet point.
Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks
Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang
2018-01-01
In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439
Mobilize Your instruction Program with Wireless Technology.
ERIC Educational Resources Information Center
Mathias, Molly Susan; Heser, Steven
2002-01-01
Describes the use of wireless technology for library bibliographic instruction at the Milwaukee Area Technical College. Highlights include a wireless mobile cart that holds laptop computers; faculty support; future plans; and recommendations, including investigating technology infrastructure and marketing. (LRW)
Mobile Applications and 4G Wireless Networks: A Framework for Analysis
ERIC Educational Resources Information Center
Yang, Samuel C.
2012-01-01
Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…
Mobility and Cloud: Operating in Intermittent, Austere Network Conditions
2014-09-01
consume information, and are connected to cloud-based servers over wired or wireless network connections. For mobile clients, this connection, by...near future. In addition to intermittent connectivity issues, many wireless networks introduce additional delay due to excessive buffering. This can...requirements, commercial cloud applications have grown at a fast rate. Similar to other mobile systems, navy ships connected over wireless networks
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
DOT National Transportation Integrated Search
1999-03-01
This study focused on assessing the application of traffic monitoring and management systems which use transportable surveillance and ramp meter trailers, video image processors, and wireless communications. The mobile surveillance and wireless commu...
A wireless potentiostat for mobile chemical sensing and biosensing.
Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković
2015-10-01
Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.
[Research on WiFi-based wireless microscopy on a mobile phone and its application].
Hailan, Jin; Jing, Liu
2012-11-01
We proposed and realized a new device that acquires microscopic image wirelessly based on mobile phone and WiFi system. The mobile terminals could record, display and store the image from the far end via the wireless LAN. Using this system, a series of conceptual experiments on monitoring the microscopic images of common objects and liver cancer cells were successfully demonstrated. This system is expected to have important value in the experimental investigations on wirelessly monitoring the cell culture, and small insect etc.
Rethinking Mobile Telephony with the IMP
2011-01-01
in the telephony industry, and portions of it such as SS7 or SCTP signaling are packet-switched, deployed mobile telephony access infrastructure is...deployment of wireless LAN technology raises the question of how a mobile telephony system might instead be architected to use wireless LAN access ...and wireless access points has made universal Internet access increasingly convenient. There are clearly barriers to this vision of accessing a
Deep Space Habitat Wireless Smart Plug
NASA Technical Reports Server (NTRS)
Morgan, Joseph A.; Porter, Jay; Rojdev, Kristina; Carrejo, Daniel B.; Colozza, Anthony J.
2014-01-01
NASA has been interested in technology development for deep space exploration, and one avenue of developing these technologies is via the eXploration Habitat (X-Hab) Academic Innovation Challenge. In 2013, NASA's Deep Space Habitat (DSH) project was in need of sensors that could monitor the power consumption of various devices in the habitat with added capability to control the power to these devices for load shedding in emergency situations. Texas A&M University's Electronic Systems Engineering Technology Program (ESET) in conjunction with their Mobile Integrated Solutions Laboratory (MISL) accepted this challenge, and over the course of 2013, several undergraduate students in a Capstone design course developed five wireless DC Smart Plugs for NASA. The wireless DC Smart Plugs developed by Texas A&M in conjunction with NASA's Deep Space Habitat team is a first step in developing wireless instrumentation for future flight hardware. This paper will further discuss the X-Hab challenge and requirements set out by NASA, the detailed design and testing performed by Texas A&M, challenges faced by the team and lessons learned, and potential future work on this design.
Body area network--a key infrastructure element for patient-centered telemedicine.
Norgall, Thomas; Schmidt, Robert; von der Grün, Thomas
2004-01-01
The Body Area Network (BAN) extends the range of existing wireless network technologies by an ultra-low range, ultra-low power network solution optimised for long-term or continuous healthcare applications. It enables wireless radio communication between several miniaturised, intelligent Body Sensor (or actor) Units (BSU) and a single Body Central Unit (BCU) worn at the human body. A separate wireless transmission link from the BCU to a network access point--using different technology--provides for online access to BAN components via usual network infrastructure. The BAN network protocol maintains dynamic ad-hoc network configuration scenarios and co-existence of multiple networks.BAN is expected to become a basic infrastructure element for electronic health services: By integrating patient-attached sensors and mobile actor units, distributed information and data processing systems, the range of medical workflow can be extended to include applications like wireless multi-parameter patient monitoring and therapy support. Beyond clinical use and professional disease management environments, private personal health assistance scenarios (without financial reimbursement by health agencies / insurance companies) enable a wide range of applications and services in future pervasive computing and networking environments.
75 FR 67060 - Universal Service Reform Mobility Fund
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-01
... CONTACT: Wireless Telecommunications Bureau, Auctions and Spectrum Access Division: Scott Mackoul at (202... the first cellular telephone licenses, the wireless industry has continually expanded and upgraded its networks to the point where third generation (called advanced or 3G) mobile wireless services are now...
DOT National Transportation Integrated Search
1999-03-01
The Mobile Surveillance and Wireless Communication Systems Field Operational Test (FOT) evaluated the performance of wireless traffic detection and communications systems in areas where permanent detectors, electrical power, and landline communicatio...
Impact of mobility structure on optimization of small-world networks of mobile agents
NASA Astrophysics Data System (ADS)
Lee, Eun; Holme, Petter
2016-06-01
In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the agents on the optimal tuning of a small-world type network construction method. By this method, the network is updated periodically and held static between the updates. We investigate the optimal updating times for different scenarios of the movement of agents (modeling, for example, the fat-tailed trip distances, and periodicities, of human travel). We find that these mobility patterns affect the power consumption in non-trivial ways and discuss how these effects can best be handled.
Real-time video streaming in mobile cloud over heterogeneous wireless networks
NASA Astrophysics Data System (ADS)
Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos
2012-06-01
Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets are captured for analytical purposes on the mobile user node. Experimental results are obtained and analysed. Future work is identified towards further improvement of the current design and implementation. With this new mobile video networking concept and paradigm implemented and evaluated, results and observations obtained from this study would form the basis of a more in-depth, comprehensive understanding of various challenges and opportunities in supporting high-quality real-time video streaming in mobile cloud over heterogeneous wireless networks.
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Wolfe, Jace; Morais, Mila; Schafer, Erin
2016-02-01
The goals of the present investigation were (1) to evaluate recognition of recorded speech presented over a mobile telephone for a group of adult bimodal cochlear implant users, and (2) to measure the potential benefits of wireless hearing assistance technology (HAT) for mobile telephone speech recognition using bimodal stimulation (i.e., a cochlear implant in one ear and a hearing aid on the other ear). A three-by-two-way repeated measures design was used to evaluate mobile telephone sentence-recognition performance differences obtained in quiet and in noise with and without the wireless HAT accessory coupled to the hearing aid alone, CI sound processor alone, and in the bimodal condition. Outpatient cochlear implant clinic. Sixteen bimodal users with Nucleus 24, Freedom, CI512, or CI422 cochlear implants participated in this study. Performance was measured with and without the use of a wireless HAT for the telephone used with the hearing aid alone, CI alone, and bimodal condition. CNC word recognition in quiet and in noise with and without the use of a wireless HAT telephone accessory in the hearing aid alone, CI alone, and bimodal conditions. Results suggested that the bimodal condition gave significantly better speech recognition on the mobile telephone with the wireless HAT. A wireless HAT for the mobile telephone provides bimodal users with significant improvement in word recognition in quiet and in noise over the mobile telephone.
Software Architecture of Sensor Data Distribution In Planetary Exploration
NASA Technical Reports Server (NTRS)
Lee, Charles; Alena, Richard; Stone, Thom; Ossenfort, John; Walker, Ed; Notario, Hugo
2006-01-01
Data from mobile and stationary sensors will be vital in planetary surface exploration. The distribution and collection of sensor data in an ad-hoc wireless network presents a challenge. Irregular terrain, mobile nodes, new associations with access points and repeaters with stronger signals as the network reconfigures to adapt to new conditions, signal fade and hardware failures can cause: a) Data errors; b) Out of sequence packets; c) Duplicate packets; and d) Drop out periods (when node is not connected). To mitigate the effects of these impairments, a robust and reliable software architecture must be implemented. This architecture must also be tolerant of communications outages. This paper describes such a robust and reliable software infrastructure that meets the challenges of a distributed ad hoc network in a difficult environment and presents the results of actual field experiments testing the principles and actual code developed.
Remote monitoring of electromagnetic signals and seismic events using smart mobile devices
NASA Astrophysics Data System (ADS)
Georgiadis, Pantelis; Cavouras, Dionisis; Sidiropoulos, Konstantinos; Ninos, Konstantinos; Nomicos, Constantine
2009-06-01
This study presents the design and development of a novel mobile wireless system to be used for monitoring seismic events and related electromagnetic signals, employing smart mobile devices like personal digital assistants (PDAs) and wireless communication technologies such as wireless local area networks (WLANs), general packet radio service (GPRS) and universal mobile telecommunications system (UMTS). The proposed system enables scientists to access critical data while being geographically independent of the sites of data sources, rendering it as a useful tool for preliminary scientific analysis.
Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services
NASA Astrophysics Data System (ADS)
Watanabe, Ryu; Tanaka, Toshiaki
Recently, wireless LAN (WLAN) technology has become a major wireless communication method. The communication bandwidth is increasing and speeds have attained rates exceeding 100 Mbps. Therefore, WLAN technology is regarded as one of the promising communication methods for future networks. In addition, public WLAN connection services can be used in many locations. However, the number of the access points (AP) is insufficient for seamless communication and it cannot be said that users can use the service ubiquitously. An ad-hoc network style connection can be used to expand the coverage area of a public WLAN service. By relaying the user messages among the user nodes, a node can obtain an Internet connection via an AP, even though the node is located outside the AP's direct wireless connection area. Such a coverage area extending technology has many advantages thanks to the feature that no additional infrastructure is required. Therefore, there is a strong demand for this technology as it allows the cost-effective construction of future networks. When a secure ad-hoc routing protocol is used for message exchange in the WLAN service, the message routes are protected from malicious behavior such as route forging and can be maintained appropriately. To do this, however, a new node that wants to join the WLAN service has to obtain information such as the public key certificate and IP address in order to start secure ad-hoc routing. In other words, an initial setup is required for every network node to join the WLAN service properly. Ordinarily, such information should be assigned from the AP. However, new nodes cannot always contact an AP directly. Therefore, there are problems about information delivery in the initial setup of a network node. These problems originate in the multi hop connection based on the ad-hoc routing protocols. In order to realize an expanded area WLAN service, in this paper, the authors propose a secure public key certificate and address provision scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.
[A wireless mobile monitoring system based on bluetooth technology].
Sun, Shou-jun; Wu, Kai; Wu, Xiao-Ming
2006-09-01
This paper presents a wireless mobile monitoring system based on Bluetooth technology. This system realizes the remote mobile monitoring of multiple physiological parameters, and has the characters of easy use, low cost, good reliability and strong capability of anti-jamming.
Development and Implementation of Low-Cost Mobile Sensor Platforms Within a Wireless Sensor Network
2010-09-01
WIRELESS SENSOR NETWORK by Michael Jay Tozzi September 2010 Thesis Advisor: Rachel Goshorn Second Reader: Duane Davis Approved for...Platforms Within a Wireless Sensor Network 6. AUTHOR(S) Tozzi, Michael Jay 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...IMPLEMENTATION OF LOW-COST MOBILE SENSOR PLATFORMS WITHIN A WIRELESS SENSOR NETWORK Michael Jay Tozzi Lieutenant, United States Navy B.S., United
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
..., LLC. 20110313 G News Corporation. G Wireless Generation, Inc. G Wireless Generation, Inc. 08-DEC-10.... G Exxon Mobil Corporation. G Mobile Eugene Island Pipeline Company. G Exxon Mobil Pipeline Company. G Mobil Oil Exploration & Producing Southeast Inc. 20110256 G Humana Inc. G Welsh, Carson, Anderson...
An Introduction to Current Trends and Benefits of Mobile Wireless Technology Use in Higher Education
ERIC Educational Resources Information Center
Kim, Sang Hyun; Mims, Clif; Holmes, Kerry P.
2006-01-01
The development of mobile wireless technologies has generated a considerable amount of excitement among practitioners and academics because it results in shifting the academic environment from traditional settings to mobile learning (m-learning) settings. Increasing numbers of institutions of higher education offer courses using mobile wireless…
2012-01-01
not trivial, and the increase is not without drawbacks . For high-density EEG systems, data processing can take a significant amount of time, even...existing wireless transmission systems. Given these drawbacks , a question naturally arises: how many electrodes are needed for MoBI? The answer will...state motor output. Neuroimage 36, 785-792. Kuo, A.D., Donelan, J.M., Ruina, A., 2005. Energetic consequences of walking like an inverted pendulum
Cross-Layer Resource Allocation for Wireless Visual Sensor Networks and Mobile Ad Hoc Networks
2014-10-01
MMD), minimizes the maximum dis- tortion among all nodes of the network, promoting a rather unbiased treatment of the nodes. We employed the Particle...achieve the ideal tradeoff between the transmitted video quality and energy consumption. Each sensor node has a bit rate that can be used for both...Distortion (MMD), minimizes the maximum distortion among all nodes of the network, promoting a rather unbiased treatment of the nodes. For both criteria
Beamspace Multiple Input Multiple Output. Part II: Steerable Antennas in Mobile Ad Hoc Networks
2016-09-01
to the transmitter with half the channel transfer function power , since the actual receiver dwells on each channel only half the time. Fourth diagram...steering in a wireless network to maximize signal power and minimize interference [8–10]. The ability to switch beams adds another diversity dimension to...channel transfer function power , since the actual receiver dwells on each channel only half the time. Fourth diagram: The transmit array sends four
HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract
2003-01-01
securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable
Uncoordinated MAC for Adaptive Multi-Beam Directional Networks: Analysis and Evaluation
2016-04-10
transmission times, hence traditional CSMA approaches are not appropriate. We first present our model of these multi-beamforming capa- bilities and the...resulting wireless interference. We then derive an upper bound on multi-access performance for an idealized version of this physical layer. We then present... transmissions and receptions in a mobile ad-hoc network has in practice led to very constrained topologies. As mentioned, one approach for system design is to de
User Needs and Advances in Space Wireless Sensing and Communications
NASA Technical Reports Server (NTRS)
Kegege, Obadiah
2017-01-01
Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions to other planets.
Mobile robotic sensors for perimeter detection and tracking.
Clark, Justin; Fierro, Rafael
2007-02-01
Mobile robot/sensor networks have emerged as tools for environmental monitoring, search and rescue, exploration and mapping, evaluation of civil infrastructure, and military operations. These networks consist of many sensors each equipped with embedded processors, wireless communication, and motion capabilities. This paper describes a cooperative mobile robot network capable of detecting and tracking a perimeter defined by a certain substance (e.g., a chemical spill) in the environment. Specifically, the contributions of this paper are twofold: (i) a library of simple reactive motion control algorithms and (ii) a coordination mechanism for effectively carrying out perimeter-sensing missions. The decentralized nature of the methodology implemented could potentially allow the network to scale to many sensors and to reconfigure when adding/deleting sensors. Extensive simulation results and experiments verify the validity of the proposed cooperative control scheme.
A Reliable Handoff Mechanism for Mobile Industrial Wireless Sensor Networks.
Ma, Jian; Yang, Dong; Zhang, Hongke; Gidlund, Mikael
2017-08-04
With the prevalence of low-power wireless devices in industrial applications, concerns about timeliness and reliability are bound to continue despite the best efforts of researchers to design Industrial Wireless Sensor Networks (IWSNs) to improve the performance of monitoring and control systems. As mobile devices have a major role to play in industrial production, IWSNs should support mobility. However, research on mobile IWSNs and practical tests have been limited due to the complicated resource scheduling and rescheduling compared with traditional wireless sensor networks. This paper proposes an effective mechanism to guarantee the performance of handoff, including a mobility-aware scheme, temporary connection and quick registration. The main contribution of this paper is that the proposed mechanism is implemented not only in our testbed but in a real industrial environment. The results indicate that our mechanism not only improves the accuracy of handoff triggering, but also solves the problem of ping-pong effect during handoff. Compared with the WirelessHART standard and the RSSI-based approach, our mechanism facilitates real-time communication while being more reliable, which can help end-to-end packet delivery remain an average of 98.5% in the scenario of mobile IWSNs.
Wolfe, Jace; Morais Duke, Mila; Schafer, Erin; Cire, George; Menapace, Christine; O'Neill, Lori
2016-01-01
The objective of this study was to evaluate the potential improvement in word recognition in quiet and in noise obtained with use of a Bluetooth-compatible wireless hearing assistance technology (HAT) relative to the acoustic mobile telephone condition (e.g. the mobile telephone receiver held to the microphone of the sound processor). A two-way repeated measures design was used to evaluate differences in telephone word recognition obtained in quiet and in competing noise in the acoustic mobile telephone condition compared to performance obtained with use of the CI sound processor and a telephone HAT. Sixteen adult users of Nucleus cochlear implants and the Nucleus 6 sound processor were included in this study. Word recognition over the mobile telephone in quiet and in noise was significantly better with use of the wireless HAT compared to performance in the acoustic mobile telephone condition. Word recognition over the mobile telephone was better in quiet when compared to performance in noise. The results of this study indicate that use of a wireless HAT improves word recognition over the mobile telephone in quiet and in noise relative to performance in the acoustic mobile telephone condition for a group of adult cochlear implant recipients.
Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks
Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok
2016-01-01
Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113
Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.
Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok
2016-01-01
Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).
Research on an estimation method of DOA for wireless location based on TD-SCDMA
NASA Astrophysics Data System (ADS)
Zhang, Yi; Luo, Yuan; Cheng, Shi-xin
2004-03-01
To meet the urgent need of personal communication and hign-speed data services,the standardization and products development for International Mobile Telecommunication-2000 (IMT-2000) have become a hot point in wordwide. The wireless location for mobile terminals has been an important research project. Unlike GPS which is located by 24 artificial satellities, it is based on the base-station of wireless cell network, and the research and development of it are correlative with IMT-2000. While the standard for the third generation mobile telecommunication (3G)-TD-SCDMA, which is proposed by China and the intellective property right of which is possessed by Chinese, is adopted by ITU-T at the first time, the research for wireless location based on TD-SCDMA has theoretic meaning, applied value and marketable foreground. First,the basic principle and method for wireless location, i.e. Direction of Angle(DOA), Time of Arrival(TOA) or Time Difference of Arrival(TDOA), hybridized location(TOA/DOA,TDOA/DOA,TDOA/DOA),etc. is introduced in the paper. So the research of DOA is very important in wireless location. Next, Main estimation methods of DOA for wireless location, i.e. ESPRIT, MUSIC, WSF, Min-norm, etc. are researched in the paper. In the end, the performances of DOA estimation for wireless location based on mobile telecommunication network are analyzed by the research of theory and simulation experiment and the contrast algorithms between and Cramer-Rao Bound. Its research results aren't only propitious to the choice of algorithms for wireless location, but also to the realization of new service of wireless location .
Realtime multiprocessor for mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Jungeblut, T.; Grünewald, M.; Porrmann, M.; Rückert, U.
2008-05-01
This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC) for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC). The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.
78 FR 59929 - Sunshine Act Meeting; Open Commission Meeting; Thursday, September 26, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the HOMELAND SECURITY. Resiliency of Mobile Wireless Communications Networks SUMMARY: The Commission... choice and facilitate improvements to the resiliency of mobile wireless networks during emergencies. 5...
Hybrid model for wireless mobility management using IPv6
NASA Astrophysics Data System (ADS)
Howie, Douglas P.; Sun, Junzhao; Koivisto, Antti T.
2001-07-01
Within the coming decade, there will be a dramatic increase in the availability of inexpensive, computationally powerful mobile devices running applications which use the Internet Protocol (IP) to access multimedia services over broad-band wireless connections. To this end, there has been extensive research and standardization in the areas of Mobile IP and IPv6. The purpose of this paper is to apply this work to the issues involved in designing a mobility model able to adapt to different wireless mobile IP scenarios. We describe the usefulness of this model in the 4th generation mobile multimedia systems to come. This new model has been synthesized through a comparative analysis of current mobile IP models where particular attention has been given to the problems of mobile IP handoff and mobility management and their impact on QoS. By applying a unique perspective to these problems, our model is used to set a roadmap for future mobile IPv6 testbed construction.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... INTERNATIONAL TRADE COMMISSION [Docket No. 2964] Certain Wireless Devices, Including Mobile Phones... Phones and Tablets, DN 2964; the Commission is soliciting comments on any public interest issues raised... mobile phones and tablets. The complaint names as respondents Pantech Co., Ltd. of South Korea and...
Mobile Internet Revenues: An Empirical Study of the I-Mode Portal.
ERIC Educational Resources Information Center
Jonason, Andreas; Eliasson, Gunnar
2001-01-01
Discusses new electronic commerce applications enabled by mobility and personalization over mobile devices; considers the convergence of the wireless, the fixed Internet, and the media industries; describes innovative pricing models; and reports results from a survey of users of I-mode, a wireless Internet service offering Web browsing and email…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... Certain Wireless Devices, Including Mobile Phones and Tablets II, DN 2992; the Commission is soliciting... importation of certain wireless devices, including mobile phones and tablets II. The complaint names as... Commission's Rules of Practice and Procedure filed on behalf of Pragmatus Mobile, LLC on December 18, 2013...
NASA Astrophysics Data System (ADS)
Mohammed, H. A.; Sibley, M. J. N.; Mather, P. J.
2012-05-01
The merging of Orthogonal Frequency Division Multiplexing (OFDM) with Multiple-input multiple-output (MIMO) is a promising mobile air interface solution for next generation wireless local area networks (WLANs) and 4G mobile cellular wireless systems. This paper details the design of a highly robust and efficient OFDM-MIMO system to support permanent accessibility and higher data rates to users moving at high speeds, such as users travelling on trains. It has high relevance for next generation wireless local area networks (WLANs) and 4G mobile cellular wireless systems. The paper begins with a comprehensive literature review focused on both technologies. This is followed by the modelling of the OFDM-MIMO physical layer based on Simulink/Matlab that takes into consideration high vehicular mobility. Then the entire system is simulated and analysed under different encoding and channel estimation algorithms. The use of High Altitude Platform system (HAPs) technology is considered and analysed.
Introduction and comparison of next-generation mobile wireless technologies
NASA Astrophysics Data System (ADS)
Zaidi, Syed R.; Hussain, Shahab; Ali, M. A.; Sana, Ajaz; Saddawi, Samir; Carranza, Aparicio
2010-01-01
Mobile networks and services have gone further than voice-only communication services and are rapidly developing towards data-centric services. Emerging mobile data services are expected to see the same explosive growth in demand that Internet and wireless voice services have seen in recent years. To support such a rapid increase in traffic, active users, and advanced multimedia services implied by this growth rate along with the diverse quality of service (QoS) and rate requirements set by these services, mobile operator need to rapidly transition to a simple and cost-effective, flat, all IP-network. This has accelerated the development and deployment of new wireless broadband access technologies including fourth-generation (4G) mobile WiMAX and cellular Long-Term Evolution (LTE). Mobile WiMAX and LTE are two different (but not necessarily competing) technologies that will eventually be used to achieve data speeds of up to 100 Mbps. Speeds that are fast enough to potentially replace wired broadband connections with wireless. This paper introduces both of these next generation technologies and then compares them in the end.
Distributed Dynamic Host Configuration Protocol (D2HCP)
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856
Distributed Dynamic Host Configuration Protocol (D2HCP).
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.
Wi-Fi technology--an uncontrolled global experiment on the health of mankind.
Markov, Marko; Grigoriev, Yuri G
2013-06-01
The twenty-first century is marked with exponentially increasing development of technologies that provide wireless communications. To the pollution of the atmosphere with radio and TV signals, not only satellite communications but also any varieties of the Wi-Fi networks are added. By 2010 in the USA, 285 million mobile phone subscribers have been registered (for a little bit more than 300 million inhabitants). The estimate for the world is more than 5 billion mobile phone users at approximately 7 billion people living on this planet. Approximately 2 years ago, the International Agency of Research on Cancer (IARC) classified the electromagnetic fields used in mobile communication as a possible cancerogene. This paper discusses the potential health hazard and lack of scientific assessment and regulatory actions in protection of the life on the planet.
Design and Analysis of a Dynamic Mobility Management Scheme for Wireless Mesh Network
Roy, Sudipta
2013-01-01
Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC's session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO, M3, and WMM with respect to total cost. PMID:24311982
A New Approach to Predict user Mobility Using Semantic Analysis and Machine Learning.
Fernandes, Roshan; D'Souza G L, Rio
2017-10-19
Mobility prediction is a technique in which the future location of a user is identified in a given network. Mobility prediction provides solutions to many day-to-day life problems. It helps in seamless handovers in wireless networks to provide better location based services and to recalculate paths in Mobile Ad hoc Networks (MANET). In the present study, a framework is presented which predicts user mobility in presence and absence of mobility history. Naïve Bayesian classification algorithm and Markov Model are used to predict user future location when user mobility history is available. An attempt is made to predict user future location by using Short Message Service (SMS) and instantaneous Geological coordinates in the absence of mobility patterns. The proposed technique compares the performance metrics with commonly used Markov Chain model. From the experimental results it is evident that the techniques used in this work gives better results when considering both spatial and temporal information. The proposed method predicts user's future location in the absence of mobility history quite fairly. The proposed work is applied to predict the mobility of medical rescue vehicles and social security systems.
Morak, Jürgen; Kumpusch, Hannes; Hayn, Dieter; Modre-Osprian, Robert; Schreier, Günter
2012-01-01
Utilization of information and communication technologies such as mobile phones and wireless sensor networks becomes more and more common in the field of telemonitoring for chronic diseases. Providing elderly people with a mobile-phone-based patient terminal requires a barrier-free design of the overall user interface including the setup of wireless communication links to sensor devices. To easily manage the connection between a mobile phone and wireless sensor devices, a concept based on the combination of Bluetooth and near-field communication technology has been developed. It allows us initiating communication between two devices just by bringing them close together for a few seconds without manually configuring the communication link. This concept has been piloted with a sensor device and evaluated in terms of usability and feasibility. Results indicate that this solution has the potential to simplify the handling of wireless sensor networks for people with limited technical skills.
SHER: a colored petri net based random mobility model for wireless communications.
Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal
2015-01-01
In wireless network research, simulation is the most imperative technique to investigate the network's behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the errors of our proposed model.
SHER: A Colored Petri Net Based Random Mobility Model for Wireless Communications
Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal
2015-01-01
In wireless network research, simulation is the most imperative technique to investigate the network’s behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the errors of our proposed model. PMID:26267860
Network Coding Opportunities for Wireless Grids Formed by Mobile Devices
NASA Astrophysics Data System (ADS)
Nielsen, Karsten Fyhn; Madsen, Tatiana K.; Fitzek, Frank H. P.
Wireless grids have potential in sharing communication, computa-tional and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices.
A Wireless Physiological Signal Monitoring System with Integrated Bluetooth and WiFi Technologies.
Yu, Sung-Nien; Cheng, Jen-Chieh
2005-01-01
This paper proposes a wireless patient monitoring system which integrates Bluetooth and WiFi wireless technologies. A wireless portable multi-parameter device was designated to acquire physiological signals and transmit them to a local server via Bluetooth wireless technology. Four kinds of monitor units were designed to communicate via the WiFi wireless technology, including a local monitor unit, a control center, mobile devices (personal digital assistant; PDA), and a web page. The use of various monitor units is intending to meet different medical requirements for different medical personnel. This system was demonstrated to promote the mobility and flexibility for both the patients and the medical personnel, which further improves the quality of health care.
NASA Astrophysics Data System (ADS)
Byun, Tae-Young
This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.
Miyamoto, Kenji; Kuwano, Shigeru; Terada, Jun; Otaka, Akihiro
2016-01-25
We analyze the mobile fronthaul (MFH) bandwidth and the wireless transmission performance in the split-PHY processing (SPP) architecture, which redefines the functional split of centralized/cloud RAN (C-RAN) while preserving high wireless coordinated multi-point (CoMP) transmission/reception performance. The SPP architecture splits the base stations (BS) functions between wireless channel coding/decoding and wireless modulation/demodulation, and employs its own CoMP joint transmission and reception schemes. Simulation results show that the SPP architecture reduces the MFH bandwidth by up to 97% from conventional C-RAN while matching the wireless bit error rate (BER) performance of conventional C-RAN in uplink joint reception with only 2-dB signal to noise ratio (SNR) penalty.
ERIC Educational Resources Information Center
Hawkes, Mark; Hategekimana, Claver
2010-01-01
This study focuses on the impact of wireless, mobile computing tools on student assessment outcomes. In a campus-wide wireless, mobile computing environment at an upper Midwest university, an empirical analysis is applied to understand the relationship between student performance and Tablet PC use. An experimental/control group comparison of…
Tablet PC as a mobil PACS terminal using wireless LAN
NASA Astrophysics Data System (ADS)
Tsao, Bo-Shen; Ching, Yu-Tai; Lee, Wen-Jeng; Chen, Shyh-Jye; Chang, Chia-Hung; Chen, Chien-Jung; Yen, York; Lee, Yuan-Ten
2003-05-01
A PACS mobile terminal has applications in ward round, emergency room and remote teleradiology consultation. Personal Digital Assistants (PDAs) have the highest mobility and are used for many medical applications. However, their roles are limited in the field of radiology due to small screen size. In this study, we built a wireless PACS terminal using a hand-held tablet-PC. A tablet PC (X-pilot, LEO systems, Taiwan) running the WinCE operating systems was used as our mobile PACS terminal. This device is equipped with 800×600 resolution 10.4 inch TFT monitor. The network connection between the tablet PC and the server was linked via wireless LAN (IEEE 802.11b).
Intelligent routing protocol for ad hoc wireless network
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2006-05-01
A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.
Multi-Element Free-Space Optical (FSO) Modules for Mobile-Opportunistic Networking
2016-11-14
will enable us to improve our existing FSO prototype modules to low power consuming, miniature devices with high data transfer rates. Particularly, we... wireless spectrum bands in both military and civilian settings. Recent research has shown that free- space-optical (FSO), a.k.a. optical wireless ...communications is a promising complementary approach to address the exploding mobile wireless traffic demand. The major impediment for using FSO in a
NASA Astrophysics Data System (ADS)
Krejcar, Ondrej
New kind of mobile lightweight devices can run full scale applications with same comfort as on desktop devices only with several limitations. One of them is insufficient transfer speed on wireless connectivity. Main area of interest is in a model of a radio-frequency based system enhancement for locating and tracking users of a mobile information system. The experimental framework prototype uses a wireless network infrastructure to let a mobile lightweight device determine its indoor or outdoor position. User location is used for data prebuffering and pushing information from server to user’s PDA. All server data is saved as artifacts along with its position information in building or larger area environment. The accessing of prebuffered data on mobile lightweight device can highly improve response time needed to view large multimedia data. This fact can help with design of new full scale applications for mobile lightweight devices.
Joint minimization of uplink and downlink whole-body exposure dose in indoor wireless networks.
Plets, D; Joseph, W; Vanhecke, K; Vermeeren, G; Wiart, J; Aerts, S; Varsier, N; Martens, L
2015-01-01
The total whole-body exposure dose in indoor wireless networks is minimized. For the first time, indoor wireless networks are designed and simulated for a minimal exposure dose, where both uplink and downlink are considered. The impact of the minimization is numerically assessed for four scenarios: two WiFi configurations with different throughputs, a Universal Mobile Telecommunications System (UMTS) configuration for phone call traffic, and a Long-Term Evolution (LTE) configuration with a high data rate. Also, the influence of the uplink usage on the total absorbed dose is characterized. Downlink dose reductions of at least 75% are observed when adding more base stations with a lower transmit power. Total dose reductions decrease with increasing uplink usage for WiFi due to the lack of uplink power control but are maintained for LTE and UMTS. Uplink doses become dominant over downlink doses for usages of only a few seconds for WiFi. For UMTS and LTE, an almost continuous uplink usage is required to have a significant effect on the total dose, thanks to the power control mechanism.
Joint Minimization of Uplink and Downlink Whole-Body Exposure Dose in Indoor Wireless Networks
Plets, D.; Joseph, W.; Vanhecke, K.; Vermeeren, G.; Wiart, J.; Aerts, S.; Varsier, N.; Martens, L.
2015-01-01
The total whole-body exposure dose in indoor wireless networks is minimized. For the first time, indoor wireless networks are designed and simulated for a minimal exposure dose, where both uplink and downlink are considered. The impact of the minimization is numerically assessed for four scenarios: two WiFi configurations with different throughputs, a Universal Mobile Telecommunications System (UMTS) configuration for phone call traffic, and a Long-Term Evolution (LTE) configuration with a high data rate. Also, the influence of the uplink usage on the total absorbed dose is characterized. Downlink dose reductions of at least 75% are observed when adding more base stations with a lower transmit power. Total dose reductions decrease with increasing uplink usage for WiFi due to the lack of uplink power control but are maintained for LTE and UMTS. Uplink doses become dominant over downlink doses for usages of only a few seconds for WiFi. For UMTS and LTE, an almost continuous uplink usage is required to have a significant effect on the total dose, thanks to the power control mechanism. PMID:25793213
Efficient SCT Protocol for Post Disaster Communication
NASA Astrophysics Data System (ADS)
Ramesh, T. K.; Giriraja, C. V.
2017-08-01
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.
Synchronizing MIDI and wireless EEG measurements during natural piano performance.
Zamm, Anna; Palmer, Caroline; Bauer, Anna-Katharina R; Bleichner, Martin G; Demos, Alexander P; Debener, Stefan
2017-07-08
Although music performance has been widely studied in the behavioural sciences, less work has addressed the underlying neural mechanisms, perhaps due to technical difficulties in acquiring high-quality neural data during tasks requiring natural motion. The advent of wireless electroencephalography (EEG) presents a solution to this problem by allowing for neural measurement with minimal motion artefacts. In the current study, we provide the first validation of a mobile wireless EEG system for capturing the neural dynamics associated with piano performance. First, we propose a novel method for synchronously recording music performance and wireless mobile EEG. Second, we provide results of several timing tests that characterize the timing accuracy of our system. Finally, we report EEG time domain and frequency domain results from N=40 pianists demonstrating that wireless EEG data capture the unique temporal signatures of musicians' performances with fine-grained precision and accuracy. Taken together, we demonstrate that mobile wireless EEG can be used to measure the neural dynamics of piano performance with minimal motion constraints. This opens many new possibilities for investigating the brain mechanisms underlying music performance. Copyright © 2017 Elsevier B.V. All rights reserved.
The opportunistic transmission of wireless worms between mobile devices
NASA Astrophysics Data System (ADS)
Rhodes, C. J.; Nekovee, M.
2008-12-01
The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones. An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. The model uses straight-line motion to achieve population, though it is recognised that this is a highly simplified representation of human mobility patterns. We show that the contact rate can be derived from the underlying mobility model and, through extensive simulation, that mass-action epidemic models remain applicable to worm spreading in the low density regime studied here. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.
High Fidelity Simulations of Large-Scale Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Onunkwo, Uzoma; Benz, Zachary
The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulationsmore » (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.« less
Handheld portable real-time tracking and communications device
Wiseman, James M [Albuquerque, NM; Riblett, Jr., Loren E.; Green, Karl L [Albuquerque, NM; Hunter, John A [Albuquerque, NM; Cook, III, Robert N.; Stevens, James R [Arlington, VA
2012-05-22
Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.
Random Time Identity Based Firewall In Mobile Ad hoc Networks
NASA Astrophysics Data System (ADS)
Suman, Patel, R. B.; Singh, Parvinder
2010-11-01
A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.
NASA Astrophysics Data System (ADS)
De Rango, Floriano; Lupia, Andrea
2016-05-01
MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.
Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles.
Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V; Imran, Muhammad; Zhou, Keliang
2016-01-11
The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.
Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles
Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang
2016-01-01
The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. PMID:26761013
A Tree Based Self-routing Scheme for Mobility Support in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Kim, Young-Duk; Yang, Yeon-Mo; Kang, Won-Seok; Kim, Jin-Wook; An, Jinung
Recently, WSNs (Wireless Sensor Networks) with mobile robot is a growing technology that offer efficient communication services for anytime and anywhere applications. However, the tiny sensor node has very limited network resources due to its low battery power, low data rate, node mobility, and channel interference constraint between neighbors. Thus, in this paper, we proposed a tree based self-routing protocol for autonomous mobile robots based on beacon mode and implemented in real test-bed environments. The proposed scheme offers beacon based real-time scheduling for reliable association process between parent and child nodes. In addition, it supports smooth handover procedure by reducing flooding overhead of control packets. Throughout the performance evaluation by using a real test-bed system and simulation, we illustrate that our proposed scheme demonstrates promising performance for wireless sensor networks with mobile robots.
75 FR 22352 - Aviation Service Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-28
... CONTACT: Tim Maguire, Mobility Division, Wireless Telecommunications Bureau, at (202) 418-2155...) 418-0530 (voice), (202) 418-0432 (TTY). 1. In this document, the Wireless Telecommunications Bureau of... wireless service providers. The SBA has developed a small business size standard for wireless firms within...
Supervisory control of mobile sensor networks: math formulation, simulation, and implementation.
Giordano, Vincenzo; Ballal, Prasanna; Lewis, Frank; Turchiano, Biagio; Zhang, Jing Bing
2006-08-01
This paper uses a novel discrete-event controller (DEC) for the coordination of cooperating heterogeneous wireless sensor networks (WSNs) containing both unattended ground sensors (UGSs) and mobile sensor robots. The DEC sequences the most suitable tasks for each agent and assigns sensor resources according to the current perception of the environment. A matrix formulation makes this DEC particularly useful for WSN, where missions change and sensor agents may be added or may fail. WSN have peculiarities that complicate their supervisory control. Therefore, this paper introduces several new tools for DEC design and operation, including methods for generating the required supervisory matrices based on mission planning, methods for modifying the matrices in the event of failed nodes, or nodes entering the network, and a novel dynamic priority assignment weighting approach for selecting the most appropriate and useful sensors for a given mission task. The resulting DEC represents a complete dynamical description of the WSN system, which allows a fast programming of deployable WSN, a computer simulation analysis, and an efficient implementation. The DEC is actually implemented on an experimental wireless-sensor-network prototyping system. Both simulation and experimental results are presented to show the effectiveness and versatility of the developed control architecture.
PRP: peripheral routing protocol for WSN realistic marginal mobility model
NASA Astrophysics Data System (ADS)
Tudorache, I. G.; Popescu, A. M.; Kemp, A. H.
2017-02-01
This article proposes a new routing protocol called Peripheral Routing Protocol (PRP) for the scenario where the mobile destination (D) moves at the wireless sensor network (WSN) periphery for gathering data. From a connectivity point of view, when D follows the marginal mobility model (MMM), the WSN becomes a hybrid network: a sparse network, because of the interrupted connectivity between D and the rest of the nodes and a well-connected network, because of the connectivity between all the other nodes of the WSN except D. It will be proven through MATLAB simulations that, for a military application scenario where D's connectivity to the WSN varies between 10% and 95%, compared with the 100% case, PRP outperforms routing protocols recommended for Mobile Ad-hoc Networks (MANET) in three ways: it maintains an average Packet Delivery Ratio (PDR) over 90%, a below 10% and 5% increase for the Average End to End Delay (AETED) and energy per transmitted packet.
WISH: a Wireless Mobile Multimedia Information System in Healthcare using RFID.
Yu, Weider D; Ray, Pradeep; Motoc, Tiberiu
2008-05-01
It is important to improve the efficiency of healthcare-related operations and the associated costs. Healthcare organizations are constantly under increased pressure to streamline operations and provide enhanced services to their patients. Wireless mobile computing technology has the potential to provide the desired benefits and would be a critical part of today's healthcare information system. In this paper, a system is presented to better facilitate the functions of physicians and medical staff in healthcare by using modern wireless mobile technology, Radio Frequency Identification (RFID) tools, and multimedia streaming. The paper includes a case study of the development of such a system in the context of healthcare in the United States. The results of the study show how wireless mobile multimedia systems can be developed for the improvement of the quality and efficiency in healthcare for other nations as well. Our testing data show a time reduction of more than 50% in the daily activities of hospital staff.
The Security Aspects of Wireless Local Area Network (WLAN)
2003-09-01
by wireless links to enable devices to communicate. In a Bluetooth network, mobile routers control the changing network topologies of these... Bluetooth Bluetooth is a simple peer-to-peer protocol created to connect multiple consumer mobile information devices (cellular phones, laptops...technology [Ref 2]. Bluetooth enables mobile devices to avoid interference from other signals by hopping to a new frequency after transmitting or
The wireless networking system of Earthquake precursor mobile field observation
NASA Astrophysics Data System (ADS)
Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.
2012-12-01
The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within an acceptable range and do not affect real-time observation curve. After field running test and earthquake tracking project applications, the field mobile observation wireless networking system is operate normally, various function have good operability and show good performance, the quality of data transmission meet the system design requirements and play a significant role in practical applications.
NASA Technical Reports Server (NTRS)
Swank, Aaron J.; Bakula, Casey J.
2012-01-01
In the Fall of 2011, National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) participated in the Desert Research and Technology Studies (DRATS) field experiments held near Flagstaff, Arizona. The objective of the DRATS outing is to provide analog mission testing of candidate technologies for space exploration, especially those technologies applicable to human exploration of extra- terrestrial rocky bodies. These activities are performed at locations with similarities to extra-terrestrial conditions. This report describes the Extravehicular Activity (EVA) Dual-Band Radio Communication System which was demonstrated during the 2011 outing. The EVA radio system is designed to transport both voice and telemetry data through a mobile ad hoc wireless network and employs a dual-band radio configuration. Some key characteristics of this system include: 1. Dual-band radio configuration. 2. Intelligent switching between two different capability wireless networks. 3. Self-healing network. 4. Simultaneous data and voice communication.
Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
2007-09-01
A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.
2003-12-01
www.zdnet.com.au/printfriendly?AT=2000034884-20269647], Accessed May 2003. 223 world to include a tremendous variety of wireless and other mobile devices and...communicate with networks.227 With the growing popularity of an assortment of personal wireless devices such as cell phones , PDAs, and others...of service, often over wireless media and via mobile means. Further, such applications and services are becoming more and critical to the
Managing healthcare information using short message service (SMS) in wireless broadband networks
NASA Astrophysics Data System (ADS)
Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.
2007-03-01
Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei
2017-01-13
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.
Analysis and Testing of Mobile Wireless Networks
NASA Technical Reports Server (NTRS)
Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)
2002-01-01
Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.
Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alvarez, Rosio; Rodriguez, Juana Maria
2008-08-16
This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a samplemore » of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.« less
NASA Technical Reports Server (NTRS)
Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.
1988-01-01
The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.
A Two-Phase Coverage-Enhancing Algorithm for Hybrid Wireless Sensor Networks.
Zhang, Qingguo; Fok, Mable P
2017-01-09
Providing field coverage is a key task in many sensor network applications. In certain scenarios, the sensor field may have coverage holes due to random initial deployment of sensors; thus, the desired level of coverage cannot be achieved. A hybrid wireless sensor network is a cost-effective solution to this problem, which is achieved by repositioning a portion of the mobile sensors in the network to meet the network coverage requirement. This paper investigates how to redeploy mobile sensor nodes to improve network coverage in hybrid wireless sensor networks. We propose a two-phase coverage-enhancing algorithm for hybrid wireless sensor networks. In phase one, we use a differential evolution algorithm to compute the candidate's target positions in the mobile sensor nodes that could potentially improve coverage. In the second phase, we use an optimization scheme on the candidate's target positions calculated from phase one to reduce the accumulated potential moving distance of mobile sensors, such that the exact mobile sensor nodes that need to be moved as well as their final target positions can be determined. Experimental results show that the proposed algorithm provided significant improvement in terms of area coverage rate, average moving distance, area coverage-distance rate and the number of moved mobile sensors, when compare with other approaches.
A Two-Phase Coverage-Enhancing Algorithm for Hybrid Wireless Sensor Networks
Zhang, Qingguo; Fok, Mable P.
2017-01-01
Providing field coverage is a key task in many sensor network applications. In certain scenarios, the sensor field may have coverage holes due to random initial deployment of sensors; thus, the desired level of coverage cannot be achieved. A hybrid wireless sensor network is a cost-effective solution to this problem, which is achieved by repositioning a portion of the mobile sensors in the network to meet the network coverage requirement. This paper investigates how to redeploy mobile sensor nodes to improve network coverage in hybrid wireless sensor networks. We propose a two-phase coverage-enhancing algorithm for hybrid wireless sensor networks. In phase one, we use a differential evolution algorithm to compute the candidate’s target positions in the mobile sensor nodes that could potentially improve coverage. In the second phase, we use an optimization scheme on the candidate’s target positions calculated from phase one to reduce the accumulated potential moving distance of mobile sensors, such that the exact mobile sensor nodes that need to be moved as well as their final target positions can be determined. Experimental results show that the proposed algorithm provided significant improvement in terms of area coverage rate, average moving distance, area coverage–distance rate and the number of moved mobile sensors, when compare with other approaches. PMID:28075365
Migrating an Online Service to WAP - A Case Study.
ERIC Educational Resources Information Center
Klasen, Lars
2002-01-01
Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)
78 FR 61203 - Aviation Services
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-03
... 4, 2013. FOR FURTHER INFORMATION CONTACT: Tim Maguire, Mobility Division, Wireless... uses the SBA small business size standard for the category Wireless Telecommunications Carriers (except... wireless communications equipment manufacturers. The Census Bureau defines this category as follows: ``This...
On mobile wireless ad hoc IP video transports
NASA Astrophysics Data System (ADS)
Kazantzidis, Matheos
2006-05-01
Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.
Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo
2013-10-02
Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase.
Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo
2013-01-01
Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase. PMID:24152920
NASA Astrophysics Data System (ADS)
Ragone, Azzurra; Ruta, Michele; di Sciascio, Eugenio; Donini, Francesco M.
We present an approach to multi-issue bilateral negotiation for mobile commerce scenarios. The negotiation mechanism has been integrated in a semantic-based application layer enhancing both RFID and Bluetooth wireless standards. OWL DL has been used to model advertisements and relationships among issues within a shared common ontology. Finally, non standard inference services integrated with utility theory help in finding suitable agreements. We illustrate and motivate the provided theoretical framework in a wireless commerce case study.
A survey on bio inspired meta heuristic based clustering protocols for wireless sensor networks
NASA Astrophysics Data System (ADS)
Datta, A.; Nandakumar, S.
2017-11-01
Recent studies have shown that utilizing a mobile sink to harvest and carry data from a Wireless Sensor Network (WSN) can improve network operational efficiency as well as maintain uniform energy consumption by the sensor nodes in the network. Due to Sink mobility, the path between two sensor nodes continuously changes and this has a profound effect on the operational longevity of the network and a need arises for a protocol which utilizes minimal resources in maintaining routes between the mobile sink and the sensor nodes. Swarm Intelligence based techniques inspired by the foraging behavior of ants, termites and honey bees can be artificially simulated and utilized to solve real wireless network problems. The author presents a brief survey on various bio inspired swarm intelligence based protocols used in routing data in wireless sensor networks while outlining their general principle and operation.
A Mobile Sensor Network System for Monitoring of Unfriendly Environments.
Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo
2008-11-14
Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.
Fluid Analysis of Network Content Dissemination and Cloud Systems
2017-03-06
orchestration of multiple transfers , within the constraints of the communication substrate. In unstructured or aggressive environments where wireless ad...previous AFOSR/SOARD project, concerns peer-to-peer dissemination in wireless ad-hoc networks. We focus on the necessary tradeoff between an efficient...use of the network substrate, and the necessary reciprocity between peers, aspects that may be in conflict in the wireless setting. Our results
ERIC Educational Resources Information Center
Briggs, Linda L.
2006-01-01
Wireless and mobile technologies are now everywhere, and 24/7 computing is as pervasive a term as the actual capability promises to be. Sometimes, in fact, the push toward mobile technologies can seem overwhelming. But every wireless project doesn't have to involve redesigning the network and investing in mega-dollars worth of hardware and…
Implementing Wireless Mobile Instructional Labs: Planning Issues and Case Study
ERIC Educational Resources Information Center
McKimmy, Paul B.
2005-01-01
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
The Role of Wireless Computing Technology in the Design of Schools.
ERIC Educational Resources Information Center
Nair, Prakash
This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…
Using Wireless Devices to Enhance Reference and Information Services
ERIC Educational Resources Information Center
Forsyth, Ellen
2006-01-01
A growing number of libraries have installed wireless data connections as a way of providing access to the Internet for members of the public. Some libraries have used their wireless networks to enable staff to use wireless devices to increase their mobility, effectiveness and responsiveness to client need particularly in providing reference and…
NASA Technical Reports Server (NTRS)
Ely, Jay J.
2005-01-01
Electromagnetic interference (EMI) promises to be an ever-evolving concern for flight electronic systems. This paper introduces EMI and identifies its impact upon civil aviation radio systems. New wireless services, like mobile phones, text messaging, email, web browsing, radio frequency identification (RFID), and mobile audio/video services are now being introduced into passenger airplanes. FCC and FAA rules governing the use of mobile phones and other portable electronic devices (PEDs) on board airplanes are presented along with a perspective of how these rules are now being rewritten to better facilitate in-flight wireless services. This paper provides a comprehensive overview of NASA cooperative research with the FAA, RTCA, airlines and universities to obtain laboratory radiated emission data for numerous PED types, aircraft radio frequency (RF) coupling measurements, estimated aircraft radio interference thresholds, and direct-effects EMI testing. These elements are combined together to provide high-confidence answers regarding the EMI potential of new wireless products being used on passenger airplanes. This paper presents a vision for harmonizing new wireless services with aeronautical radio services by detecting, assessing, controlling and mitigating the effects of EMI.
Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network
NASA Astrophysics Data System (ADS)
Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre
2006-10-01
Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
NASA Astrophysics Data System (ADS)
Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos
2014-05-01
Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.
Competition in the domain of wireless networks security
NASA Astrophysics Data System (ADS)
Bednarczyk, Mariusz
2017-04-01
Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks
Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei
2017-01-01
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator’s mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost. PMID:28098748
Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurt Derr; Milos Manic
A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersionmore » of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.« less
Boarding Team Networking on the Move: Applying Unattended Relay Nodes
2014-09-01
below the main deck via a wireless ad-hoc network will enhance the situational awareness. Regarding the boarding of a non-compliant vessel, tracking...reaction time. 14. SUBJECT TERMS Maritime Interdiction Operations, Boarding Team Networking , Unattended Relay Nodes, Wireless Mesh Networks Onboard...the steel structures of naval vessels obstruct signals to propagate below the main deck. Extending the network below the main deck via a wireless ad
Advanced Networks in Motion Mobile Sensorweb
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David H.
2011-01-01
Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-05
...] Facilitating the Use of Microwave for Wireless Backhaul and Other Uses and Providing Additional Flexibility To... regulatory barriers and lowering costs for the wireless microwave backhaul facilities that are an important component of many mobile wireless networks. The steps we take will remove regulatory barriers that today...
ERIC Educational Resources Information Center
Jarvela, Sanna; Naykki, Piia; Laru, Jari; Luokkanen, Tiina
2007-01-01
In our recent research we have explored possibilities to scaffold collaborative learning in higher education with wireless networks and mobile tools. The pedagogical ideas are grounded on concepts of collaborative learning, including the socially shared origin of cognition, as well as self-regulated learning theory. This paper presents our three…
ERIC Educational Resources Information Center
Kim, Sang Hyun; Holmes, Kerry; Mims, Clif
2005-01-01
People commonly use technology in their daily lives. Within an increasingly complex society, individuals, organizations and other entities continue to look for new technologies that support their goals. Since the 1990s, there has been movement toward mobile wireless technology in education. Like the wired technology that came before, mobile…
A La Carts: You Want Wireless Mobility? Have a COW
ERIC Educational Resources Information Center
Villano, Matt
2006-01-01
Computers on wheels, or COWs, combine the wireless technology of today with the audio/visual carts of yesteryear for an entirely new spin on mobility. Increasingly used by districts with laptop computing initiatives, COWs are among the hottest high-tech sellers in schools today, according to market research firm Quality Education Data. In this…
Technology Acceptance Model for Wireless Internet.
ERIC Educational Resources Information Center
Lu, June; Yu, Chun-Sheng; Liu, Chang; Yao, James E.
2003-01-01
Develops a technology acceptance model (TAM) for wireless Internet via mobile devices (WIMD) and proposes that constructs, such as individual differences, technology complexity, facilitating conditions, social influences, and wireless trust environment determine user-perceived short and long-term usefulness, and ease of using WIMD. Twelve…
47 CFR 1.903 - Authorization required.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Wireless Radio Services... the Wireless Radio Services must be used and operated only in accordance with the rules applicable to... operate mobile or fixed stations in the Wireless Radio Services, except for certain stations in the Rural...
Development of fast wireless detection system for fixed offshore platform
NASA Astrophysics Data System (ADS)
Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping
2011-04-01
Offshore platforms' security is concerned since in 1950s and 1960s, and in the early 1980s some important specifications and standards are built, and all these provide technical basis of fixed platform design, construction, installation and evaluation. With the condition that more and more platforms are in serving over age, the research about the evaluation and detection technology of offshore platform has been a hotspot, especially underwater detection, and assessment method based on the finite element calculation. For fixed platform structure detection, conventional NDT methods, such as eddy current, magnetic powder, permeate, X-ray and ultrasonic, etc, are generally used. These techniques are more mature, intuitive, but underwater detection needs underwater robot, the necessary supporting tools of auxiliary equipment, and trained professional team, thus resources and cost used are considerable, installation time of test equipment is long. This project presents a new kind of fast wireless detection and damage diagnosis system for fixed offshore platform using wireless sensor networks, that is, wireless sensor nodes can be put quickly on the offshore platform, detect offshore platform structure global status by wireless communication, and then make diagnosis. This system is operated simply, suitable for offshore platform integrity states rapid assessment. The designed system consists in intelligence acquisition equipment and 8 wireless collection nodes, the whole system has 64 collection channels, namely every wireless collection node has eight 16-bit accuracy of A/D channels. Wireless collection node, integrated with vibration sensing unit, embedded low-power micro-processing unit, wireless transceiver unit, large-capacity power unit, and GPS time synchronization unit, can finish the functions such as vibration data collection, initial analysis, data storage, data wireless transmission. Intelligence acquisition equipment, integrated with high-performance computation unit, wireless transceiver unit, mobile power unit and embedded data analysis software, can totally control multi-wireless collection nodes, receive and analyze data, parameter identification. Data is transmitted at the 2.4GHz wireless communication channel, every sensing data channel in charge of data transmission is in a stable frequency band, control channel responsible for the control of power parameters is in a public frequency band. The test is initially conducted for the designed system, experimental results show that the system has good application prospects and practical value with fast arrangement, high sampling rate, high resolution, capacity of low frequency detection.
Mobile Wireless Sensor Networks for Advanced Soil Sensing and Ecosystem Monitoring
NASA Astrophysics Data System (ADS)
Mollenhauer, Hannes; Schima, Robert; Remmler, Paul; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter; Bumberger, Jan
2015-04-01
For an adequate characterization of ecosystems it is necessary to detect individual processes with suitable monitoring strategies and methods. Due to the natural complexity of all environmental compartments, single point or temporally and spatially fixed measurements are mostly insufficient for an adequate representation. The application of mobile wireless sensor networks for soil and atmosphere sensing offers significant benefits, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate (e.g. by using optimization approaches or event triggering modes) to the local test conditions. This can be essential for the monitoring of heterogeneous and dynamic environmental systems and processes. One significant advantage in the application of mobile ad-hoc wireless sensor networks is their self-organizing behavior. Thus, the network autonomously initializes and optimizes itself. Due to the localization via satellite a major reduction in installation and operation costs and time is generated. In addition, single point measurements with a sensor are significantly improved by measuring at several optimized points continuously. Since performing analog and digital signal processing and computation in the sensor nodes close to the sensors a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of nodes. Furthermore, the miniaturization of the nodes and energy harvesting are current topics under investigation. First results of field measurements are given to present the potentials and limitations of this application in environmental science. In particular, collected in-situ data with numerous specific soil and atmosphere parameters per sensor node (more than 25) recorded over several days illustrates the high performance of this system for advanced soil sensing and soil-atmosphere interaction monitoring. Moreover, investigations of biotic and abiotic process interactions and optimization of sensor positioning for measuring soil moisture are scopes of this work and initial results of these issues will be presented.
ERIC Educational Resources Information Center
Hayajneh, Thaier Saleh
2009-01-01
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
NASA Astrophysics Data System (ADS)
Zhou, Hao; Hirose, Mitsuhito; Greenwood, William; Xiao, Yong; Lynch, Jerome; Zekkos, Dimitrios; Kamat, Vineet
2016-04-01
Unmanned aerial vehicles (UAVs) can serve as a powerful mobile sensing platform for assessing the health of civil infrastructure systems. To date, the majority of their uses have been dedicated to vision and laser-based spatial imaging using on-board cameras and LiDAR units, respectively. Comparatively less work has focused on integration of other sensing modalities relevant to structural monitoring applications. The overarching goal of this study is to explore the ability for UAVs to deploy a network of wireless sensors on structures for controlled vibration testing. The study develops a UAV platform with an integrated robotic gripper that can be used to install wireless sensors in structures, drop a heavy weight for the introduction of impact loads, and to uninstall wireless sensors for reinstallation elsewhere. A pose estimation algorithm is embedded in the UAV to estimate the location of the UAV during sensor placement and impact load introduction. The Martlet wireless sensor network architecture is integrated with the UAV to provide the UAV a mobile sensing capability. The UAV is programmed to command field deployed Martlets, aggregate and temporarily store data from the wireless sensor network, and to communicate data to a fixed base station on site. This study demonstrates the integrated UAV system using a simply supported beam in the lab with Martlet wireless sensors placed by the UAV and impact load testing performed. The study verifies the feasibility of the integrated UAV-wireless monitoring system architecture with accurate modal characteristics of the beam estimated by modal analysis.
Huang, Shuo; Liu, Jing
2010-05-01
Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.
NASA Astrophysics Data System (ADS)
Lin, Chow-Sing; Yen, Fang-Zhi
With the rapid advances in wireless network communication, multimedia presentation has become more applicable. However, due to the limited wireless network resource and the mobility of Mobile Host (MH), QoS for wireless streaming is much more difficult to maintain. How to decrease Call Dropping Probability (CDP) in multimedia traffic while still keeping acceptable Call Block Probability (CBP) without sacrificing QoS has become an significant issue in providing wireless streaming services. In this paper, we propose a novel Dynamic Resources Adjustment (DRA) algorithm, which can dynamically borrow idle reserved resources in the serving cell or the target cell for handoffing MHs to compensate the shortage of bandwidth in media streaming. The experimental simulation results show that compared with traditional No Reservation (NR), and Resource Reservation in the six neighboring cells (RR-nb), and Resource Reservation in the target cell (RR-t), our proposed DRA algorithm can fully utilize unused reserved resources to effectively decrease the CDP while still keeping acceptable CBP with high bandwidth utilization.
Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.
Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili
2016-05-01
Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.
Hao, Zhuo; Zhong, Sheng; Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725
MWAHCA: a multimedia wireless ad hoc cluster architecture.
Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra
2014-01-01
Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.
Mobile collaborative medical display system.
Park, Sanghun; Kim, Wontae; Ihm, Insung
2008-03-01
Because of recent advances in wireless communication technologies, the world of mobile computing is flourishing with a variety of applications. In this study, we present an integrated architecture for a personal digital assistant (PDA)-based mobile medical display system that supports collaborative work between remote users. We aim to develop a system that enables users in different regions to share a working environment for collaborative visualization with the potential for exploring huge medical datasets. Our system consists of three major components: mobile client, gateway, and parallel rendering server. The mobile client serves as a front end and enables users to choose the visualization and control parameters interactively and cooperatively. The gateway handles requests and responses between mobile clients and the rendering server for efficient communication. Through the gateway, it is possible to share working environments between users, allowing them to work together in computer supported cooperative work (CSCW) mode. Finally, the parallel rendering server is responsible for performing heavy visualization tasks. Our experience indicates that some features currently available to our mobile clients for collaborative scientific visualization are limited due to the poor performance of mobile devices and the low bandwidth of wireless connections. However, as mobile devices and wireless network systems are experiencing considerable elevation in their capabilities, we believe that our methodology will be utilized effectively in building quite responsive, useful mobile collaborative medical systems in the very near future.
T2AR: trust-aware ad-hoc routing protocol for MANET.
Dhananjayan, Gayathri; Subbiah, Janakiraman
2016-01-01
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
An empirical analysis of the radio propagation characteristics in high-speed railway environment
NASA Astrophysics Data System (ADS)
Hu, Guoqing; Ma, Guangjin; Li, Chunlai; Xu, Yongchi; He, Jin; Yu, Ying; He, Yandong
2017-09-01
For a wireless mobile network, a profile of radio propagation characteristics is the key to study any wireless techniques, especially in High-Speed Railway (HSR) environment. Unfortunately, such a profile is not available so far, which leads manifold challenges to wireless study for HSR scenarios. In this paper, we focus on this topic, and try to obtain this profile in various kinds of HSR scenarios based on previous field tests in China. Our study reveals that the Line-Of-Sight (LOS) propagation path plays a predominant role in the HSR scenarios, which can suppress the shadow fading. Finally, we find out that each kind of small-scale fading effects has a unique profile on different wireless mobile systems for HSR scenarios. As a result, this study presents a theoretical guidance for studying any wireless techniques in HSR environment, e.g., cell handover for HSR.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... Spectrum Disaggregation Rules and Policies for Certain Wireless Radio Services AGENCY: Federal..., geographic partitioning, and spectrum disaggregation for certain Wireless Radio Services in an effort to... Counsel, Mobility Division, Wireless Telecommunications Bureau, at (202) 418- 0920, or e-mail at Richard...
47 CFR 1.903 - Authorization required.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Wireless Radio Services Applications and Proceedings Scope and Authority § 1.903 Authorization required. (a) General rule. Stations in the Wireless Radio Services must be used and operated only in accordance with... subscribers to operate mobile or fixed stations in the Wireless Radio Services, except for certain stations in...
47 CFR 1.903 - Authorization required.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Wireless Radio Services Applications and Proceedings Scope and Authority § 1.903 Authorization required. (a) General rule. Stations in the Wireless Radio Services must be used and operated only in accordance with... subscribers to operate mobile or fixed stations in the Wireless Radio Services, except for certain stations in...
47 CFR 1.903 - Authorization required.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Wireless Radio Services Applications and Proceedings Scope and Authority § 1.903 Authorization required. (a) General rule. Stations in the Wireless Radio Services must be used and operated only in accordance with... subscribers to operate mobile or fixed stations in the Wireless Radio Services, except for certain stations in...
76 FR 77747 - Amendment of the Commission's Rules Governing Hearing Aid-Compatible Mobile Handsets
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
... revisions to the Commission's wireless hearing aid compatibility rules. The Commission's rules define... digital wireless handsets. The proposed rules would adopt the revised version of the technical standard.... FOR FURTHER INFORMATION CONTACT: Michael Rowan, Wireless Telecommunications Bureau, (202) 418-1883...
75 FR 54546 - Amendment of the Commission's Rules Governing Hearing Aid-Compatible Mobile Handsets
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... revisions to the Commission's wireless hearing aid compatibility rules. The Commission initiates this proceeding to ensure that consumers with hearing loss are able to access wireless communications services.... FOR FURTHER INFORMATION CONTACT: John Borkowski, Wireless Telecommunications Bureau, (202) 418-0626, e...
The Brave New World of Wireless Technologies: A Primer for Educators.
ERIC Educational Resources Information Center
Boerner, Gerald L.
2002-01-01
Discusses the use of wireless local area networks (WLANs) on college campuses. Highlights include traditional wired networks; cost, speed, and reliability; wireless networking standards; mobility; installation speed, simplicity, and flexibility; reduced cost of ownership; scalability; security issues; and a glossary of WLAN terms. (LRW)
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
Wireless sensor network for wide-area high-mobility applications
NASA Astrophysics Data System (ADS)
del Castillo, Ignacio; Esper-Chaín, Roberto; Tobajas, Félix; de Armas, Valentín.
2013-05-01
In recent years, IEEE 802.15.4-based Wireless Sensor Networks (WSN) have experienced significant growth, mainly motivated by the standard features, such as small size oriented devices, low power consumption nodes, wireless communication links, and sensing and data processing capabilities. In this paper, the development, implementation and deployment of a novel fully compatible IEEE 802.15.4-based WSN architecture for applications operating over extended geographic regions with high node mobility support, is described. In addition, a practical system implementation of the proposed WSN architecture is presented and described for experimental validation and characterization purposes.
Probabilistic QoS Analysis In Wireless Sensor Networks
2012-04-01
and A.O. Fapojuwo. TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks . IEEE Trans. on Mobile...Research Computer Science and Engineering, Department of 5-1-2012 Probabilistic QoS Analysis in Wireless Sensor Networks Yunbo Wang University of...Wang, Yunbo, "Probabilistic QoS Analysis in Wireless Sensor Networks " (2012). Computer Science and Engineering: Theses, Dissertations, and Student
Wireless Communications in Reverberant Environments
2015-01-01
Secure Wireless Agent Testbed (SWAT), the Protocol Engineering Advanced Networking (PROTEAN) Research Group, the Data Fusion Laboratory (DFL), and the...constraints of their application. 81 Bibliography [1] V. Gungor and G. Hancke, “Industrial wireless sensor networks : Challenges, design principles, and...Bhattacharya, “Path loss estimation for a wireless sensor network for application in ship,” Int. J. of Comput. Sci. and Mobile Computing, vol. 2, no. 6, pp
47 CFR 2.1091 - Radiofrequency radiation exposure evaluation: mobile devices.
Code of Federal Regulations, 2010 CFR
2010-10-01
... transmission of a signal. In general, maximum average power levels must be used to determine compliance. (3) If... workers that can be easily re-located, such as wireless devices associated with a personal computer, are... Satellite Communications Services, the General Wireless Communications Service, the Wireless Communications...
ERIC Educational Resources Information Center
Zhao, Weiyi
2011-01-01
Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…
75 FR 54508 - Amendment of the Commission's Rules Governing Hearing Aid-Compatible Mobile Handsets
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... (FCC) adopts final rules governing wireless hearing aid compatibility that are intended to ensure that consumers with hearing loss are able to access wireless communications services through a wide selection of... Borkowski, Wireless Telecommunications Bureau, (202) 418-0626, e-mail [email protected] . For...
The Role of Wireless Computing Technology in the Design of Schools.
ERIC Educational Resources Information Center
Nair, Prakash
2003-01-01
After briefly describing the educational advantages of wireless networks using mobile computers, discusses the technical, operational, financial aspects of wireless local area networks (WLAN). Provides examples of school facilities designed for the use of WLAN. Includes a glossary of WLAN-related terms. (Contains 12 references.)
Scalable Architecture for Multihop Wireless ad Hoc Networks
NASA Technical Reports Server (NTRS)
Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee
2004-01-01
A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.
Ma, Junjie; Meng, Fansheng; Zhou, Yuexi; Wang, Yeyao; Shi, Ping
2018-02-16
Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths.
Zhou, Yuexi; Wang, Yeyao; Shi, Ping
2018-01-01
Pollution accidents that occur in surface waters, especially in drinking water source areas, greatly threaten the urban water supply system. During water pollution source localization, there are complicated pollutant spreading conditions and pollutant concentrations vary in a wide range. This paper provides a scalable total solution, investigating a distributed localization method in wireless sensor networks equipped with mobile ultraviolet-visible (UV-visible) spectrometer probes. A wireless sensor network is defined for water quality monitoring, where unmanned surface vehicles and buoys serve as mobile and stationary nodes, respectively. Both types of nodes carry UV-visible spectrometer probes to acquire in-situ multiple water quality parameter measurements, in which a self-adaptive optical path mechanism is designed to flexibly adjust the measurement range. A novel distributed algorithm, called Dual-PSO, is proposed to search for the water pollution source, where one particle swarm optimization (PSO) procedure computes the water quality multi-parameter measurements on each node, utilizing UV-visible absorption spectra, and another one finds the global solution of the pollution source position, regarding mobile nodes as particles. Besides, this algorithm uses entropy to dynamically recognize the most sensitive parameter during searching. Experimental results demonstrate that online multi-parameter monitoring of a drinking water source area with a wide dynamic range is achieved by this wireless sensor network and water pollution sources are localized efficiently with low-cost mobile node paths. PMID:29462929
ERIC Educational Resources Information Center
Feliciano-Torres, Hector L.
2017-01-01
The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution…
Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources
NASA Astrophysics Data System (ADS)
Hortos, William S.
2006-05-01
A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the algorithms from flat topologies to two-tier hierarchies of sensor nodes are presented. Results from a few simulations of the proposed algorithms are compared to the published results of other approaches to sensor network self-organization in common scenarios. The estimated network lifetime and extent under static resource allocations are computed.
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.
Niewiadomska-Szynkiewicz, Ewa; Sikora, Andrzej; Marks, Michał
2016-01-01
Using mobile robots or unmanned vehicles to assist optimal wireless sensors deployment in a working space can significantly enhance the capability to investigate unknown environments. This paper addresses the issues of the application of numerical optimization and computer simulation techniques to on-line calculation of a wireless sensor network topology for monitoring and tracking purposes. We focus on the design of a self-organizing and collaborative mobile network that enables a continuous data transmission to the data sink (base station) and automatically adapts its behavior to changes in the environment to achieve a common goal. The pre-defined and self-configuring approaches to the mobile-based deployment of sensors are compared and discussed. A family of novel algorithms for the optimal placement of mobile wireless devices for permanent monitoring of indoor and outdoor dynamic environments is described. They employ a network connectivity-maintaining mobility model utilizing the concept of the virtual potential function for calculating the motion trajectories of platforms carrying sensors. Their quality and utility have been justified through simulation experiments and are discussed in the final part of the paper. PMID:27649186
RACOON: a multiuser QoS design for mobile wireless body area networks.
Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen
2011-10-01
In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.
Niewiadomska-Szynkiewicz, Ewa; Sikora, Andrzej; Marks, Michał
2016-09-14
Using mobile robots or unmanned vehicles to assist optimal wireless sensors deployment in a working space can significantly enhance the capability to investigate unknown environments. This paper addresses the issues of the application of numerical optimization and computer simulation techniques to on-line calculation of a wireless sensor network topology for monitoring and tracking purposes. We focus on the design of a self-organizing and collaborative mobile network that enables a continuous data transmission to the data sink (base station) and automatically adapts its behavior to changes in the environment to achieve a common goal. The pre-defined and self-configuring approaches to the mobile-based deployment of sensors are compared and discussed. A family of novel algorithms for the optimal placement of mobile wireless devices for permanent monitoring of indoor and outdoor dynamic environments is described. They employ a network connectivity-maintaining mobility model utilizing the concept of the virtual potential function for calculating the motion trajectories of platforms carrying sensors. Their quality and utility have been justified through simulation experiments and are discussed in the final part of the paper.
Practical Issues of Wireless Mobile Devices Usage with Downlink Optimization
NASA Astrophysics Data System (ADS)
Krejcar, Ondrej; Janckulik, Dalibor; Motalova, Leona
Mobile device makers produce tens of new complex mobile devices per year to put users a special mobile device with a possibility to do anything, anywhere, anytime. These devices can operate full scale applications with nearly the same comfort as their desktop equivalents only with several limitations. One of such limitation is insufficient download on wireless connectivity in case of the large multimedia files. Main area of paper is in a possibilities description of solving this problem as well as the test of several new mobile devices along with server interface tests and common software descriptions. New devices have a full scale of wireless connectivity which can be used not only to communication with outer land. Several such possibilities of use are described. Mobile users will have also an online connection to internet all time powered on. Internet is mainly the web pages but the web services use is still accelerate up. The paper deal also with a possibility of maximum user amounts to have a connection at same time to current server type. At last the new kind of database access - Linq technology is compare to ADO.NET in response time meaning.
GIS management system of power plant staff based on wireless fidelity indoor location technology
NASA Astrophysics Data System (ADS)
Zhang, Ting
2017-05-01
The labor conditions and environment of electric power production are quite complicated. It is very difficult to realize the real-time supervision of the employees' working conditions and safety. Using the existing base stations in the power plant, the wireless fidelity network is established to realize the wireless coverage of the work site. We can use mobile phone to communicate and achieve positioning. The main content of this project is based on the special environment of the power plant, designed a suitable for ordinary Android mobile phone indoor wireless fidelity positioning system, real-time positioning and record the scene of each employee's movement trajectory, has achieved real-time staff check Gang, Staff in place, and for the safety of employees to provide a guarantee.
Giovanni, Mazza G; Shenvi, Rohit; Battles, Marcie; Orthner, Helmuth F
2008-11-06
The eMonitor is a component of the ePatient system; a prototype system used by emergency medical services (EMS) personnel in the field to record and transmits electronic patient care report (ePCR) information interactively. The eMonitor component allows each Mobile Data Terminal (MDT) on an unreliable Cisco MobileIP wireless network to securely send and received XML messages used to update patient information to and from the MDT before, during and after the transport of a patient.
Wireless Sensor Network With Geolocation
2006-11-01
WIRELESS SENSOR NETWORK WITH GEOLOCATION James Silverstrim and Roderick Passmore Innovative Wireless Technologies Forest, VA 24551 Dr...TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Wireless Sensor Network With Geolocation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...Locationing in distributed ad-hoc wireless sensor networks ”, IEEE ICASSP, May 2001. D. W. Hanson, Fundamentals of Two-Way Time Transfer by Satellite
Review: Security in Wireless Technologies in Business
NASA Astrophysics Data System (ADS)
Sattarova, F. Y.; Kim, Tai-Hoon
Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.
Challenges for Social Control in Wireless Mobile Grids
NASA Astrophysics Data System (ADS)
Balke, Tina; Eymann, Torsten
The evolution of mobile phones has lead to new wireless mobile grids that lack a central controlling instance and require the cooperation of autonomous entities that can voluntarily commit resources, forming a common pool which can be used in order to achieve common and/or individual goals. The social dilemma in such systems is that it is advantageous for rational users to access the common pool resources without any own commitment, since every commitment has its price (see ? for example). However, if a substantial number of users would follow this selfish strategy, the network itself would be at stake. Thus, the question arises on how cooperation can be fostered in wireless mobile grids. Whereas many papers have dealt with this question from a technical point of view, instead this paper will concentrate on a concept that has lately been discussed a lot with this regard: social control. Thereby social control concepts will be contrasted to technical approaches and resulting challenges (as well as possible solutions to these challenges) for social concepts will be discussed.
Mobile healthcare informatics.
Siau, Keng; Shen, Zixing
2006-06-01
Advances in wireless technology give pace to the rapid development of mobile applications. The coming mobile revolution will bring dramatic and fundamental changes to our daily life. It will influence the way we live, the way we do things, and the way we take care of our health. For the healthcare industry, mobile applications provide a new frontier in offering better care and services to patients, and a more flexible and mobile way of communicating with suppliers and patients. Mobile applications will provide important real time data for patients, physicians, insurers, and suppliers. In addition, it will revolutionalize the way information is managed in the healthcare industry and redefine the doctor - patient communication. This paper discusses different aspects of mobile healthcare. Specifically, it presents mobile applications in healthcare, and discusses possible challenges facing the development of mobile applications. Obstacles in developing mobile healthcare applications include mobile device limitations, wireless networking problems, infrastructure constraints, security concerns, and user distrust. Research issues in resolving or alleviating these problems are also discussed in the paper.
A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.
Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao
2017-07-04
Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.
NASA Astrophysics Data System (ADS)
Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.
2018-04-01
A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.
Mobile Learning: A Framework and Evaluation
ERIC Educational Resources Information Center
Motiwalla, Luvai F.
2007-01-01
Wireless data communications in form of Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers have gained global popularity, yet, not much has been done to extend the usage of these devices in electronic learning (e-learning). This project explores the extension of e-learning into wireless/handheld (W/H) computing devices with…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-06
... CONTACT: Peter Trachtenberg, Wireless Telecommunications Bureau, (202) 418-7369, e-mail Peter.Trachtenberg... e-mail and wireless broadband Internet access. The rule the Commission adopts today also serves the..., and the availability of data roaming will help ensure the viability of new wireless data network...
Operationalizing Mobile Applications for Humanitarian Assistance/Disaster Relief Missions
2014-03-01
FLAK, equipped with BGAN, WiMAX and meshed Wi-Fi gear. The group also brought power solutions such as solar cells, fuel cells, and wind turbines as...Open data kit sensors : Mobile data collection with wired and wireless sensors . Seattle, WA: Department of Computer Science and Engineering. Retrieved...activities taking place in the society. Over the years, communication has been modified from basic landlines to wireless schemes prevalent today, and
Roadside-based communication system and method
NASA Technical Reports Server (NTRS)
Bachelder, Aaron D. (Inventor)
2007-01-01
A roadside-based communication system providing backup communication between emergency mobile units and emergency command centers. In the event of failure of a primary communication, the mobile units transmit wireless messages to nearby roadside controllers that may take the form of intersection controllers. The intersection controllers receive the wireless messages, convert the messages into standard digital streams, and transmit the digital streams along a citywide network to a destination intersection or command center.
Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators
2014-03-01
formerly known as the Commercial Mobile Alert Service ( CMAS ) RDT&E program, is a collaborative partnership that includes the cellular industry, the...Examples illustrate a STRIDE analysis of the generic mission 1 The CMAS Alerting Pipeline Taxonomy describes in detail a hierarchical classification...SEI-2013-SR-018 | 1 1 Introduction The Wireless Emergency Alerts (WEA) service, formerly known as the Commercial Mobile Alert Service ( CMAS ), is a
Jaraíz-Simón, María D; Gómez-Pulido, Juan A; Vega-Rodríguez, Miguel A; Sánchez-Pérez, Juan M
2012-01-01
When a mobile wireless sensor is moving along heterogeneous wireless sensor networks, it can be under the coverage of more than one network many times. In these situations, the Vertical Handoff process can happen, where the mobile sensor decides to change its connection from a network to the best network among the available ones according to their quality of service characteristics. A fitness function is used for the handoff decision, being desirable to minimize it. This is an optimization problem which consists of the adjustment of a set of weights for the quality of service. Solving this problem efficiently is relevant to heterogeneous wireless sensor networks in many advanced applications. Numerous works can be found in the literature dealing with the vertical handoff decision, although they all suffer from the same shortfall: a non-comparable efficiency. Therefore, the aim of this work is twofold: first, to develop a fast decision algorithm that explores the entire space of possible combinations of weights, searching that one that minimizes the fitness function; and second, to design and implement a system on chip architecture based on reconfigurable hardware and embedded processors to achieve several goals necessary for competitive mobile terminals: good performance, low power consumption, low economic cost, and small area integration.
NASA Astrophysics Data System (ADS)
Latinovic, T. S.; Kalabic, S. B.; Barz, C. R.; Petrica, P. Paul; Pop-Vădean, A.
2018-01-01
This paper analyzes the influence of the Doppler Effect on the length of time to establish synchronization pseudorandom sequences in radio communications systems with an expanded spectrum. Also, this paper explores the possibility of using secure wireless communication for modular robots. Wireless communication could be used for local and global communication. We analyzed a radio communication system integrator, including the two effects of the Doppler signal on the duration of establishing synchronization of the received and locally generated pseudorandom sequence. The effects of the impact of the variability of the phase were analyzed between the said sequences and correspondence of the phases of these signals with the interval of time of acquisition of received sequences. An analysis of these impacts is essential in the transmission of signal and protection of the transfer of information in the communication systems with an expanded range (telecommunications, mobile telephony, Global Navigation Satellite System GNSS, and wireless communication). Results show that wireless communication can provide a safety approach for communication with mobile robots.
MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture
Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra
2014-01-01
Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996
NASA Astrophysics Data System (ADS)
Youn, Joo-Sang; Seok, Seung-Joon; Kang, Chul-Hee
This paper presents a new QoS model for end-to-end service provisioning in multi-hop wireless networks. In legacy IEEE 802.11e based multi-hop wireless networks, the fixed assignment of service classes according to flow's priority at every node causes priority inversion problem when performing end-to-end service differentiation. Thus, this paper proposes a new QoS provisioning model called Dynamic Hop Service Differentiation (DHSD) to alleviate the problem and support effective service differentiation between end-to-end nodes. Many previous works for QoS model through the 802.11e based service differentiation focus on packet scheduling on several service queues with different service rate and service priority. Our model, however, concentrates on a dynamic class selection scheme, called Per Hop Class Assignment (PHCA), in the node's MAC layer, which selects a proper service class for each packet, in accordance with queue states and service requirement, in every node along the end-to-end route of the packet. The proposed QoS solution is evaluated using the OPNET simulator. The simulation results show that the proposed model outperforms both best-effort and 802.11e based strict priority service models in mobile ad hoc environments.
Impact of network structure on the capacity of wireless multihop ad hoc communication
NASA Astrophysics Data System (ADS)
Krause, Wolfram; Glauche, Ingmar; Sollacher, Rudolf; Greiner, Martin
2004-07-01
As a representative of a complex technological system, the so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.
Optical wireless connected objects for healthcare.
Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne
2015-10-01
In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.
Wireless technology applied to GIS
NASA Astrophysics Data System (ADS)
Casademont, Jordi; Lopez-Aguilera, Elena; Paradells, Josep; Rojas, Alfonso; Calveras, Anna; Barceló, Francisco; Cotrina, Josep
2004-07-01
At present, there is a growing interest in wireless applications, due to the fact that the technology begins to support them at reasonable costs. In this paper, we present the technology currently available for use in wireless environments, focusing on Geographic Information Systems. As an example, we present a newly developed platform for the commercialization of advanced geographical information services for use in portable devices. This platform uses available mobile telephone networks and wireless local area networks, but it is completely scalable to new technologies such as third generation mobile networks. Users access the service using a vector map player that runs on a Personal Digital Assistant with wireless access facilities and a Global Positioning System receiver. Before accessing the information, the player will request authorization from the server and download the requested map from it, if necessary. The platform also includes a system for improving Global Positioning System localization with the Real Time Differential Global Positioning System, which uses short GSM messages as the transmission medium.
Specific absorption rate analysis of broadband mobile antenna with negative index metamaterial
NASA Astrophysics Data System (ADS)
Alam, Touhidul; Faruque, Mohammad Rashed Iqbal; Islam, Mohammad Tariqul
2016-03-01
This paper presents a negative index metamaterial-inspired printed mobile wireless antenna that can support most mobile applications such as GSM, UMTS, Bluetooth and WLAN frequency bands. The antenna consists of a semi-circular patch, a 50Ω microstrip feed line and metamaterial ground plane. The antenna occupies a very small space of 37 × 47 × 0.508 mm3, making it suitable for mobile wireless application. The perceptible novelty shown in this proposed antenna is that reduction of specific absorption rate using the negative index metamaterial ground plane. The proposed antenna reduced 72.11 and 75.53 % of specific absorption rate at 1.8 and 2.4 GHz, respectively.
47 CFR 1.1152 - Schedule of annual regulatory fees and filing locations for wireless radio services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... locations for wireless radio services. 1.1152 Section 1.1152 Telecommunication FEDERAL COMMUNICATIONS... Procedures for Payment § 1.1152 Schedule of annual regulatory fees and filing locations for wireless radio..., St. Louis, MO 63197-9000. General Mobile Radio Service (a) New, Renew/Mod (FCC 605 & 159) 5.00 FCC, P...
47 CFR 1.1152 - Schedule of annual regulatory fees and filing locations for wireless radio services.
Code of Federal Regulations, 2012 CFR
2012-10-01
... locations for wireless radio services. 1.1152 Section 1.1152 Telecommunication FEDERAL COMMUNICATIONS... Procedures for Payment § 1.1152 Schedule of annual regulatory fees and filing locations for wireless radio..., P.O. Box 979097, St. Louis, MO 63197-9000. General Mobile Radio Service: (a) New, Renew/Mod (FCC 605...
47 CFR 1.1152 - Schedule of annual regulatory fees and filing locations for wireless radio services.
Code of Federal Regulations, 2011 CFR
2011-10-01
... locations for wireless radio services. 1.1152 Section 1.1152 Telecommunication FEDERAL COMMUNICATIONS... Schedule of annual regulatory fees and filing locations for wireless radio services. Exclusive use services... (Electronic Filing) (FCC 601 & 159) 20.00 FCC,P.O. Box 979097,St. Louis, MO 63197-9000. General Mobile Radio...
47 CFR 1.1152 - Schedule of annual regulatory fees and filing locations for wireless radio services.
Code of Federal Regulations, 2013 CFR
2013-10-01
... locations for wireless radio services. 1.1152 Section 1.1152 Telecommunication FEDERAL COMMUNICATIONS... Procedures for Payment § 1.1152 Schedule of annual regulatory fees and filing locations for wireless radio..., P.O. Box 979097, St. Louis, MO 63197-9000. General Mobile Radio Service (a) New, Renew/Mod (FCC 605...
Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.
Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto
2017-07-07
This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.
1ST International Workshop on Managing Interactions in Smart Environments (MANSE 99)
1999-12-01
having diverse functionality. It seems likely that eventually the functionality of PDA’s and mobile phones will be integrated into similar sized devices ...The O’Reilly institute is soon to be wired with sensors and detection devices which will allow wireless communication and interaction with the...on wireless short-range communication. The prototypes are functionally self- contained mobile devices that do not rely on any further infrastructure
Alam, Touhidul; Faruque, Mohammad Rashed Iqbal; Islam, Mohammad Tariqul
2015-07-29
A double-negative metamaterial-inspired antenna is presented for mobile wireless applications. The antenna consists of a semi-circular radiating patch and a 3 × 4 hexagonal shaped metamaterial unit cell array in the ground plane. The antenna is fed with a 50 Ω microstrip feed line. The electric dimensions of the proposed antenna are 0.20λ × 0.26λ × 0.004λ, at the low-end frequency. The proposed antenna achieves a -10 dB impedance with a bandwidth of 2.29 GHz at the lower band and 1.28 GHz at the upper band and can operate for most of the mobile applications such as upper GSM bands, WiMAX, Bluetooth, and wireless local area network (WLAN) frequency bands. The focused novelties of the proposed antenna are its small size, multi-standard operating bands, and electromagnetic absorption reduction at all the operating frequencies using the double-negative metamaterial ground plane.
Challenges for Wireless Mesh Networks to provide reliable carrier-grade services
NASA Astrophysics Data System (ADS)
von Hugo, D.; Bayer, N.
2011-08-01
Provision of mobile and wireless services today within a competitive environment and driven by a huge amount of steadily emerging new services and applications is both challenge and chance for radio network operators. Deployment and operation of an infrastructure for mobile and wireless broadband connectivity generally requires planning effort and large investments. A promising approach to reduce expenses for radio access networking is offered by Wireless Mesh Networks (WMNs). Here traditional dedicated backhaul connections to each access point are replaced by wireless multi-hop links between neighbouring access nodes and few gateways to the backbone employing standard radio technology. Such a solution provides at the same time high flexibility in both deployment and the amount of offered capacity and shall reduce overall expenses. On the other hand currently available mesh solutions do not provide carrier grade service quality and reliability and often fail to cope with high traffic load. EU project CARMEN (CARrier grade MEsh Networks) was initiated to incorporate different heterogeneous technologies and new protocols to allow for reliable transmission over "best effort" radio channels, to support a reliable mobility and network management, self-configuration and dynamic resource usage, and thus to offer a permanent or temporary broadband access at high cost efficiency. The contribution provides an overview on preliminary project results with focus on main technical challenges from a research and implementation point of view. Especially impact of mesh topology on the overall system performance in terms of throughput and connection reliability and aspects of a dedicated hybrid mobility management solution will be discussed.
Intrusion detection and monitoring for wireless networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.
Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wirelessmore » networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.« less
Autonomous distributed self-organization for mobile wireless sensor networks.
Wen, Chih-Yu; Tang, Hung-Kai
2009-01-01
This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.
An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks
NASA Astrophysics Data System (ADS)
Zhong, Peijun; Ruan, Feng
2018-03-01
With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.
Wu, Chunxue; Wu, Wenliang; Wan, Caihua
2017-01-01
Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications. PMID:29099793
A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks
Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao
2017-01-01
Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network. PMID:28677639
47 CFR 90.1319 - Policies governing the use of the 3650-3700 MHz band.
Code of Federal Regulations, 2012 CFR
2012-10-01
... AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650... identifying the locations of registered stations will be available at http://wireless.fcc.gov/uls. Licensees...
47 CFR 90.1319 - Policies governing the use of the 3650-3700 MHz band.
Code of Federal Regulations, 2011 CFR
2011-10-01
... AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650... identifying the locations of registered stations will be available at http://wireless.fcc.gov/uls. Licensees...
Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.
ERIC Educational Resources Information Center
Pierre, Samuel
2001-01-01
Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…
NASA Astrophysics Data System (ADS)
Wang, Shengling; Cui, Yong; Koodli, Rajeev; Hou, Yibin; Huang, Zhangqin
Due to the dynamics of topology and resources, Call Admission Control (CAC) plays a significant role for increasing resource utilization ratio and guaranteeing users' QoS requirements in wireless/mobile networks. In this paper, a dynamic multi-threshold CAC scheme is proposed to serve multi-class service in a wireless/mobile network. The thresholds are renewed at the beginning of each time interval to react to the changing mobility rate and network load. To find suitable thresholds, a reward-penalty model is designed, which provides different priorities between different service classes and call types through different reward/penalty policies according to network load and average call arrival rate. To speed up the running time of CAC, an Optimized Genetic Algorithm (OGA) is presented, whose components such as encoding, population initialization, fitness function and mutation etc., are all optimized in terms of the traits of the CAC problem. The simulation demonstrates that the proposed CAC scheme outperforms the similar schemes, which means the optimization is realized. Finally, the simulation shows the efficiency of OGA.
3.5G based mobile remote monitoring system.
Bajracharya, Aman; Gale, Timothy J; Stack, Clive R; Turner, Paul
2008-01-01
Low bandwidth has long been a reason for the unsuitability of wireless internet in telemedicine. However with the advent of extended third generation wireless as an economically accessible high speed network, more opportunities are being created in this area of telemedicine. This paper explores the opportunity created by the latest wireless broadband technology for remote monitoring of patients in the home.
Designing Robust and Resilient Tactical MANETs
2014-09-25
Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012
A Low-Cost Wireless Multi-Presentation on Single Screen in Classroom Using Raspberry Pi
ERIC Educational Resources Information Center
Yulianto, Budi; Layona, Rita; Dewi, Lusiana Citra
2017-01-01
Smartphone has become a daily necessity in supporting the mobility of users, including teachers and students. The need of users to make multi-presentation via a smartphone wirelessly does not fit with the cost and multiplatform support. This study aims to produce a solution by using Raspberry Pi as a wireless digital media player that will be…
Top 6 Wireless Challenges: How Schools Are Improving Their Mobile Infrastructure
ERIC Educational Resources Information Center
Schaffhauser, Dian
2012-01-01
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Real-Time and Secure Wireless Health Monitoring
Dağtaş, S.; Pekhteryev, G.; Şahinoğlu, Z.; Çam, H.; Challa, N.
2008-01-01
We present a framework for a wireless health monitoring system using wireless networks such as ZigBee. Vital signals are collected and processed using a 3-tiered architecture. The first stage is the mobile device carried on the body that runs a number of wired and wireless probes. This device is also designed to perform some basic processing such as the heart rate and fatal failure detection. At the second stage, further processing is performed by a local server using the raw data transmitted by the mobile device continuously. The raw data is also stored at this server. The processed data as well as the analysis results are then transmitted to the service provider center for diagnostic reviews as well as storage. The main advantages of the proposed framework are (1) the ability to detect signals wirelessly within a body sensor network (BSN), (2) low-power and reliable data transmission through ZigBee network nodes, (3) secure transmission of medical data over BSN, (4) efficient channel allocation for medical data transmission over wireless networks, and (5) optimized analysis of data using an adaptive architecture that maximizes the utility of processing and computational capacity at each platform. PMID:18497866
Game-theoretic approach for improving cooperation in wireless multihop networks.
Ng, See-Kee; Seah, Winston K G
2010-06-01
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehavior problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. However, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power, and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this paper, pricing, promiscuous listening, and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts, and packet acknowledgments under a lossy wireless multihop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. We also provide a proof of the viability of the model under a theoretical wireless environment. Finally, we show how the model can be applied to design a generic protocol which we call the Selfishness Resilient Resource Reservation protocol, and validate the effectiveness of this protocol in ensuring cooperation using simulations.
Miniaturised wireless smart tag for optical chemical analysis applications.
Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana
2014-01-01
A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.
RF Characteristics of Mica-Z Wireless Sensor Network Motes
2006-03-01
MICA-Z WIRELESS SENSOR NETWORK MOTES by Swee Jin Koh March 2006 Thesis Advisor: Gurminder Singh Thesis Co-Advisor: John C...Mica-Z Wireless Sensor Network Motes 6. AUTHOR(S) : Swee Jin Koh 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...ad-hoc deployment. 15. NUMBER OF PAGES 83 14. SUBJECT TERMS: Wireless Sensor Network 16. PRICE CODE 17. SECURITY CLASSIFICATION OF
Global Mobile Satellite Service Interference Analysis for the AeroMACS
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.; Apaza, Rafael D.; Hall, Ward; Phillips, Brent
2013-01-01
The AeroMACS (Aeronautical Mobile Airport Communications System), which is based on the IEEE 802.16-2009 mobile wireless standard, is envisioned as the wireless network which will cover all areas of airport surfaces for next generation air transportation. It is expected to be implemented in the 5091-5150 MHz frequency band which is also occupied by mobile satellite service uplinks. Thus the AeroMACS must be designed to avoid interference with this incumbent service. Simulations using Visualyse software were performed utilizing a global database of 6207 airports. Variations in base station and subscriber antenna distribution and gain pattern were examined. Based on these simulations, recommendations for global airport base station and subscriber antenna power transmission limitations are provided.
NASA Astrophysics Data System (ADS)
Adabi, Sepideh; Adabi, Sahar; Rezaee, Ali
According to the traditional definition of Wireless Sensor Networks (WSNs), static sensors have limited the feasibility of WSNs in some kind of approaches, so the mobility was introduced in WSN. Mobile nodes in a WSN come equipped with battery and from the point of deployment, this battery reserve becomes a valuable resource since it cannot be replenished. Hence, maximizing the network lifetime by minimizing the energy is an important challenge in Mobile WSN. Energy conservation can be accomplished by different approaches. In this paper, we presented an energy conservation solution based on Cellular Automata. The main objective of this solution is based on dynamically adjusting the transmission range and switching between operational states of the sensor nodes.
Spacecraft Will Communicate "on the Fly"
NASA Technical Reports Server (NTRS)
Laufenberg, Lawrence
2003-01-01
As NASA probes deeper into space, the distance between sensor and scientist increases, as does the time delay. NASA needs to close that gap, while integrating more spacecraft types and missions-from near-Earth orbit to deep space. To speed and integrate communications from space missions to scientists on Earth and back again. NASA needs a comprehensive, high-performance communications network. To this end, the CICT Programs Space Communications (SC) Project is providing technologies for building the Space Internet which will consist of large backbone network, mid-size access networks linked to the backbones, and smaller, ad-hoc network linked to the access network. A key component will be mobile, wireless networks for spacecraft flying in different configurations.
Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks
NASA Astrophysics Data System (ADS)
Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.
Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.
Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.
Han, Changcai; Yang, Jinsheng
2017-10-30
The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.
Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network
Han, Changcai; Yang, Jinsheng
2017-01-01
The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes. PMID:29084155
Smart border: ad-hoc wireless sensor networks for border surveillance
NASA Astrophysics Data System (ADS)
He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser
2011-06-01
Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.
ERIC Educational Resources Information Center
Simonic, Tomaz; Mlinar, Tomi
2000-01-01
Discusses the planning and provision of mobile communications in Slovenia and suggests areas that will be developed in the future. Topics include the global mobile market; digital mobile networks; evolution from voice to multimedia services; wireless application protocol; the Internet; general packet radio service; and universal mobile…
Broadband wireless, integrated services, and their application to intelligent transportation systems
DOT National Transportation Integrated Search
2000-06-01
This paper introduces some of the newer broadband wireless communications alternatives and describes how they could be used to provide high-speed connections between fixed, transportable, and mobile facilities. We also describe the new integrated ser...
A mobile robots experimental environment with event-based wireless communication.
Guinaldo, María; Fábregas, Ernesto; Farias, Gonzalo; Dormido-Canto, Sebastián; Chaos, Dictino; Sánchez, José; Dormido, Sebastián
2013-07-22
An experimental platform to communicate between a set of mobile robots through a wireless network has been developed. The mobile robots get their position through a camera which performs as sensor. The video images are processed in a PC and a Waspmote card sends the corresponding position to each robot using the ZigBee standard. A distributed control algorithm based on event-triggered communications has been designed and implemented to bring the robots into the desired formation. Each robot communicates to its neighbors only at event times. Furthermore, a simulation tool has been developed to design and perform experiments with the system. An example of usage is presented.
75 FR 40833 - Sunshine Act Meeting; Open Commission Meeting; Thursday, July 15, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-14
... OFFICE OF TITLE: Fixed and ENGINEERING AND Mobile services TECHNOLOGY, in the Mobile WIRELESS TELE... investment in the 2 GHz, Big LEO, and L-bands of the Mobile Satellite Service. 3 WIRELINE TITLE: Electronic...
Modeling Interdisciplinary Notion “Substance” with Information Model
NASA Astrophysics Data System (ADS)
Gnitetskaya, Tatyana; Ivanova, Elena; Kovalchuk, Natalya; Shutko, Yuliya; Dubovaya, Larisa; Karnaukhova, Elena
2017-12-01
Wireless mobile technologies have caused a tendency to use mobile devices in the learning process. However, delivery mode should be changed. This paper describes a method of uploadable semantic structures for students’ personal mobile devices that would ensure interdisciplinarity.
A wireless PDA-based physiological monitoring system for patient transport.
Lin, Yuan-Hsiang; Jan, I-Chien; Ko, Patrick Chow-In; Chen, Yen-Yu; Wong, Jau-Min; Jan, Gwo-Jen
2004-12-01
This paper proposes a mobile patient monitoring system, which integrates current personal digital assistant (PDA) technology and wireless local area network (WLAN) technology. At the patient's location, a wireless PDA-based monitor is used to acquire continuously the patient's vital signs, including heart rate, three-lead electrocardiography, and SpO2. Through the WLAN, the patient's biosignals can be transmitted in real-time to a remote central management unit, and authorized medical staffs can access the data and the case history of the patient, either by the central management unit or the wireless devices. A prototype of this system has been developed and implemented. The system has been evaluated by technical verification, clinical test, and user survey. The evaluation of performance yields a high degree of satisfaction (mean = 4.64, standard deviation--SD = 0.53 in a five-point Likert scale) of users who used the PDA-based system for intrahospital transport. The results also show that the wireless PDA model is superior to the currently used monitors both in mobility and in usability, and is, therefore, better suited to patient transport.
Localization Algorithms of Underwater Wireless Sensor Networks: A Survey
Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng
2012-01-01
In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs. PMID:22438752
Capacity on wireless quantum cellular communication system
NASA Astrophysics Data System (ADS)
Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen
2018-03-01
Quantum technology is making excellent prospects in future communication networks. Entanglement generation and purification are two major components in quantum networks. Combining these two techniques with classical cellular mobile communication, we proposed a novel wireless quantum cellular(WQC) communication system which is possible to realize commercial mobile quantum communication. In this paper, the architecture and network topology of WQC communication system are discussed, the mathematical model of WQC system is extracted and the serving capacity, indicating the ability to serve customers, is defined and calculated under certain circumstances.
iPads, droids, and bugs: Infection prevention for mobile handheld devices at the point of care.
Manning, Mary Lou; Davis, James; Sparnon, Erin; Ballard, Raylene M
2013-11-01
Health care providers are increasingly using wireless media tablets, such as the Apple iPad, especially in the hospital setting. In the absence of specific tablet disinfection guidelines the authors applied what is known about the contamination of other nonmedical mobile communication devices to create a "common sense" bundle to guide wireless media tablet infection prevention practices. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.
Engineering of Sensor Network Structure for Dependable Fusion
2014-08-15
Lossy Wireless Sensor Networks , IEEE/ACM Transactions on Networking , (04 2013): 0. doi: 10.1109/TNET.2013.2256795 Soumik Sarkar, Kushal Mukherjee...Phoha, Bharat B. Madan, Asok Ray. Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks , Journal of Parallel and Distributed...Deadline Constraints, IEEE Transactions on Automatic Control special issue on Wireless Sensor and Actuator Networks , (01 2011): 1. doi: Eric Keller
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
Handheld Devices: Toward a More Mobile Campus.
ERIC Educational Resources Information Center
Fallon, Mary A. C.
2002-01-01
Offers an overview of the acceptance and use of handheld personal computing devices on campus that connect wirelessly to the campus network. Considers access; present and future software applications; uses in medial education; faculty training needs; and wireless technology issues. (Author/LRW)
The Mobile Aircraft Maintenance Office Concept from a Wide Area Perspective
2003-03-01
significant improvements in wireless network data rates, and enhanced mobile application platforms offers an opportunity to effectively integrate m...hardware, and mobile application platforms housing the necessary middleware software comprise the mobile landscape. The m-business network...devices. Lastly, an investigation into mobile application platforms will reveal the middleware functionality required to successfully extend suitable e
An Exposition of Current Mobile Learning Design Guidelines and Frameworks
ERIC Educational Resources Information Center
Teall, Ed; Wang, Minjuan; Callaghan, Vic; Ng, Jason W. P.
2014-01-01
As mobile devices with wireless access become more readily available, learning delivered via mobile devices of all types must be designed to ensure successful learning. This paper first examines three questions related to the design of mobile learning: 1) what mobile learning (m-learning) guidelines can be identified in the current literature, 2)…
Efficient security mechanisms for mHealth applications using wireless body sensor networks.
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.
Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734
Impact of different cloud deployments on real-time video applications for mobile video cloud users
NASA Astrophysics Data System (ADS)
Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos
2015-02-01
The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical results are presented and discussed to quantify and explain the different impacts resulted from various cloud deployments, video application and wireless/mobile network setting, and user mobility. Additionally, this paper analyses the advantages, disadvantages, limitations and optimization techniques in various cloud networking deployments, in particular the cloudlet approach compared with the Internet cloud approach, with recommendations of optimized deployments highlighted. Finally, federated clouds and inter-cloud collaboration challenges and opportunities are discussed in the context of supporting real-time video applications for mobile users.
Alam, Touhidul; Faruque, Mohammad Rashed Iqbal; Islam, Mohammad Tariqul
2015-01-01
A double-negative metamaterial-inspired antenna is presented for mobile wireless applications. The antenna consists of a semi-circular radiating patch and a 3 × 4 hexagonal shaped metamaterial unit cell array in the ground plane. The antenna is fed with a 50 Ω microstrip feed line. The electric dimensions of the proposed antenna are 0.20λ × 0.26λ × 0.004λ, at the low-end frequency. The proposed antenna achieves a −10 dB impedance with a bandwidth of 2.29 GHz at the lower band and 1.28 GHz at the upper band and can operate for most of the mobile applications such as upper GSM bands, WiMAX, Bluetooth, and wireless local area network (WLAN) frequency bands. The focused novelties of the proposed antenna are its small size, multi-standard operating bands, and electromagnetic absorption reduction at all the operating frequencies using the double-negative metamaterial ground plane. PMID:28793474
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
A reconfigurable, wearable, wireless ECG system.
Borromeo, S; Rodriguez-Sanchez, C; Machado, F; Hernandez-Tamames, J A; de la Prieta, R
2007-01-01
New emerging concepts as "wireless hospital", "mobile healthcare" or "wearable telemonitoring" require the development of bio-signal acquisition devices to be easily integrated into the clinical routine. In this work, we present a new system for Electrocardiogram (ECG) acquisition and its processing, with wireless transmission on demand (either the complete ECG or only one alarm message, just in case a pathological heart rate detected). Size and power consumption are optimized in order to provide mobility and comfort to the patient. We have designed a modular hardware system and an autonomous platform based on a Field-Programmable Gate Array (FPGA) for developing and debugging. The modular approach allows to redesign the system in an easy way. Its adaptation to a new biomedical signal would only need small changes on it. The hardware system is composed of three layers that can be plugged/unplugged: communication layer, processing layer and sensor layer. In addition, we also present a general purpose end-user application developed for mobile phones or Personal Digital Assistant devices (PDAs).
Adaptive Bio-Inspired Wireless Network Routing for Planetary Surface Exploration
NASA Technical Reports Server (NTRS)
Alena, Richard I.; Lee, Charles
2004-01-01
Wireless mobile networks suffer connectivity loss when used in a terrain that has hills, and valleys when line of sight is interrupted or range is exceeded. To resolve this problem and achieve acceptable network performance, we have designed an adaptive, configurable, hybrid system to automatically route network packets along the best path between multiple geographically dispersed modules. This is very useful in planetary surface exploration, especially for ad-hoc mobile networks, where computational devices take an active part in creating a network infrastructure, and can actually be used to route data dynamically and even store data for later transmission between networks. Using inspiration from biological systems, this research proposes to use ant trail algorithms with multi-layered information maps (topographic maps, RF coverage maps) to determine the best route through ad-hoc network at real time. The determination of best route is a complex one, and requires research into the appropriate metrics, best method to identify the best path, optimizing traffic capacity, network performance, reliability, processing capabilities and cost. Real ants are capable of finding the shortest path from their nest to a food source without visual sensing through the use of pheromones. They are also able to adapt to changes in the environment using subtle clues. To use ant trail algorithms, we need to define the probability function. The artificial ant is, in this case, a software agent that moves from node to node on a network graph. The function to calculate the fitness (evaluate the better path) includes: length of the network edge, the coverage index, topology graph index, and pheromone trail left behind by other ant agents. Each agent modifies the environment in two different ways: 1) Local trail updating: As the ant moves between nodes it updates the amount of pheromone on the edge; and 2) Global trail updating: When all ants have completed a tour the ant that found the shortest route updates the edges in its path.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650-3700 MHz Band § 90.1301 Scope. This subpart sets out the regulations governing wireless operations in the 3650-3700 MHz band. It includes licensing...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650-3700 MHz Band § 90.1301 Scope. This subpart sets out the regulations governing wireless operations in the 3650-3700 MHz band. It includes licensing...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650-3700 MHz Band § 90.1301 Scope. This subpart sets out the regulations governing wireless operations in the 3650-3700 MHz band. It includes licensing...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the 3650-3700 MHz Band § 90.1301 Scope. This subpart sets out the regulations governing wireless operations in the 3650-3700 MHz band. It includes licensing...
Cross-layer model design in wireless ad hoc networks for the Internet of Things.
Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.
Cross-layer model design in wireless ad hoc networks for the Internet of Things
Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355
Mobile internet technologies and their application to intelligent transportation systems
DOT National Transportation Integrated Search
2003-01-01
The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...
Antenna Design Considerations for the Advanced Extravehicular Mobility Unit
NASA Technical Reports Server (NTRS)
Bakula, Casey J.; Theofylaktos, Onoufrios
2015-01-01
NASA is designing an Advanced Extravehicular Mobility Unit (AEMU)to support future manned missions beyond low-Earth orbit (LEO). A key component of the AEMU is the communications assembly that allows for the wireless transfer of voice, video, and suit telemetry. The Extravehicular Mobility Unit (EMU) currently used on the International Space Station (ISS) contains a radio system with a single omni-directional resonant cavity antenna operating slightly above 400 MHz capable of transmitting and receiving data at a rate of about 125 kbps. Recent wireless communications architectures are calling for the inclusion of commercial wireless standards such as 802.11 that operate in higher frequency bands at much higher data rates. The current AEMU radio design supports a 400 MHz band for low-rate mission-critical data and a high-rate band based on commercial wireless local area network (WLAN) technology to support video, communication with non-extravehicular activity (EVA) assets such as wireless sensors and robotic assistants, and a redundant path for mission-critical EVA data. This paper recommends the replacement of the existing EMU antenna with a new antenna that maintains the performance characteristics of the current antenna but with lower weight and volume footprints. NASA has funded several firms to develop such an antenna over the past few years, and the most promising designs are variations on the basic patch antenna. This antenna technology at UHF is considered by the authors to be mature and ready for infusion into NASA AEMU technology development programs.
Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey
Kumar, Sunil; Kambhatla, Kashyap; Hu, Fei; Lifson, Mark; Xiao, Yang
2008-01-01
New wireless technologies, such as wireless LAN and sensor networks, for telecardiology purposes give new possibilities for monitoring vital parameters with wearable biomedical sensors, and give patients the freedom to be mobile and still be under continuous monitoring and thereby better quality of patient care. This paper will detail the architecture and quality-of-service (QoS) characteristics in integrated wireless telecardiology platforms. It will also discuss the current promising hardware/software platforms for wireless cardiac monitoring. The design methodology and challenges are provided for realistic implementation. PMID:18604301
Ubiquitous computing for remote cardiac patient monitoring: a survey.
Kumar, Sunil; Kambhatla, Kashyap; Hu, Fei; Lifson, Mark; Xiao, Yang
2008-01-01
New wireless technologies, such as wireless LAN and sensor networks, for telecardiology purposes give new possibilities for monitoring vital parameters with wearable biomedical sensors, and give patients the freedom to be mobile and still be under continuous monitoring and thereby better quality of patient care. This paper will detail the architecture and quality-of-service (QoS) characteristics in integrated wireless telecardiology platforms. It will also discuss the current promising hardware/software platforms for wireless cardiac monitoring. The design methodology and challenges are provided for realistic implementation.
NASA Astrophysics Data System (ADS)
Islam, Shayla; Abdalla, Aisha H.; Habaebi, Mohamed H.; Latif, Suhaimi A.; Hassan, Wan H.; Hasan, Mohammad K.; Ramli, H. A. M.; Khalifa, Othman O.
2013-12-01
NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, "Signaling Storm" occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6.
Designed and User-Generated Activity in the Mobile Age
ERIC Educational Resources Information Center
Kukulska-Hulme, Agnes; Traxler, John; Pettit, John
2007-01-01
The paper addresses the question of how to design for learning taking place on mobile and wireless devices. The authors argue that learning activity designers need to consider the characteristics of mobile learning; at the same time, it is vital to realise that learners are already creating mobile learning experiences for themselves. Profound…
A Critical Review of 13 Years of Mobile Game-Based Learning
ERIC Educational Resources Information Center
Giannakas, Filippos; Kambourakis, Georgios; Papasalouros, Andreas; Gritzalis, Stefanos
2018-01-01
With the increasing popularity of smartphones and tablets, game-based learning (GBL) is undergoing a rapid shift to mobile platforms. This transformation is driven by mobility, wireless interfaces, and built-in sensors that these smart devices offer in order to enable blended and context-sensitive mobile learning (m-Learning) activities. Thus,…
Mobile Usability in Educational Contexts: What Have We Learnt?
ERIC Educational Resources Information Center
Kukulska-Hulme, Agnes
2007-01-01
The successful development of mobile learning is dependent on human factors in the use of new mobile and wireless technologies. The majority of mobile learning activity continues to take place on devices that were not designed with educational applications in mind, and usability issues are often reported. The paper reflects on progress in…
Mobile-IT Education (MIT.EDU): M-Learning Applications for Classroom Settings
ERIC Educational Resources Information Center
Sung, M.; Gips, J.; Eagle, N.; Madan, A.; Caneel, R.; DeVaul, R.; Bonsen, J.; Pentland, A.
2005-01-01
In this paper, we describe the Mobile-IT Education (MIT.EDU) system, which demonstrates the potential of using a distributed mobile device architecture for rapid prototyping of wireless mobile multi-user applications for use in classroom settings. MIT.EDU is a stable, accessible system that combines inexpensive, commodity hardware, a flexible…
Innovative Decentralized Decision-Making Enabling Capability on Mobile Edge Devices
2015-09-01
feasibility of adapting mobile device infrastructure into a future tactical cloud ecosystem. F. SCOPE The scope of this research is focused on the...critical to mobility : wireless infrastructure , the mobile device itself, and mobile applications” (Office of the Department of Defense Chief Information... Infrastructure to a Cost Effective and Platform Agnostic Environment; 3) Collaborate with DOD and Industry Partners to Develop a Classified Mobile Device
Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin
2013-01-01
Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience. PMID:24193101
Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility
Jin, Yichao; Vural, Serdar; Gluhak, Alexander; Moessner, Klaus
2013-01-01
This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines. PMID:24135992
A Mobile Robots Experimental Environment with Event-Based Wireless Communication
Guinaldo, María; Fábregas, Ernesto; Farias, Gonzalo; Dormido-Canto, Sebastián; Chaos, Dictino; Sánchez, José; Dormido, Sebastián
2013-01-01
An experimental platform to communicate between a set of mobile robots through a wireless network has been developed. The mobile robots get their position through a camera which performs as sensor. The video images are processed in a PC and a Waspmote card sends the corresponding position to each robot using the ZigBee standard. A distributed control algorithm based on event-triggered communications has been designed and implemented to bring the robots into the desired formation. Each robot communicates to its neighbors only at event times. Furthermore, a simulation tool has been developed to design and perform experiments with the system. An example of usage is presented. PMID:23881139
Fuzzy mobile-robot positioning in intelligent spaces using wireless sensor networks.
Herrero, David; Martínez, Humberto
2011-01-01
This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.
Location service for wireless network using improved RSS-based cellular localisation
NASA Astrophysics Data System (ADS)
Fayaz, Sara; Sarrafian, Sara
2014-06-01
Value-added services, especially in mobile environments, have recently become the key component of making more profit and attracting more subscribers. One of the most commonly used such service is location-based advertiser services. The main issue which should be considered in providing such services is determining the position of the mobile terminals precisely. In this paper, one pattern recognition localisation method based on the signal strength appropriated for implementing a location-based service is presented. The main aim is to introduce some practical solutions to decrease error and computational load and also eliminate the necessity of updating the database. Practical results illustrate high accuracy of this technique and its suitability to apply in such services. The mean error declines to 9.7 m and mean error corresponding to CDF = 67% and CDF = 95% are less than 11 m and 23 m, respectively. We also present a location-based advertising service, in which the customer's interests and local time are considered, in order to enhance the efficiency and individualism of this service.
2004-09-01
MESH VS . SIMPLE AD HOC AND MANET..............................................5 B. DESIRABLE CHARACTERISTICS OF WIRELESS MESH NETWORKS...Comparison of Mesh (top) vs . Traditional Wireless (bottom) .............26 Figure 7. UML Model of SensorML Components (From SenorML Models Paper) ......30...50 Figure 17. Latency Difference Example – OLSR vs . AODV
Response of Caenorhabditis elegans to wireless devices radiation exposure.
Fasseas, Michael K; Fragopoulou, Adamantia F; Manta, Areti K; Skouroliakou, Aikaterini; Vekrellis, Konstantinos; Margaritis, Lukas H; Syntichaki, Popi
2015-03-01
To examine the impact of electromagnetic radiation, produced by GSM (Global System for Mobile communications) mobile phones, Wi-Fi (Wireless-Fidelity) routers and wireless DECT (Digital Enhanced Cordless Telecommunications) phones, on the nematode Caenorhabditis elegans. We exposed synchronized populations, of different developmental stages, to these wireless devices at E-field levels below ICNIRP's (International Commission on Non-Ionizing Radiation Protection) guidelines for various lengths of time. WT (wild-type) and aging- or stress-sensitive mutant worms were examined for changes in growth, fertility, lifespan, chemotaxis, short-term memory, increased ROS (Reactive Oxygen Species) production and apoptosis by using fluorescent marker genes or qRT-PCR (quantitative Reverse Transcription-Polymerase Chain Reaction). No statistically significant differences were found between the exposed and the sham/control animals in any of the experiments concerning lifespan, fertility, growth, memory, ROS, apoptosis or gene expression. The worm appears to be robust to this form of (pulsed) radiation, at least under the exposure conditions used.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
Chandrasekhar, Arunkumar; Alluri, Nagamalleswara Rao; Sudhakaran, M S P; Mok, Young Sun; Kim, Sang-Jae
2017-07-20
A Smart Mobile Pouch Triboelectric Nanogenerator (SMP-TENG) is introduced as a promising eco-friendly approach for scavenging biomechanical energy for powering next generation intelligent devices and smart phones. This is a cost-effective and robust method for harvesting energy from human motion, by utilizing worn fabrics as a contact material. The SMP-TENG is capable of harvesting energy in two operational modes: lateral sliding and vertical contact and separation. Moreover, the SMP-TENG can also act as a self-powered emergency flashlight and self-powered pedometer during normal human motion. A wireless power transmission setup integrated with SMP-TENG is demonstrated. This upgrades the traditional energy harvesting device into a self-powered wireless power transfer SMP-TENG. The wirelessly transferred power can be used to charge a Li-ion battery and light LEDs. The SMP-TENG opens a wide range of opportunities in the field of self-powered devices and low maintenance energy harvesting systems for portable and wearable electronic gadgets.
Garrett, Bernard Mark; Jackson, Cathryn
2006-12-01
This paper outlines the development and evaluation of a wireless personal digital assistant (PDA) based clinical learning tool designed to promote professional reflection for health professionals. The "Clinical e-portfolio" was developed at the University of British Columbia School of Nursing to enable students immediately to access clinical expertise and resources remotely, and record their clinical experiences in a variety of media (text, audio and images). The PDA e-portfolio tool was developed to demonstrate the potential use of mobile networked technologies to support and improve clinical learning; promote reflective learning in practice; engage students in the process of knowledge translation; help contextualize and embed clinical knowledge whilst in the workplace; and to help prevent the isolation of students whilst engaged in supervised clinical practice. The mobile e-portfolio was developed to synchronise wirelessly with a user's personal Web based portfolio from any remote location where a cellular telephone signal or wireless (Wi-Fi) connection could be obtained. An evaluation of the tool was undertaken with nurse practitioner and medical students, revealing positive attitudes to the use of PDA based tools and portfolios, but limits to the use of the PDA portfolio due to the inherent interface restrictions of the PDA.
Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan
2016-01-01
Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.
Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.
Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai
2016-03-25
This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Akopian, David; D'Souza, Sunil
2006-02-01
Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.
NASA Astrophysics Data System (ADS)
Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.
2017-09-01
This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.
A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks
NASA Astrophysics Data System (ADS)
Kustiawan, I.; Purnama, W.
2018-02-01
Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.
Istepanian, R S H; Philip, N
2005-01-01
In this paper we describe some of the optimisation issues relevant to the requirements of high throughput of medical data and video streaming traffic in 3G wireless environments. In particular we present a challenging 3G mobile health care application that requires a demanding 3G medical data throughput. We also describe the 3G QoS requirement of mObile Tele-Echography ultra-Light rObot system (OTELO that is designed to provide seamless 3G connectivity for real-time ultrasound medical video streams and diagnosis from a remote site (robotic and patient station) manipulated by an expert side (specialists) that is controlling the robotic scanning operation and presenting a real-time feedback diagnosis using 3G wireless communication links.
Jones, R P; Conway, D H
2005-08-01
Electromagnetic interference produced by wireless communication can affect medical devices and hospital policies exist to address this risk. During the transfer of ventilated patients, these policies may be compromised by essential communication between base and receiving hospitals. Local wireless networks (e.g. Bluetooth) may reduce the 'spaghetti syndrome' of wires and cables seen on intensive care units, but also generate electromagnetic interference. The aim of this study was to investigate these effects on displayed and actual ventilator performance. Five ventilators were tested: Drager Oxylog 2000, BREAS LTV-1000, Respironics BiPAP VISION, Puritan Bennett 7200 and 840. Electromagnetic interference was generated by three devices: Simoco 8020 radio handset, Nokia 7210 and Nokia 6230 mobile phone, Nokia 6230 communicating via Bluetooth with a Palm Tungsten T Personal Digital Assistant. We followed the American National Standard Recommended Practice for On-Site, Ad Hoc Testing (ANSI C63) for electromagnetic interference. We used a ventilator tester, to simulate healthy adult lungs and measure ventilator performance. The communication device under test was moved in towards each ventilator from a distance of 1 m in six axes. Alarms or error codes on the ventilator were recorded, as was ventilator performance. All ventilators tested, except for the Respironics VISION, showed a display error when subjected to electromagnetic interference from the Nokia phones and Simoco radio. Ventilator performance was only affected by the radio which caused the Puritan Bennett 840 to stop functioning completely. The transfer ventilators' performance were not affected by radio or mobile phone, although the mobile phone did trigger a low-power alarm. Effects on intensive care ventilators included display reset, with the ventilator restoring normal display function within 2 s, and low-power/low-pressure alarms. Bluetooth transmission had no effect on the function of all the ventilators tested. In a clinical setting, high-power-output devices such as a two-way radio may cause significant interference in ventilator function. Medium-power-output devices such as mobile phones may cause minor alarm triggers. Low-power-output devices such as Bluetooth appear to cause no interference with ventilator function.
Performance analysis of medical video streaming over mobile WiMAX.
Alinejad, Ali; Philip, N; Istepanian, R H
2010-01-01
Wireless medical ultrasound streaming is considered one of the emerging application within the broadband mobile healthcare domain. These applications are considered as bandwidth demanding services that required high data rates with acceptable diagnostic quality of the transmitted medical images. In this paper, we present the performance analysis of a medical ultrasound video streaming acquired via special robotic ultrasonography system over emulated WiMAX wireless network. The experimental set-up of this application is described together with the performance of the relevant medical quality of service (m-QoS) metrics.
Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard
2007-01-01
Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.
An adaptive neural swarm approach for intrusion defense in ad hoc networks
NASA Astrophysics Data System (ADS)
Cannady, James
2011-06-01
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.
An Internet-style Approach to Managing Wireless Link Errors
2002-05-01
implementation I used. Jamshid Mahdavi and Matt Mathis, then at the Pittsburgh Super- computer Center, and Vern Paxson of the Lawrence Berkeley National...Exposition. IEEE CS Press, 2002. [19] P. Bhagwat, P. Bhattacharya, A. Krishna , and S. Tripathi. Enhancing throughput over wireless LANs using channel...performance over wireless networks at the link layer. ACM Mobile Networks and Applications, 5(1):57– 71, March 2000. [97] Vern Paxson and Mark Allman
Sun, Mingui; Burke, Lora E.; Baranowski, Thomas; Fernstrom, John D.; Zhang, Hong; Chen, Hsin-Chen; Bai, Yicheng; Li, Yuecheng; Li, Chengliu; Yue, Yaofeng; Li, Zhen; Nie, Jie; Sclabassi, Robert J.; Mao, Zhi-Hong; Jia, Wenyan
2015-01-01
Recently, wearable computers have become new members in the family of mobile electronic devices, adding new functions to those provided by smartphones and tablets. As “always-on” miniature computers in the personal space, they will play increasing roles in the field of healthcare. In this work, we present our development of eButton, a wearable computer designed as a personalized, attractive, and convenient chest pin in a circular shape. It contains a powerful microprocessor, numerous electronic sensors, and wireless communication links. We describe its design concepts, electronic hardware, data processing algorithms, and its applications to the evaluation of diet, physical activity and lifestyle in the study of obesity and other chronic diseases. PMID:25708374
Sun, Mingui; Burke, Lora E; Baranowski, Thomas; Fernstrom, John D; Zhang, Hong; Chen, Hsin-Chen; Bai, Yicheng; Li, Yuecheng; Li, Chengliu; Yue, Yaofeng; Li, Zhen; Nie, Jie; Sclabassi, Robert J; Mao, Zhi-Hong; Jia, Wenyan
2015-01-01
Recently, wearable computers have become new members in the family of mobile electronic devices, adding new functions to those provided by smart-phones and tablets. As "always-on" miniature computers in the personal space, they will play increasing roles in the field of healthcare. In this work, we present our development of eButton, a wearable computer designed as a personalized, attractive, and convenient chest pin in a circular shape. It contains a powerful microprocessor, numerous electronic sensors, and wireless communication links. We describe its design concepts, electronic hardware, data processing algorithms, and its applications to the evaluation of diet, physical activity and lifestyle in the study of obesity and other chronic diseases.
The Use of SMS Support in Programming Education
ERIC Educational Resources Information Center
Kert, Serhat Bahadir
2011-01-01
The rapid developments in the communication technologies today render possible the use of new technological support tools in learning processes. Wireless, or mobile wireless, technologies are the tools whose potential contributions to education are investigated. The potential effects of these technologies on learning are explored through studies…
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-03-15
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun
2018-01-01
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Socially Aware Heterogeneous Wireless Networks
Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos
2015-01-01
The development of smart cities has been the epicentre of many researchers’ efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users’ locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation. PMID:26110402
Development of a personal digital assistant-based wireless application in clinical practice.
Chen, Yen-Cheng; Chiu, Hou-Chang; Tsai, Ming-Dar; Chang, Hang; Chong, Chee-Fah
2007-02-01
Our study aims to develop a personal digital assistant (PDA)-based wireless application in medical information processing by using Bluetooth and IEEE 802.11b wireless standards and SyncML codes. In this study, an "integrated database access module" is used to provide a unified integrated access interface while consistency of wireless data transmission is achieved by using the standardized SyncML protocol. A prototype of the system has been developed, implemented, and tested for its mobility, usability, stability, and performance with questionnaire survey. Response time for browsing/searching was usually less than 3s. The average time intervals needed for data transmissions were 68.6+/-8.5s for Bluetooth and 47.0+/-4.8s for 802.11b. The five-point Likert scale (from 1=least to 5=most) questionnaire survey of 30 medical professionals yielded a high degree of satisfaction with the system's mobility (4.18+/-0.89), usability (4.69+/-0.90), stability (3.81+/-0.94), and performance (3.97+/-0.88). The results of our study suggested that PDA applications which exploit wireless communication are convenient and feasible in clinical practice.
National connected vehicle field infrastructure footprint analysis.
DOT National Transportation Integrated Search
2014-06-01
The fundamental premise of the connected vehicle initiative is that enabling wireless connectivity among vehicles, the infrastructure, and mobile devices will bring about transformative changes in safety, mobility, and the environmental impacts in th...
NASA Astrophysics Data System (ADS)
Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir
2007-09-01
In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness among error-free flows,(3)long term fairness among errored and error-free flows,(4)graceful degradation for leading flows and graceful compensation for lagging flows.
A Comprehensive Ubiquitous Healthcare Solution on an Android™ Mobile Device
Hii, Pei-Cheng; Chung, Wan-Young
2011-01-01
Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography) waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN). The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service. PMID:22163986
P300 speller BCI with a mobile EEG system: comparison to a traditional amplifier
NASA Astrophysics Data System (ADS)
De Vos, Maarten; Kroesen, Markus; Emkes, Reiner; Debener, Stefan
2014-06-01
Objective. In a previous study, we presented a low-cost, small and wireless EEG system enabling the recording of single-trial P300 amplitudes in a truly mobile, outdoor walking condition (Debener et al (2012 Psychophysiology 49 1449-53)). Small and wireless mobile EEG systems have substantial practical advantages as they allow for brain activity recordings in natural environments, but these systems may compromise the EEG signal quality. In this study, we aim to evaluate the EEG signal quality that can be obtained with the mobile system. Approach. We compared our mobile 14-channel EEG system with a state-of-the-art wired laboratory EEG system in a popular brain-computer interface (BCI) application. N = 13 individuals repeatedly performed a 6 × 6 matrix P300 spelling task. Between conditions, only the amplifier was changed, while electrode placement and electrode preparation, recording conditions, experimental stimulation and signal processing were identical. Main results. Analysis of training and testing accuracies and information transfer rate (ITR) revealed that the wireless mobile EEG amplifier performed as good as the wired laboratory EEG system. A very high correlation for testing ITR between both amplifiers was evident (r = 0.92). Moreover the P300 topographies and amplitudes were very similar for both devices, as reflected by high degrees of association (r > = 0.77). Significance. We conclude that efficient P300 spelling with a small, lightweight and quick to set up mobile EEG amplifier is possible. This technology facilitates the transfer of BCI applications from the laboratory to natural daily life environments, one of the key challenges in current BCI research.
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
NASA Astrophysics Data System (ADS)
Banerjee, Koushik; Sharma, Hemant; Sengupta, Anasuya
Wireless sensor networks (WSNs) are ad hoc wireless networks that are written off as spread out structure and ad hoc deployment. Sensor networks have all the rudimentary features of ad hoc networks but to altered points—for instance, considerably lesser movement and far more energy necessities. Commonly used technology for communication is radio frequency (RF) communications. Free-space optics (FSO) is relatively new technology which has the prospective to deliver remarkable increases in network lifetime of WSN. Hybrid RF/FSO communications has been suggested to decrease power consumption by a single sensor node. It is observed that security plays a very important role for either RF WSN or hybrid RF/FSO WSN as those are vulnerable to numerous threats. In this paper, various possible attacks in RF/FSO WSN are discussed and aimed to propose some way out from those attacks.
Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network
NASA Astrophysics Data System (ADS)
Xu, Xiao-Feng
2018-03-01
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.
An Adaptive QoS Routing Solution for MANET Based Multimedia Communications in Emergency Cases
NASA Astrophysics Data System (ADS)
Ramrekha, Tipu Arvind; Politis, Christos
The Mobile Ad hoc Networks (MANET) is a wireless network deprived of any fixed central authoritative routing entity. It relies entirely on collaborating nodes forwarding packets from source to destination. This paper describes the design, implementation and performance evaluation of CHAMELEON, an adaptive Quality of Service (QoS) routing solution, with improved delay and jitter performances, enabling multimedia communication for MANETs in extreme emergency situations such as forest fire and terrorist attacks as defined in the PEACE project. CHAMELEON is designed to adapt its routing behaviour according to the size of a MANET. The reactive Ad Hoc on-Demand Distance Vector Routing (AODV) and proactive Optimized Link State Routing (OLSR) protocols are deemed appropriate for CHAMELEON through their performance evaluation in terms of delay and jitter for different MANET sizes in a building fire emergency scenario. CHAMELEON is then implemented in NS-2 and evaluated similarly. The paper concludes with a summary of findings so far and intended future work.
Investigating the Determinants and Age and Gender Differences in the Acceptance of Mobile Learning
ERIC Educational Resources Information Center
Wang, Yi-Shun; Wu, Ming-Cheng; Wang, Hsiu-Yuan
2009-01-01
With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. M-learning is the delivery of learning to students anytime and anywhere through the use of wireless Internet and mobile devices. However, acceptance of m-learning by individuals is critical…
ERIC Educational Resources Information Center
Mtebe, Joel S.; Raisamo, Roope
2014-01-01
Recent penetration of mobile technologies and its services in East Africa has provided a new platform for institutions to widen access to education through mobile learning. Mobile technologies provide learners with flexibility and ubiquity to learn anytime and anywhere via wireless Internet. However, far too little research has been conducted to…
ERIC Educational Resources Information Center
Lan, Yu-Feng; Tsai, Pei-Wei; Yang, Shih-Hsien; Hung, Chun-Ling
2012-01-01
In recent years, researchers have conducted various studies on applying wireless networking technology and mobile devices in education settings. However, research on behavioral patterns in learners' online asynchronous discussions with mobile devices is limited. The purposes of this study are to develop a mobile learning system, mobile interactive…
Towards an Understanding of Mobile Website Contextual Usability and Its Impact on Mobile Commerce
ERIC Educational Resources Information Center
Hyman, Jack Alan
2012-01-01
An increasing number of technologies and applications have begun to focus on mobile computing and the wireless Web as a way to conduct commerce-oriented transactions. M-commerce Websites that are usability friendly must emphasize information quality, system quality, and service quality, as these are proxy measures to mobile commerce user…
Wearable Wireless Sensor for Multi-Scale Physiological Monitoring
2013-10-01
AD_________________ Award Number: W81XWH-12-1-0541 TITLE: Wearable Wireless Sensor for Multi-Scale...TYPE Annual 3. DATES COVERED 25 12- 13 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Wearable Wireless Sensor for Multi-Scale Physiological...peripheral management • Procedures for low power mode activation and wake - up • Routines for start- up state detection • Flash memory management
NASA Astrophysics Data System (ADS)
Nightingale, James; Wang, Qi; Grecos, Christos
2011-03-01
Users of the next generation wireless paradigm known as multihomed mobile networks expect satisfactory quality of service (QoS) when accessing streamed multimedia content. The recent H.264 Scalable Video Coding (SVC) extension to the Advanced Video Coding standard (AVC), offers the facility to adapt real-time video streams in response to the dynamic conditions of multiple network paths encountered in multihomed wireless mobile networks. Nevertheless, preexisting streaming algorithms were mainly proposed for AVC delivery over multipath wired networks and were evaluated by software simulation. This paper introduces a practical, hardware-based testbed upon which we implement and evaluate real-time H.264 SVC streaming algorithms in a realistic multihomed wireless mobile networks environment. We propose an optimised streaming algorithm with multi-fold technical contributions. Firstly, we extended the AVC packet prioritisation schemes to reflect the three-dimensional granularity of SVC. Secondly, we designed a mechanism for evaluating the effects of different streamer 'read ahead window' sizes on real-time performance. Thirdly, we took account of the previously unconsidered path switching and mobile networks tunnelling overheads encountered in real-world deployments. Finally, we implemented a path condition monitoring and reporting scheme to facilitate the intelligent path switching. The proposed system has been experimentally shown to offer a significant improvement in PSNR of the received stream compared with representative existing algorithms.
Assessment of Receiver Signal Strength Sensing for Location Estimation Based on Fisher Information
Nielsen, John; Nielsen, Christopher
2016-01-01
Currently there is almost ubiquitous availability of wireless signaling for data communications within commercial building complexes resulting in receiver signal strength (RSS) observables that are typically sufficient for generating viable location estimates of mobile wireless devices. However, while RSS observables are generally plentiful, achieving an accurate estimation of location is difficult due to several factors affecting the electromagnetic coupling between the mobile antenna and the building access points that are not modeled and hence contribute to the overall estimation uncertainty. Such uncertainty is typically mitigated with a moderate redundancy of RSS sensor observations in combination with other constraints imposed on the mobile trajectory. In this paper, the Fisher Information (FI) of a set of RSS sensor observations in the context of variables related to the mobile location is developed. This provides a practical method of determining the potential location accuracy for the given set of wireless signals available. Furthermore, the information value of individual RSS measurements can be quantified and the RSS observables weighted accordingly in estimation combining algorithms. The practical utility of using FI in this context was demonstrated experimentally with an extensive set of RSS measurements recorded in an office complex. The resulting deviation of the mobile location estimation based on application of weighted likelihood processing to the experimental RSS data was shown to agree closely with the Cramer Rao bound determined from the FI analysis. PMID:27669262
Assessment of the 802.11g Wireless Protocol for Lunar Surface Communications
NASA Technical Reports Server (NTRS)
Chelmins, David T.; Bguyen, Hung D.; Foore, Lawrence R.
2009-01-01
Future lunar surface missions supporting the NASA Vision for Space Exploration will rely on wireless networks to transmit voice and data. The ad hoc network architecture is of particular interest since it does not require a complex infrastructure. In this report, we looked at data performance over an ad hoc network with varying distances between Apple AirPort wireless cards. We developed a testing program to transmit data packets at precise times and then monitored the receive time to characterize connection delay, packet loss, and data rate. Best results were received for wireless links of less than 75 ft, and marginally acceptable (25-percent) packet loss was received at 150 ft. It is likely that better results will be obtained on the lunar surface because of reduced radiofrequency interference; however, higher power transmitters or receivers will be needed for significant performance gains.
Wireless powering and data telemetry for biomedical implants.
Young, Darrin J
2009-01-01
Wireless powering and data telemetry techniques for two biomedical implant studies based on (1) wireless in vivo EMG sensor for intelligent prosthetic control and (2) adaptively RF powered implantable bio-sensing microsystem for real-time genetically engineered mice monitoring are presented. Inductive-coupling-based RF powering and passive data telemetry is effective for wireless in vivo EMG sensing, where the internal and external RF coils are positioned with a small separation distance and fixed orientation. Adaptively controlled RF powering and active data transmission are critical for mobile implant application such as real-time physiological monitoring of untethered laboratory animals. Animal implant studies have been successfully completed to demonstrate the wireless and batteryless in vivo sensing capabilities.
NASA Technical Reports Server (NTRS)
Hang, Richard
2015-01-01
The presentation will overview NASA Armstrong Flight Research Centers flight test capabilities, which can provide various means for flight testing of passive and active wireless sensor systems, also, it will address the needs of the wireless data acquisition solutions for the centers flight instrumentation issues such as additional weight caused by added instrumentation wire bundles, connectors, wire cables routing, moving components, etc., that the Passive Wireless Sensor Technology Workshop may help. The presentation shows the constraints and requirements that the wireless sensor systems will face in the flight test applications.
Wireless communication and their mathematics
NASA Astrophysics Data System (ADS)
Komaki, Shozo
2015-05-01
Mobile phone and smart phone are penetrating into social use. To develop these system, various type of theoretical works based on mathematics are done, such as radio propagation theory, traffic theory, security coding and wireless device etc. In this speech, I will mention about the related mathematics and problems in it.
Wireless Technology in the Library: The RIT Experience: Overview of the Project.
ERIC Educational Resources Information Center
Pitkin, Pat
2001-01-01
Provides an overview of a project at RIT (Rochester Institute of Technology) that experimented with wireless technology, including laptop computers that circulate within the library building. Discusses project requirements, including ease of use, low maintenance, and low cost; motivation, including mobility; implementation; and benefits to the…
Wireless Security Within Hastily Formed Networks
2006-09-01
WLAN DEVICES (STEP ONE) ............34 1. Personal Firewalls..............................................................................34 2. Anti ...includes client devices , access points, network infrastructure, network management, and delivery of mobility services to maintain network security and...Technology Special Publication 800-48, Wireless Network Security, 802.11, Bluetooth , and Handheld Devices . Available at http://csrc.nist.gov
Teaching in a Wireless Learning Environment: A Case Study
ERIC Educational Resources Information Center
Liu, Tzu Chien
2007-01-01
Although wireless and mobile technology is regarded as a useful tool for enhancing student-centered learning, few studies have explored the factors that may affect the application of this emerging technology in classroom situations. Accordingly, this study selects three factors (instructional belief, instructional routine, and features of wireless…
ERIC Educational Resources Information Center
Seifert, Tami
2014-01-01
As the disparity between educational standards and reality outside educational institutions is increasing, alternative learning infrastructure such as mobile technologies are becoming more common, and are challenging long held, traditional modes of teaching. Educators' attitudes toward wireless devices are mixed. Wireless devices are perceived by…
The Hidden Costs of Wireless Computer Labs
ERIC Educational Resources Information Center
Daly, Una
2005-01-01
Various elementary schools and middle schools across the U.S. have purchased one or more mobile laboratories. Although the wireless labs have provided more classroom computing, teachers and technology aides still have mixed views about their cost-benefit ratio. This is because the proliferation of viruses and spyware has dramatically increased…
47 CFR 90.1333 - Restrictions on the operation of mobile and portable stations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 5 2012-10-01 2012-10-01 false Restrictions on the operation of mobile and portable stations. 90.1333 Section 90.1333 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the...
47 CFR 90.1333 - Restrictions on the operation of mobile and portable stations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Restrictions on the operation of mobile and portable stations. 90.1333 Section 90.1333 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Wireless Broadband Services in the...
& Imagery; includes NWS alerts and warnings No 6 Wireless Emergency Alerts (WEA) Mobile Phone Alerts & Warnings only No 7 Interactive NWS (iNWS) - NOTE 1 https://inws.ncep.noaa.gov/ Mobile Phone $$$$) Internet/ Mobile Phone Alerts and Warnings No 15 County or Local Emergency Management Telephone alert
Are You Ready for Mobile Learning?
ERIC Educational Resources Information Center
Corbeil, Joseph Rene; Valdes-Corbeil, Maria Elena
2007-01-01
Mobile learning is defined as the intersection of mobile computing (the application of small, portable, and wireless computing and communication devices) and e-learning (learning facilitated and supported through the use of information and communications technology). Consequently, it comes as no surprise that sooner or later people would begin to…
Effects of Short-Term Memory and Content Representation Type on Mobile Language Learning
ERIC Educational Resources Information Center
Chen, Nian-Shing; Hsieh, Sheng-Wen; Kinshuk
2008-01-01
Due to the rapid advancements in mobile communication and wireless technologies, many researchers and educators have started to believe that these emerging technologies can be leveraged to support formal and informal learning opportunities. Mobile language learning can be effectively implemented by delivering learning content through mobile…
Mobile Computing: Trends Enabling Virtual Management
ERIC Educational Resources Information Center
Kuyatt, Alan E.
2011-01-01
The growing power of mobile computing, with its constantly available wireless link to information, creates an opportunity to use innovative ways to work from any location. This technological capability allows companies to remove constraints of physical proximity so that people and enterprises can work together at a distance. Mobile computing is…
On the association between glioma, wireless phones, heredity and ionising radiation.
Carlberg, Michael; Hardell, Lennart
2012-09-01
We performed two case-control studies on brain tumours diagnosed during 1 January 1997 to 30 June 2000 and 1 July 2000 to 31 December 2003, respectively. Living cases and controls aged 20-80 years were included. An additional study was performed on deceased cases with a malignant brain tumour using deceased controls. Pooled results for glioma yielded for ipsilateral use of mobile phone odds ratio (OR)=2.9, 95% confidence interval (CI)=1.8-4.7 in the >10 years latency group. The corresponding result for cordless phone was OR=3.8, 95% CI=1.8-8.1. OR increased statistically significant for cumulative use of wireless phones per 100h and per year of latency. For high-grade glioma ipsilateral use of mobile phone gave OR=3.9, 95% CI=2.3-6.6 and cordless phone OR=5.5, 95% CI=2.3-13 in the >10 years latency group. Heredity for brain tumour gave OR=3.4, 95% CI=2.1-5.5 for glioma. There was no interaction with use of wireless phones. X-ray investigation of the head gave overall OR=1.3, 95% CI=1.1-1.7 for glioma without interaction with use of wireless phones or heredity. In conclusion use of mobile and cordless phone increased the risk for glioma with highest OR for ipsilateral use, latency >10 years and third tertile of cumulative use in hours. In total, the risk was highest in the age group <20 years for first use of a wireless phone. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
History of Antenna Technology for Mobile Communications in Korea
NASA Astrophysics Data System (ADS)
Min, Kyeong-Sik; Park, Chul-Keun; Kang, Suk-Youb
In this paper, we discuss the development of wireless and mobile communications in Korea, current technological trends, and the future outlook on technological developments. Since the introduction of the telegraph and the telephone in September 1885, Korea's wired and wireless communications industry has consistently developed for over 100 years. Since 1984, upon the provision of the mobile telecommunications service, the industry has seen drastic qualitative and quantitative growth in terms of both technical and economic aspects, which played a crucial role in the rapid growth of the digital industry in Korea. After the era of the analog cellular service based on the Advanced Mobile Phone System (AMPS), a precursor to the modern mobile service, Korea became the world's first country to commercialize Code Division Multiple Access (CDMA) in 1996 and succeeded in commercializing CDMA 2000 lx (IMT 2000) in 2001. With further developments in the mobile communication technology, the technology for antennas also saw drastic advancements. As the mobile antennas moved from the second to the third generation, they grew from external models to very small internal models. At the same time, they evolved into highly functional and high performance multiple band and wide band antennas. Furthermore, Korea was the first country to commercialize and offer the Wireless Broadband Internet (WiBro) service in 2006. By leading the wireless communications standardization and exerting remarkable efforts in research and development, Korea is consolidating its status as an Information Technology (IT) leader in the global market. The antenna's inherent importance will be further emphasized in the near future as it satisfies the performance and structural needs of portable terminals necessary for realizing the projected establishment of the ubiquitous world. It is thought that antenna technologies will not be limited to simple concepts as previously experienced but will utilize various kinds of materials that build the terminals' structure and framework. Moreover, studies will be performed with an emphasis on multiple band, multiple directivity, and ultra-wide band. Accordingly, antenna technologies to which new concepts are applied, such as SMART antenna and MIMO antenna technologies and meta-materials, will surely be effective alternatives.
Wireless data over RAM's Mobitex network
NASA Astrophysics Data System (ADS)
Khan, M. Mobeen
1995-12-01
Mobitex is a mobile data technology standard created by Eritel, now a wholly owned subsidiary of Ericsson, that has been in existence for about a decade. Originally designed as a low speed (1.2 kbps) data system with a voice dispatch overlay, it was significantly enhanced in 1990 for use in North America and the UK. The enhanced system is a data-only system using cellular architecture and multi-channel frequency reuse, store-and-forward capability, and an 8 kbps over-the-air data rate. The mission of RAM Mobile Data USA Limited Partnership ('RAM') is to provide high quality, cost efficient, wireless data communications solutions in its targeted market segments. RAM's Mobitex network is currently one of the two networks providing two way wireless data services nationwide using a long distance service provider of the customer's choice.
[Design of Smart Care Tele-Monitoring System for Mother and Fetus].
Xi, Haiyan; Gan, Guanghui; Zhang, Huilian; Chen, Chaomin
2015-03-01
To study and design a maternal and fetal monitoring system based on the cloud computing and internet of things, which can monitor and take smart care of the mother and fetus in 24 h. Using a new kind of wireless fetal monitoring detector and a mobile phone, thus the doctor can keep touch with hospital through internet. The mobile terminal was developed on the Android system, which accepted the data of fetal heart rate and uterine contraction transmitted from the wireless detector, exchange information with the server and display the monitoring data and the doctor's advice in real-time. The mobile phone displayed the fetal heart rate line and uterine contraction line in real-time, recorded the fetus' grow process. It implemented the real-time communication between the doctor and the user, through wireless communication technology. The system removes the constraint of traditional telephone cable for users, while the users can get remote monitoring from the medical institutions at home or in the nearest community at any time, providing health and safety guarantee for mother and fetus.
A seamless ubiquitous emergency medical service for crisis situations.
Lin, Bor-Shing
2016-04-01
In crisis situations, a seamless ubiquitous communication is necessary to provide emergency medical service to save people's lives. An excellent prehospital emergency medicine provides immediate medical care to increase the survival rate of patients. On their way to the hospital, ambulance personnel must transmit real-time and uninterrupted patient information to the hospital to apprise the physician of the situation and provide options to the ambulance personnel. In emergency and crisis situations, many communication channels can be unserviceable because of damage to equipment or loss of power. Thus, data transmission over wireless communication to achieve uninterrupted network services is a major obstacle. This study proposes a mobile middleware for cognitive radio (CR) for improving the wireless communication link. CRs can sense their operating environment and optimize the spectrum usage so that the mobile middleware can integrate the existing wireless communication systems with a seamless communication service in heterogeneous network environments. Eventually, the proposed seamless mobile communication middleware was ported into an embedded system, which is compatible with the actual network environment without the need for changing the original system architecture. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Yu, Hongli; Chen, Guilin; Zhao, Shenghui; Chang, Chih-Yung; Chin, Yu-Ting
2016-01-01
Energy recharging has received much attention in recent years. Several recharging mechanisms were proposed for achieving perpetual lifetime of a given Wireless Sensor Network (WSN). However, most of them require a mobile recharger to visit each sensor and then perform the recharging task, which increases the length of the recharging path. Another common weakness of these works is the requirement for the mobile recharger to stop at the location of each sensor. As a result, it is impossible for recharger to move with a constant speed, leading to inefficient movement. To improve the recharging efficiency, this paper takes “recharging while moving” into consideration when constructing the recharging path. We propose a Recharging Path Construction (RPC) mechanism, which enables the mobile recharger to recharge all sensors using a constant speed, aiming to minimize the length of recharging path and improve the recharging efficiency while achieving the requirement of perpetual network lifetime of a given WSN. Performance studies reveal that the proposed RPC outperforms existing proposals in terms of path length and energy utilization index, as well as visiting cycle. PMID:28025567
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
... requirements of 47 U.S.C. 214(e) for purposes of participating in the Mobility Fund. The same commenter also... process of ETC designation to facilitate participation in the Mobility Fund, making the ETC designation... advanced wireless networks to new areas as part of the Mobility Fund Phase I also will be making their...
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Chang, Hsun-Fang
2011-01-01
The advancement of mobile and wireless communication technologies has encouraged an increasing number of studies concerning mobile learning, in which students are able to learn via mobile devices without being limited by space and time; in particular, the students can be situated in a real-world scenario associated with the learning content.…
Experience of wireless local area network in a radiation oncology department.
Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan
2010-01-01
The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.
Hard Fusion Based Spectrum Sensing over Mobile Fading Channels in Cognitive Vehicular Networks
Hao, Li; Ni, Dadong; Tran, Quang Thanh
2018-01-01
An explosive growth in vehicular wireless applications gives rise to spectrum resource starvation. Cognitive radio has been used in vehicular networks to mitigate the impending spectrum starvation problem by allowing vehicles to fully exploit spectrum opportunities unoccupied by licensed users. Efficient and effective detection of licensed user is a critical issue to realize cognitive radio applications. However, spectrum sensing in vehicular environments is a very challenging task due to vehicle mobility. For instance, vehicle mobility has a large effect on the wireless channel, thereby impacting the detection performance of spectrum sensing. Thus, gargantuan efforts have been made in order to analyze the fading properties of mobile radio channel in vehicular environments. Indeed, numerous studies have demonstrated that the wireless channel in vehicular environments can be characterized by a temporally correlated Rayleigh fading. In this paper, we focus on energy detection for spectrum sensing and a counting rule for cooperative sensing based on Neyman-Pearson criteria. Further, we go into the effect of the sensing and reporting channel conditions on the sensing performance under the temporally correlated Rayleigh channel. For local and cooperative sensing, we derive some alternative expressions for the average probability of misdetection. The pertinent numerical and simulating results are provided to further validate our theoretical analyses under a variety of scenarios. PMID:29415452
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
Chun, Seung-Man; Park, Jong-Tae
2017-01-01
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.
Chun, Seung-Man; Park, Jong-Tae
2017-01-12
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
Performance evaluation of power control algorithms in wireless cellular networks
NASA Astrophysics Data System (ADS)
Temaneh-Nyah, C.; Iita, V.
2014-10-01
Power control in a mobile communication network intents to control the transmission power levels in such a way that the required quality of service (QoS) for the users is guaranteed with lowest possible transmission powers. Most of the studies of power control algorithms in the literature are based on some kind of simplified assumptions which leads to compromise in the validity of the results when applied in a real environment. In this paper, a CDMA network was simulated. The real environment was accounted for by defining the analysis area and the network base stations and mobile stations are defined by their geographical coordinates, the mobility of the mobile stations is accounted for. The simulation also allowed for a number of network parameters including the network traffic, and the wireless channel models to be modified. Finally, we present the simulation results of a convergence speed based comparative analysis of three uplink power control algorithms.
PHY-DLL dialogue: cross-layer design for optical-wireless OFDM downlink transmission
NASA Astrophysics Data System (ADS)
Wang, Xuguo; Li, Lee
2005-11-01
The use of radio over fiber to provide radio access has a number of advantages including the ability to deploy small, low-cost remote antenna units and ease of upgrade. And due to the great potential for increasing the capacity and quality of service, the combination of Orthogonal Frequency Division Multiplexing (OFDM) modulation and the sub-carrier multiplexed optical transmission is one of the best solutions for the future millimeter-wave mobile communication. And this makes the optimum utility of valuable radio resources essential. This paper devises a cross-layer adaptive algorithm for optical-wireless OFDM system, which takes into consideration not only transmission power limitation in the physical layer, but also traffic scheduling and user fairness at the data-link layer. According to proportional fairness principle and water-pouring theorem, we put forward the complete description of this cross-layer adaptive downlink transmission 6-step algorithm. Simulation results show that the proposed cross-layer algorithm outperforms the mere physical layer adaptive algorithm markedly. The novel scheme is able to improve performance of the packet success rate per time chip and average packet delay, support added active users.
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Riley, William T; Serrano, Katrina J; Nilsen, Wendy; Atienza, Audie A
2015-10-01
Recent advances in mobile and wireless technologies have made real-time assessments of health behaviors and their influences possible with minimal respondent burden. These tech-enabled real-time assessments provide the basis for intensively adaptive interventions (IAIs). Evidence of such studies that adjust interventions based on real-time inputs is beginning to emerge. Although IAIs are promising, the development of intensively adaptive algorithms generate new research questions, and the intensive longitudinal data produced by IAIs require new methodologies and analytic approaches. Research considerations and future directions for IAIs in health behavior research are provided.
Development of a mini-mobile digital radiography system by using wireless smart devices.
Jeong, Chang-Won; Joo, Su-Chong; Ryu, Jong-Hyun; Lee, Jinseok; Kim, Kyong-Woo; Yoon, Kwon-Ha
2014-08-01
The current technologies that trend in digital radiology (DR) are toward systems using portable smart mobile as patient-centered care. We aimed to develop a mini-mobile DR system by using smart devices for wireless connection into medical information systems. We developed a mini-mobile DR system consisting of an X-ray source and a Complementary Metal-Oxide Semiconductor (CMOS) sensor based on a flat panel detector for small-field diagnostics in patients. It is used instead of the systems that are difficult to perform with a fixed traditional device. We also designed a method for embedded systems in the development of portable DR systems. The external interface used the fast and stable IEEE 802.11n wireless protocol, and we adapted the device for connections with Picture Archiving and Communication System (PACS) and smart devices. The smart device could display images on an external monitor other than the monitor in the DR system. The communication modules, main control board, and external interface supporting smart devices were implemented. Further, a smart viewer based on the external interface was developed to display image files on various smart devices. In addition, the advantage of operators is to reduce radiation dose when using remote smart devices. It is integrated with smart devices that can provide X-ray imaging services anywhere. With this technology, it can permit image observation on a smart device from a remote location by connecting to the external interface. We evaluated the response time of the mini-mobile DR system to compare to mobile PACS. The experimental results show that our system outperforms conventional mobile PACS in this regard.
47 CFR 64.3100 - Restrictions on mobile service commercial messages.
Code of Federal Regulations, 2013 CFR
2013-10-01
... deliver goods or services, including product updates or upgrades, that the recipient is entitled to... wireless domain names list. CMRS providers must: (1) File any future updates to listings with the... on the list or last date of use; and (3) Certify that any domain name placed on the FCC's wireless...
47 CFR 64.3100 - Restrictions on mobile service commercial messages.
Code of Federal Regulations, 2012 CFR
2012-10-01
... deliver goods or services, including product updates or upgrades, that the recipient is entitled to... wireless domain names list. CMRS providers must: (1) File any future updates to listings with the... on the list or last date of use; and (3) Certify that any domain name placed on the FCC's wireless...
47 CFR 64.3100 - Restrictions on mobile service commercial messages.
Code of Federal Regulations, 2014 CFR
2014-10-01
... deliver goods or services, including product updates or upgrades, that the recipient is entitled to... wireless domain names list. CMRS providers must: (1) File any future updates to listings with the... on the list or last date of use; and (3) Certify that any domain name placed on the FCC's wireless...
A Conceptual Framework Based on Activity Theory for Mobile CSCL
ERIC Educational Resources Information Center
Zurita, Gustavo; Nussbaum, Miguel
2007-01-01
There is a need for collaborative group activities that promote student social interaction in the classroom. Handheld computers interconnected by a wireless network allow people who work on a common task to interact face to face while maintaining the mediation afforded by a technology-based system. Wirelessly interconnected handhelds open up new…
ERIC Educational Resources Information Center
Sage, Cindy; Burgio, Ernesto
2018-01-01
Mobile phones and other wireless devices that produce electromagnetic fields (EMF) and pulsed radiofrequency radiation (RFR) are widely documented to cause potentially harmful health impacts that can be detrimental to young people. New epigenetic studies are profiled in this review to account for some neurodevelopmental and neurobehavioral changes…
The Cybermobile: A Gateway for Public Access to Network-Based Information.
ERIC Educational Resources Information Center
Drumm, John E.; Groom, Frank M.
1997-01-01
Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-01
... FEDERAL COMMUNICATIONS COMMISSION [RM No. 11592; DA 10-278] Wireless Telecommunications Bureau... Telecommunications Bureau seeks comment on a petition for rulemaking asking the Commission to require that all mobile... Telecommunications Bureau, at (202) 418-1368. SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Public...
M-Learning: An Experiment in Using SMS to Support Learning New English Language Words
ERIC Educational Resources Information Center
Cavus, Nadire; Ibrahim, Dogan
2009-01-01
There is an increase use of wireless technologies in education all over the world. In fact, wireless technologies such as laptop computers, palmtop computers and mobile phones are revolutionizing education and transforming the traditional classroom-based learning and teaching into "anytime" and "anywhere" education. This paper investigates the use…
ERIC Educational Resources Information Center
Juliano, Benjoe A.; Sheel, Stephen J.
In this paper, potential applications of wireless data communications and mobile satellite technology are described which aim at improving education. The motivation behind this work is that the technology now exists for providing today's teachers and students with not only better access to educational facilities, but also instantaneous…
NASA Astrophysics Data System (ADS)
Hortos, William S.
2008-04-01
In previous work by the author, effective persistent and pervasive sensing for recognition and tracking of battlefield targets were seen to be achieved, using intelligent algorithms implemented by distributed mobile agents over a composite system of unmanned aerial vehicles (UAVs) for persistence and a wireless network of unattended ground sensors for pervasive coverage of the mission environment. While simulated performance results for the supervised algorithms of the composite system are shown to provide satisfactory target recognition over relatively brief periods of system operation, this performance can degrade by as much as 50% as target dynamics in the environment evolve beyond the period of system operation in which the training data are representative. To overcome this limitation, this paper applies the distributed approach using mobile agents to the network of ground-based wireless sensors alone, without the UAV subsystem, to provide persistent as well as pervasive sensing for target recognition and tracking. The supervised algorithms used in the earlier work are supplanted by unsupervised routines, including competitive-learning neural networks (CLNNs) and new versions of support vector machines (SVMs) for characterization of an unknown target environment. To capture the same physical phenomena from battlefield targets as the composite system, the suite of ground-based sensors can be expanded to include imaging and video capabilities. The spatial density of deployed sensor nodes is increased to allow more precise ground-based location and tracking of detected targets by active nodes. The "swarm" mobile agents enabling WSN intelligence are organized in a three processing stages: detection, recognition and sustained tracking of ground targets. Features formed from the compressed sensor data are down-selected according to an information-theoretic algorithm that reduces redundancy within the feature set, reducing the dimension of samples used in the target recognition and tracking routines. Target tracking is based on simplified versions of Kalman filtration. Accuracy of recognition and tracking of implemented versions of the proposed suite of unsupervised algorithms is somewhat degraded from the ideal. Target recognition and tracking by supervised routines and by unsupervised SVM and CLNN routines in the ground-based WSN is evaluated in simulations using published system values and sensor data from vehicular targets in ground-surveillance scenarios. Results are compared with previously published performance for the system of the ground-based sensor network (GSN) and UAV swarm.
Effects of Practice Type in the Here and Now Mobile Learning Environment
ERIC Educational Resources Information Center
Tutty, Jeremy I.; Martin, Florence
2014-01-01
This generation of technology is characterized by mobile and portable devices such as smartphones and tablet computers with wireless broadband access. Mobile technologies enable a new kind of learning called "here and now learning," where learners have access to information anytime and anywhere to perform authentic activities in the…
A design of wireless sensor networks for a power quality monitoring system.
Lim, Yujin; Kim, Hak-Man; Kang, Sanggil
2010-01-01
Power grids deal with the business of generation, transmission, and distribution of electric power. Recently, interest in power quality in electrical distribution systems has increased rapidly. In Korea, the communication network to deliver voltage, current, and temperature measurements gathered from pole transformers to remote monitoring centers employs cellular mobile technology. Due to high cost of the cellular mobile technology, power quality monitoring measurements are limited and data gathering intervals are large. This causes difficulties in providing the power quality monitoring service. To alleviate the problems, in this paper we present a communication infrastructure to provide low cost, reliable data delivery. The communication infrastructure consists of wired connections between substations and monitoring centers, and wireless connections between pole transformers and substations. For the wireless connection, we employ a wireless sensor network and design its corresponding data forwarding protocol to improve the quality of data delivery. For the design, we adopt a tree-based data forwarding protocol in order to customize the distribution pattern of the power quality information. We verify the performance of the proposed data forwarding protocol quantitatively using the NS-2 network simulator.
Joint Mobile Data Collection and Wireless Energy Transfer in Wireless Rechargeable Sensor Networks.
Zhong, Ping; Li, Ya-Ting; Liu, Wei-Rong; Duan, Gui-Hua; Chen, Ying-Wen; Xiong, Neal
2017-08-16
In wireless rechargeable sensor networks (WRSNs), there is a way to use mobile vehicles to charge node and collect data. It is a rational pattern to use two types of vehicles, one is for energy charging, and the other is for data collecting. These two types of vehicles, data collection vehicles (DCVs) and wireless charging vehicles (WCVs), are employed to achieve high efficiency in both data gathering and energy consumption. To handle the complex scheduling problem of multiple vehicles in large-scale networks, a twice-partition algorithm based on center points is proposed to divide the network into several parts. In addition, an anchor selection algorithm based on the tradeoff between neighbor amount and residual energy, named AS-NAE, is proposed to collect the zonal data. It can reduce the data transmission delay and the energy consumption for DCVs' movement in the zonal. Besides, we design an optimization function to achieve maximum data throughput by adjusting data rate and link rate of each node. Finally, the effectiveness of proposed algorithm is validated by numerical simulation results in WRSNs.
LoRa Mobile-To-Base-Station Channel Characterization in the Antarctic.
Gaelens, Johnny; Van Torre, Patrick; Verhaevert, Jo; Rogier, Hendrik
2017-08-18
Antarctic conditions demand that wireless sensor nodes are operational all year round and that they provide a large communication range of several tens of kilometers. LoRa technology operating in sub-GHz frequency bands implements these wireless links with minimal power consumption. The employed chirp spread spectrum modulation provides a large link budget, combined with the excellent radio-wave propagation characteristics in these bands. In this paper, an experimental wireless link from a mobile vehicle which transmits sensor data to a base station is measured and analyzed in terms of signal-to-noise ratio and packet loss. These measurements confirm the usefulness of LoRa technology for wireless sensor systems in polar regions. By deploying directional antennas at the base station, a range of up to 30 km is covered in case of Line-of-Sight radio propagation in both the 434 and 868 MHz bands. Varying terrain elevation is shown to be the dominating factor influencing the propagation, sometimes causing the Line-of-Sight path to be obstructed. Tropospheric radio propagation effects were not apparent in the measurements.
LoRa Mobile-To-Base-Station Channel Characterization in the Antarctic
Gaelens, Johnny; Van Torre, Patrick; Verhaevert, Jo
2017-01-01
Antarctic conditions demand that wireless sensor nodes are operational all year round and that they provide a large communication range of several tens of kilometers. LoRa technology operating in sub-GHz frequency bands implements these wireless links with minimal power consumption. The employed chirp spread spectrum modulation provides a large link budget, combined with the excellent radio-wave propagation characteristics in these bands. In this paper, an experimental wireless link from a mobile vehicle which transmits sensor data to a base station is measured and analyzed in terms of signal-to-noise ratio and packet loss. These measurements confirm the usefulness of LoRa technology for wireless sensor systems in polar regions. By deploying directional antennas at the base station, a range of up to 30 km is covered in case of Line-of-Sight radio propagation in both the 434 and 868 MHz bands. Varying terrain elevation is shown to be the dominating factor influencing the propagation, sometimes causing the Line-of-Sight path to be obstructed. Tropospheric radio propagation effects were not apparent in the measurements. PMID:28820477
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
Wang, Qiuhua
2017-01-01
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
Joint Mobile Data Collection and Wireless Energy Transfer in Wireless Rechargeable Sensor Networks
Li, Ya-Ting; Liu, Wei-Rong; Duan, Gui-Hua; Chen, Ying-Wen
2017-01-01
In wireless rechargeable sensor networks (WRSNs), there is a way to use mobile vehicles to charge node and collect data. It is a rational pattern to use two types of vehicles, one is for energy charging, and the other is for data collecting. These two types of vehicles, data collection vehicles (DCVs) and wireless charging vehicles (WCVs), are employed to achieve high efficiency in both data gathering and energy consumption. To handle the complex scheduling problem of multiple vehicles in large-scale networks, a twice-partition algorithm based on center points is proposed to divide the network into several parts. In addition, an anchor selection algorithm based on the tradeoff between neighbor amount and residual energy, named AS-NAE, is proposed to collect the zonal data. It can reduce the data transmission delay and the energy consumption for DCVs’ movement in the zonal. Besides, we design an optimization function to achieve maximum data throughput by adjusting data rate and link rate of each node. Finally, the effectiveness of proposed algorithm is validated by numerical simulation results in WRSNs. PMID:28813029
Nanotechnology enabled sensors and wireless sensing networks
NASA Astrophysics Data System (ADS)
Tsui, Ray; Zhang, Ruth; Mastroianni, Sal; Díaz Aguilar, Alvaro; Forzani, Erica; Tao, Nongjian
2009-05-01
The capabilities of future mobile communication devices will extend beyond merely transmitting and receiving voice, data, and video information. For example, first responders such as firefighters and emergency workers will wear environmentally- aware devices that will warn them of combustible and toxic gases as well as communicate that information wirelessly to the Command and Control Center. Similar sensor systems could alert warfighters of the presence of explosives or biological weapons. These systems can function either in the form of an individual stand-alone detector or part of a wireless sensor network. Novel sensors whose functionality is enhanced via nanotechnology will play a key role in realizing such systems. Such sensors are important because of their high sensitivity, low power consumption, and small size. This talk will provide an overview of some of the advances made in sensors through the use of nanotechnology, including those that make use of carbon nanotubes and nanoparticles. Their applicability in mobile sensing and wireless sensor networks for use in national security and public safety will be described. Other technical challenges associated with the development of such systems and networks will also be discussed.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Wang, Qiuhua
2017-02-04
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
Mobile phone based SCADA for industrial automation.
Ozdemir, Engin; Karacor, Mevlut
2006-01-01
SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.
NASA Astrophysics Data System (ADS)
1991-01-01
A technology utilization project led to the commercial adaptation of a Space Shuttle Orbiter wireless infrared voice communications system. The technology was adapted to a LAN system by Wilton Industries, one of the participants. Because the system is cable-free, installation charges are saved, and it can be used where cable is impractical. Resultant products include the IRplex 6000. Transceivers can be located anywhere and can include mobile receivers. The system provides wireless LAN coverage up to 44,000 square feet. applications include stock exchange communications, trade shows, emergency communications, etc.
Evaluation of wireless Local Area Networks
NASA Astrophysics Data System (ADS)
McBee, Charles L.
1993-09-01
This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.
Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burnette, John R.; Thibodeau, Christopher C.; Greitzer, Frank L.
2002-02-28
As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data betweenmore » the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.« less
Techno-Economic Analysis of FiWi Access Networks Based on 802.11ac WLAN and NG-PON2 Networks
NASA Astrophysics Data System (ADS)
Breskovic, Damir; Begusic, Dinko
2017-05-01
In this article, techno-economic analysis of a fiber-wireless access network is presented. With high bandwidth capacity of the gigabit passive optical network and with cost-effectiveness of very high throughput 802.11ac wireless local area networks that enable user mobility in the wireless segment, fiber-wireless access networks can be considered as an alternative to the fiber-to-the-home architecture for next generation access networks. Analysis based on the proposed scenario here, shows that a fiber-wireless access network is a more cost-effective solution in densely populated areas, but with some introduced improvements, even other geotypes can be considered as a commercially-viable solution.
Flexible network wireless transceiver and flexible network telemetry transceiver
Brown, Kenneth D.
2008-08-05
A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.
What is harmful for male fertility: cell phone or the wireless Internet?
Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın
2015-09-01
In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.
González-Parada, Eva; Cano-García, Jose; Aguilera, Francisco; Sandoval, Francisco; Urdiales, Cristina
2017-01-01
Autonomous mobile nodes in mobile wireless sensor networks (MWSN) allow self-deployment and self-healing. In both cases, the goals are: (i) to achieve adequate coverage; and (ii) to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage. PMID:28075364
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
González-Parada, Eva; Cano-García, Jose; Aguilera, Francisco; Sandoval, Francisco; Urdiales, Cristina
2017-01-09
Autonomous mobile nodes in mobile wireless sensor networks (MWSN) allow self-deployment and self-healing. In both cases, the goals are: (i) to achieve adequate coverage; and (ii) to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage.
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
An overview of wireless structural health monitoring for civil structures.
Lynch, Jerome Peter
2007-02-15
Wireless monitoring has emerged in recent years as a promising technology that could greatly impact the field of structural monitoring and infrastructure asset management. This paper is a summary of research efforts that have resulted in the design of numerous wireless sensing unit prototypes explicitly intended for implementation in civil structures. Wireless sensing units integrate wireless communications and mobile computing with sensors to deliver a relatively inexpensive sensor platform. A key design feature of wireless sensing units is the collocation of computational power and sensors; the tight integration of computing with a wireless sensing unit provides sensors with the opportunity to self-interrogate measurement data. In particular, there is strong interest in using wireless sensing units to build structural health monitoring systems that interrogate structural data for signs of damage. After the hardware and the software designs of wireless sensing units are completed, the Alamosa Canyon Bridge in New Mexico is utilized to validate their accuracy and reliability. To improve the ability of low-cost wireless sensing units to detect the onset of structural damage, the wireless sensing unit paradigm is extended to include the capability to command actuators and active sensors.
A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks
Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal
2014-01-01
Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107
NASA Astrophysics Data System (ADS)
Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.
2015-05-01
It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.
A vertical handoff decision algorithm based on ARMA prediction model
NASA Astrophysics Data System (ADS)
Li, Ru; Shen, Jiao; Chen, Jun; Liu, Qiuhuan
2012-01-01
With the development of computer technology and the increasing demand for mobile communications, the next generation wireless networks will be composed of various wireless networks (e.g., WiMAX and WiFi). Vertical handoff is a key technology of next generation wireless networks. During the vertical handoff procedure, handoff decision is a crucial issue for an efficient mobility. Based on auto regression moving average (ARMA) prediction model, we propose a vertical handoff decision algorithm, which aims to improve the performance of vertical handoff and avoid unnecessary handoff. Based on the current received signal strength (RSS) and the previous RSS, the proposed approach adopt ARMA model to predict the next RSS. And then according to the predicted RSS to determine whether trigger the link layer triggering event and complete vertical handoff. The simulation results indicate that the proposed algorithm outperforms the RSS-based scheme with a threshold in the performance of handoff and the number of handoff.
Transfer Error and Correction Approach in Mobile Network
NASA Astrophysics Data System (ADS)
Xiao-kai, Wu; Yong-jin, Shi; Da-jin, Chen; Bing-he, Ma; Qi-li, Zhou
With the development of information technology and social progress, human demand for information has become increasingly diverse, wherever and whenever people want to be able to easily, quickly and flexibly via voice, data, images and video and other means to communicate. Visual information to the people direct and vivid image, image / video transmission also been widespread attention. Although the third generation mobile communication systems and the emergence and rapid development of IP networks, making video communications is becoming the main business of the wireless communications, however, the actual wireless and IP channel will lead to error generation, such as: wireless channel multi- fading channels generated error and blocking IP packet loss and so on. Due to channel bandwidth limitations, the video communication compression coding of data is often beyond the data, and compress data after the error is very sensitive to error conditions caused a serious decline in image quality.
NASA Astrophysics Data System (ADS)
Trzcinski, Peter; Karanassios, Vassili
2016-05-01
During the last several years, the world has moved from wired communications (e.g., a wired ethernet, wired telephone) to wireless communications (e.g., cell phones, smart phones, tablets). However, data acquisition has lagged behind and for the most part, data in laboratory settings are still acquired using wired communications (or even plug in boards). In this paper, approaches that can be used for wireless data acquisition are briefly discussed using a conceptual model of a future, mobile, portable micro-instrument as an example. In addition, past, present and near-future generations of communications are discussed; processors, operating systems and benchmarks are reviewed; networks that may be used for data acquisition in the field are examined; and, the possibility of connecting sensor or micro-instrument networks to the internet of things is postulated.
PCS subscriber profile data and information requirements
NASA Astrophysics Data System (ADS)
Schumacher, Gregory D.
1996-01-01
Enhanced services for mobile subscribers are currently undergoing significant growth. This growth will continue to increase as more wireless serviceproviders enter the marketplace. Profit margins for basic service will fall as competition increases leading to interest in higher margin enhanced services. Likewise subscribers will demand enhanced services to further increase productivity over basic wire service. However there are limitations in today's network infrastructure defined by inter-system interface standards such as IS-41, GSM and WACS. These network limitations prevent enhanced services from being offered in the seamless and geographically ubiquitous fashion subscribers are familiar with in basic wireless service. This paper examines what are the needs of wireless enhanced services to be provided as subscribers want them. This paper then looks at the major inter-system interfaces available for mobility and call control in terms of how well these enhanced service needs are fulfilled.
Advanced mobility handover for mobile IPv6 based wireless networks.
Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime
2014-01-01
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma
Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliablemore » path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.« less
Schacht Hansen, M; Dørup, J
2001-01-01
The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.
Hansen, Michael Schacht
2001-01-01
Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946
Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori
Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.
Use of mobile data for weather-responsive traffic management models.
DOT National Transportation Integrated Search
2012-10-01
The evolution of telecommunications and wireless technologies has brought in new sources of traffic data (particularly mobile data generated by vehicle probes), which could offer a breakthrough in the quality and extent of traffic data. This study re...
Maglogiannis, Vasilis; Naudts, Dries; Shahid, Adnan; Giannoulis, Spilios; Laermans, Eric; Moerman, Ingrid
2017-08-31
On the road towards 5G, a proliferation of Heterogeneous Networks (HetNets) is expected. Sensor networks are of great importance in this new wireless era, as they allow interaction with the environment. Additionally, the establishment of the Internet of Things (IoT) has incredibly increased the number of interconnected devices and consequently the already massive wirelessly transmitted traffic. The exponential growth of wireless traffic is pushing the wireless community to investigate solutions that maximally exploit the available spectrum. Recently, 3rd Generation Partnership Project (3GPP) announced standards that permit the operation of Long Term Evolution (LTE) in the unlicensed spectrum in addition to the exclusive use of the licensed spectrum owned by a mobile operator. Alternatively, leading wireless technology developers examine standalone LTE operation in the unlicensed spectrum without any involvement of a mobile operator. In this article, we present a classification of different techniques that can be applied on co-located LTE and Wi-Fi networks. Up to today, Wi-Fi is the most widely-used wireless technology in the unlicensed spectrum. A review of the current state of the art further reveals the lack of cooperation schemes among co-located networks that can lead to more optimal usage of the available spectrum. This article fills this gap in the literature by conceptually describing different classes of cooperation between LTE and Wi-Fi. For each class, we provide a detailed presentation of possible cooperation techniques that can provide spectral efficiency in a fair manner.
Cooperation Techniques between LTE in Unlicensed Spectrum and Wi-Fi towards Fair Spectral Efficiency
Naudts, Dries; Shahid, Adnan; Giannoulis, Spilios; Laermans, Eric
2017-01-01
On the road towards 5G, a proliferation of Heterogeneous Networks (HetNets) is expected. Sensor networks are of great importance in this new wireless era, as they allow interaction with the environment. Additionally, the establishment of the Internet of Things (IoT) has incredibly increased the number of interconnected devices and consequently the already massive wirelessly transmitted traffic. The exponential growth of wireless traffic is pushing the wireless community to investigate solutions that maximally exploit the available spectrum. Recently, 3rd Generation Partnership Project (3GPP) announced standards that permit the operation of Long Term Evolution (LTE) in the unlicensed spectrum in addition to the exclusive use of the licensed spectrum owned by a mobile operator. Alternatively, leading wireless technology developers examine standalone LTE operation in the unlicensed spectrum without any involvement of a mobile operator. In this article, we present a classification of different techniques that can be applied on co-located LTE and Wi-Fi networks. Up to today, Wi-Fi is the most widely-used wireless technology in the unlicensed spectrum. A review of the current state of the art further reveals the lack of cooperation schemes among co-located networks that can lead to more optimal usage of the available spectrum. This article fills this gap in the literature by conceptually describing different classes of cooperation between LTE and Wi-Fi. For each class, we provide a detailed presentation of possible cooperation techniques that can provide spectral efficiency in a fair manner. PMID:28858243
Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure
Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.
2015-09-29
In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less
Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.
In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less
Evaluation of a Mobile Learning Organiser for University Students
ERIC Educational Resources Information Center
Corlett, Dan; Sharples, Mike; Bull, Susan; Chan, Tony
2005-01-01
This paper describes a 10-month trial of a mobile learning organiser, developed for use by university students. Implemented on a wireless-enabled Pocket PC hand-held computer, the organiser makes use of existing mobile applications as well as tools designed specifically for students to manage their learning. The trial set out to identify the…
ERIC Educational Resources Information Center
Chang, Chi-Cheng; Tseng, Kuo-Hung; Liang, Chaoyun; Yan, Chi-Fang
2013-01-01
Mobile learning aims to utilise communication devices such as mobile devices and wireless connection in combination with e-learning systems, allowing learners to experience convenient, instant and suitable learning at unrestricted time and place. Participants were 125 Taiwanese senior high school students, whose continuance intention was examined…
The Effects of Locus of Control on University Students' Mobile Learning Adoption
ERIC Educational Resources Information Center
Hsia, Jung-Wen
2016-01-01
Since mobile devices have become cheaper, easily accessible, powerful, and popular and the cost of wireless access has declined gradually, mobile learning (m-learning) has begun to spread rapidly. To further improve the effectiveness and efficiency of m-learning for university students, it is critical to understand whether they use m-learning.…
Blended Learning via Mobile Social Media & Implementation of "EDMODO" in Reading Classes
ERIC Educational Resources Information Center
Yagci, Tahsin
2015-01-01
Almost there is nowhere that we don't use permeated smart technology. Increasingly developing mobile and wireless innovations forced us to integrate them to all fields in our lives. The latest trend in education is now blended learning and applications of mobile learning in educational environments. Pervasive and augmented usage of social media…
ERIC Educational Resources Information Center
Khemaja, Maha; Taamallah, Aroua
2016-01-01
Current advances in portable devices and wireless technologies had drastically impacted mobile and pervasive computing development and use. Nowadays, mobile and or pervasive applications, are increasingly being used to support users' everyday activities. These apps either distributed or standalone are characterized by the variability of the…
E-Rate to Support Wireless E-Mail, Internet Calling
ERIC Educational Resources Information Center
Trotter, Andrew
2006-01-01
This article deals with federal E-rate program's support of school leaders' Blackberry habit. The Federal Communications Commission (FCC) has cleared the way to allow money from the $2.25 billion program of subsidies for school technology to apply to e-mail service for mobile, wireless devices, such as the BlackBerry, which are increasingly…
Exploiting node mobility for energy optimization in wireless sensor networks
NASA Astrophysics Data System (ADS)
El-Moukaddem, Fatme Mohammad
Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed implementations for several important network topologies and applications. Second, we consider the problem of minimizing the total energy consumption of a network. We design an iterative algorithm that improves a given configuration by relocating nodes to new positions. We show that this algorithm converges to the optimal configuration for the given transmission routes. Moreover, we propose an efficient distributed implementation that does not require explicit synchronization. Finally, we consider the problem of maximizing the lifetime of the network. We propose an approach that exploits the mobility of the nodes to balance the energy consumption throughout the network. We develop efficient algorithms for single and multiple round approaches. For all three problems, we evaluate the efficiency of our algorithms through simulations. Our simulation results based on realistic energy models obtained from existing mobile and static sensor platforms show that our approaches significantly improve the network's performance and outperform existing approaches.
Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals
NASA Astrophysics Data System (ADS)
Leontiev, I. V.
Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch-processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.
Impact of wireless communication on multimedia application performance
NASA Astrophysics Data System (ADS)
Brown, Kevin A.
1999-01-01
Multimedia applications and specifically voice and video conferencing tools are widely used in business communications, and are quickly being discovered by the consumer market as well. At the same time, wireless communication services such as PCS voice and cellular data are becoming very popular, leading to the desire to deploy multimedia applications in the wireless environment. Wireless links, however, exhibit several characteristics which are different from traditional wired networks. These include: dynamically changing bandwidth due to mobile host movement in and out of cell where bandwidth is shared, high rates of packet corruption and subsequent loss, and frequent are lengthy disconnections due to obstacles, fading, and movement between cells. In addition, these effects are short-lived and difficult to reproduce, leading to a lack of adequate testing and analysis for applications used in wireless environments.
Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok
2017-04-19
The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.
Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok
2017-01-01
The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms. PMID:28422084
Jeon, Hyeonjae; Park, Kwangjin; Hwang, Dae-Joon; Choo, Hyunseung
2009-01-01
Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs). They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS) approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA) system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR) that efficiently forwards (or relays) data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.
47 CFR 2.1091 - Radiofrequency radiation exposure evaluation: mobile devices.
Code of Federal Regulations, 2012 CFR
2012-10-01
...: mobile devices. 2.1091 Section 2.1091 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL... workers that can be easily re-located, such as wireless devices associated with a personal computer, are... that operate in the Cellular Radiotelephone Service, the Personal Communications Services, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-08
...; DA 12-271] Eligible Telecommunications Carrier Designation for Participation in Mobility Fund Phase I... Wireless Telecommunications and Wireline Competition Bureaus describe the process and requirements for applicants seeking Eligible Telecommunications Carrier (ETC) Designation from the Commission for...