Sample records for user generated wireless

  1. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    NASA Astrophysics Data System (ADS)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  2. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

    NASA Astrophysics Data System (ADS)

    Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.

    2016-05-01

    The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.

  3. Investigation of Doppler Effects on high mobility OFDM-MIMO systems with the support of High Altitude Platforms (HAPs)

    NASA Astrophysics Data System (ADS)

    Mohammed, H. A.; Sibley, M. J. N.; Mather, P. J.

    2012-05-01

    The merging of Orthogonal Frequency Division Multiplexing (OFDM) with Multiple-input multiple-output (MIMO) is a promising mobile air interface solution for next generation wireless local area networks (WLANs) and 4G mobile cellular wireless systems. This paper details the design of a highly robust and efficient OFDM-MIMO system to support permanent accessibility and higher data rates to users moving at high speeds, such as users travelling on trains. It has high relevance for next generation wireless local area networks (WLANs) and 4G mobile cellular wireless systems. The paper begins with a comprehensive literature review focused on both technologies. This is followed by the modelling of the OFDM-MIMO physical layer based on Simulink/Matlab that takes into consideration high vehicular mobility. Then the entire system is simulated and analysed under different encoding and channel estimation algorithms. The use of High Altitude Platform system (HAPs) technology is considered and analysed.

  4. Robust Rate Maximization for Heterogeneous Wireless Networks under Channel Uncertainties

    PubMed Central

    Xu, Yongjun; Hu, Yuan; Li, Guoquan

    2018-01-01

    Heterogeneous wireless networks are a promising technology in next generation wireless communication networks, which has been shown to efficiently reduce the blind area of mobile communication and improve network coverage compared with the traditional wireless communication networks. In this paper, a robust power allocation problem for a two-tier heterogeneous wireless networks is formulated based on orthogonal frequency-division multiplexing technology. Under the consideration of imperfect channel state information (CSI), the robust sum-rate maximization problem is built while avoiding sever cross-tier interference to macrocell user and maintaining the minimum rate requirement of each femtocell user. To be practical, both of channel estimation errors from the femtocells to the macrocell and link uncertainties of each femtocell user are simultaneously considered in terms of outage probabilities of users. The optimization problem is analyzed under no CSI feedback with some cumulative distribution function and partial CSI with Gaussian distribution of channel estimation error. The robust optimization problem is converted into the convex optimization problem which is solved by using Lagrange dual theory and subgradient algorithm. Simulation results demonstrate the effectiveness of the proposed algorithm by the impact of channel uncertainties on the system performance. PMID:29466315

  5. RUASN: a robust user authentication framework for wireless sensor networks.

    PubMed

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  6. Communications interface for wireless communications headset

    NASA Technical Reports Server (NTRS)

    Culotta, Jr., Anthony Joseph (Inventor); Seibert, Marc A. (Inventor)

    2004-01-01

    A universal interface adapter circuit interfaces, for example, a wireless communications headset with any type of communications system, including those that require push-to-talk (PTT) signaling. The interface adapter is comprised of several main components, including an RF signaling receiver, a microcontroller and associated circuitry for decoding and processing the received signals, and programmable impedance matching and line interfacing circuitry for interfacing a wireless communications headset system base to a communications system. A signaling transmitter, which is preferably portable (e.g., handheld), is employed by the wireless headset user to send signals to the signaling receiver. In an embodiment of the invention directed specifically to push-to-talk (PTT) signaling, the wireless headset user presses a button on the signaling transmitter when they wish to speak. This sends a signal to the microcontroller which decodes the signal and recognizes the signal as being a PTT request. In response, the microcontroller generates a control signal that closes a switch to complete a voice connection between the headset system base and the communications system so that the user can communicate with the communications system. With this arrangement, the wireless headset can be interfaced to any communications system that requires PTT signaling, without modification of the headset device. In addition, the interface adapter can also be configured to respond to or deliver any other types of signals, such as dual-tone-multiple-frequency (DTMF) tones, and on/off hook signals. The present invention is also scalable, and permits multiple wireless users to operate independently in the same environment through use of a plurality of the interface adapters.

  7. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    PubMed Central

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888

  8. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    PubMed

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  9. Techno-Economic Analysis of FiWi Access Networks Based on 802.11ac WLAN and NG-PON2 Networks

    NASA Astrophysics Data System (ADS)

    Breskovic, Damir; Begusic, Dinko

    2017-05-01

    In this article, techno-economic analysis of a fiber-wireless access network is presented. With high bandwidth capacity of the gigabit passive optical network and with cost-effectiveness of very high throughput 802.11ac wireless local area networks that enable user mobility in the wireless segment, fiber-wireless access networks can be considered as an alternative to the fiber-to-the-home architecture for next generation access networks. Analysis based on the proposed scenario here, shows that a fiber-wireless access network is a more cost-effective solution in densely populated areas, but with some introduced improvements, even other geotypes can be considered as a commercially-viable solution.

  10. Unobstructive Body Area Networks (BAN) for efficient movement monitoring.

    PubMed

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user.

  11. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taft, Cyrus W.; Manges, Wayne W; Sorge, John N

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to themore » end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and how end users can locate and use objective information for decision making.« less

  12. Introduction and comparison of next-generation mobile wireless technologies

    NASA Astrophysics Data System (ADS)

    Zaidi, Syed R.; Hussain, Shahab; Ali, M. A.; Sana, Ajaz; Saddawi, Samir; Carranza, Aparicio

    2010-01-01

    Mobile networks and services have gone further than voice-only communication services and are rapidly developing towards data-centric services. Emerging mobile data services are expected to see the same explosive growth in demand that Internet and wireless voice services have seen in recent years. To support such a rapid increase in traffic, active users, and advanced multimedia services implied by this growth rate along with the diverse quality of service (QoS) and rate requirements set by these services, mobile operator need to rapidly transition to a simple and cost-effective, flat, all IP-network. This has accelerated the development and deployment of new wireless broadband access technologies including fourth-generation (4G) mobile WiMAX and cellular Long-Term Evolution (LTE). Mobile WiMAX and LTE are two different (but not necessarily competing) technologies that will eventually be used to achieve data speeds of up to 100 Mbps. Speeds that are fast enough to potentially replace wired broadband connections with wireless. This paper introduces both of these next generation technologies and then compares them in the end.

  13. Unobstructive Body Area Networks (BAN) for Efficient Movement Monitoring

    PubMed Central

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user. PMID:23112726

  14. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Agan, Martin (Inventor); Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor)

    2015-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  15. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Jedrey, Thomas (Inventor); Agan, Martin (Inventor); Devereaux, Ann (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  16. User Needs and Advances in Space Wireless Sensing and Communications

    NASA Technical Reports Server (NTRS)

    Kegege, Obadiah

    2017-01-01

    Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions to other planets.

  17. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    NASA Astrophysics Data System (ADS)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness among error-free flows,(3)long term fairness among errored and error-free flows,(4)graceful degradation for leading flows and graceful compensation for lagging flows.

  18. Secure multiple access for indoor optical wireless communications with time-slot coding and chaotic phase.

    PubMed

    Liang, Tian; Wang, Ke; Lim, Christina; Wong, Elaine; Song, Tingting; Nirmalathas, Ampalavanapillai

    2017-09-04

    In this paper, we report a novel mechanism to simultaneously provide secure connections for multiple users in indoor optical wireless communication systems by employing the time-slot coding scheme together with chaotic phase sequence. The chaotic phase sequence is generated according to the logistic map and applied to each symbol to secure the transmission. Proof-of-concept experiments are carried out for multiple system capacities based on both 4-QAM and 16-QAM modulation formats, i.e. 1.25 Gb/s, 2 Gb/s and 2.5 Gb/s for 4-QAM, and 2.5 Gb/s, 3.33 Gb/s and 4 Gb/s for 16-QAM. Experimental results show that in all cases the added chaotic phase does not degrade the legitimate user's signal quality while the illegal user cannot detect the signal without the key.

  19. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.

    PubMed

    Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray

    2010-07-01

    Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.

  20. Radio-over-optical waveguide system-on-wafer for massive delivery capacity 5G MIMO access networks

    NASA Astrophysics Data System (ADS)

    Binh, Le N.

    2017-01-01

    Delivering maximum information capacity over MIMO antennae systems beam steering is critical so as to achieve the flexibility via beam steering, maximizing the number of users or community of users in Gb/s rate per user over distributed cloud-based optical-wireless access networks. This paper gives an overview of (i) demands of optical - wireless delivery with high flexibility, especially the beam steering of multi-Tbps information channels to information hungry community of users via virtualized beam steering MIMO antenna systems at the free-license mmW region; (ii) Proposing a novel photonic planar integrated waveguide systems composing several passive and active, passive and amplification photonic devices so as to generate mmW carrier and embedded baseband information channels to feed to antenna elements; (iii) Integration techniques to generate a radio over optical waveguide (RoOW) system-on-wafer (SoW) comprising MIMO planar antenna elements and associate photonic integrated circuits for both up- and down- links; (iv) Challenges encountered in the implementation of the SoW in both wireless and photonic domains; (v) Photonic modulation techniques to achieve maximum transmission capacity per wavelength per MIMO antenna system. (vi) A view on control-feedback systems for fast and accurate generation of phase pattern for MIMO beam steering via a bank of optical phase modulators to mmW carrier phases and their preservation in the converted mmW domain . (vi) The overall operational principles of the novel techniques and technologies based on the coherent mixing of two lightwave channels The entire SoW can be implemented on SOI Si-photonic technology or via hybrid integration. These technological developments and their pros- and cons- will be discussed to achieve 50Tera-bps over the extended 110 channel Cband single mode fiber with mmW centered at 58.6GHz and 7GHz free-license band.

  1. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.

    PubMed

    Van Torre, Patrick

    2016-09-08

    Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks.

  2. Wireless technology applied to GIS

    NASA Astrophysics Data System (ADS)

    Casademont, Jordi; Lopez-Aguilera, Elena; Paradells, Josep; Rojas, Alfonso; Calveras, Anna; Barceló, Francisco; Cotrina, Josep

    2004-07-01

    At present, there is a growing interest in wireless applications, due to the fact that the technology begins to support them at reasonable costs. In this paper, we present the technology currently available for use in wireless environments, focusing on Geographic Information Systems. As an example, we present a newly developed platform for the commercialization of advanced geographical information services for use in portable devices. This platform uses available mobile telephone networks and wireless local area networks, but it is completely scalable to new technologies such as third generation mobile networks. Users access the service using a vector map player that runs on a Personal Digital Assistant with wireless access facilities and a Global Positioning System receiver. Before accessing the information, the player will request authorization from the server and download the requested map from it, if necessary. The platform also includes a system for improving Global Positioning System localization with the Real Time Differential Global Positioning System, which uses short GSM messages as the transmission medium.

  3. Wireless sensor and actuator networks for lighting energy efficiency and user satisfaction

    NASA Astrophysics Data System (ADS)

    Wen, Yao-Jung

    Buildings consume more than one third of the primary energy generated in the U.S., and lighting alone accounts for approximately 30% of the energy usage in commercial buildings. As the largest electricity consumer of all building electrical systems, lighting harbors the greatest potential for energy savings in the commercial sector. Fifty percent of current energy consumption could be reduced with energy-efficient lighting management strategies. While commercial products do exist, they are poorly received due to exorbitant retrofitting cost and unsatisfactory performance. As a result, most commercial buildings, especially legacy buildings, have not taken advantage of the opportunity to generate savings from lighting. The emergence of wireless sensor and actuator network (WSAN) technologies presents an alternative that circumvents costly rewiring and promises better performance than existing commercial lighting systems. The goal of this dissertation research is to develop a framework for wireless-networked lighting systems with increased cost effectiveness, energy efficiency, and user satisfaction. This research is realized through both theoretical developments and implementations. The theoretical research aims at developing techniques for harnessing WSAN technologies to lighting hardware and control strategies. Leveraging redundancy, a sensor validation and fusion algorithm is developed for extracting pertinent lighting information from the disturbance-prone desktop-mounted photosensors. An adaptive sensing strategy optimizes the timing of data acquisition and power-hungry wireless transmission of sensory feedback in real-time lighting control. Exploiting the individual addressability of wireless-enabled luminaires, a lighting optimization algorithm is developed to create the optimal lighting that minimizes energy usage while satisfying occupants' diverse lighting preferences. The wireless-networked lighting system was implemented and tested in a number of real-life settings. A human subject study conducted in a private office concluded that the research system was competitive with the commercial lighting system with much fewer retrofitting requirements. The system implemented in a shared-space office realized a self-configuring mesh network with wireless photosensors and light actuators, and demonstrated a 50% energy savings and increased performance when harvesting daylight through windows is possible. The cost analysis revealed a reasonable payback period after the system is optimized for commercialization and confirms the marketing feasibility.

  4. Wireless photoplethysmographic device for heart rate variability signal acquisition and analysis.

    PubMed

    Reyes, Ivan; Nazeran, Homer; Franco, Mario; Haltiwanger, Emily

    2012-01-01

    The photoplethysmographic (PPG) signal has the potential to aid in the acquisition and analysis of heart rate variability (HRV) signal: a non-invasive quantitative marker of the autonomic nervous system that could be used to assess cardiac health and other physiologic conditions. A low-power wireless PPG device was custom-developed to monitor, acquire and analyze the arterial pulse in the finger. The system consisted of an optical sensor to detect arterial pulse as variations in reflected light intensity, signal conditioning circuitry to process the reflected light signal, a microcontroller to control PPG signal acquisition, digitization and wireless transmission, a receiver to collect the transmitted digital data and convert them back to their analog representations. A personal computer was used to further process the captured PPG signals and display them. A MATLAB program was then developed to capture the PPG data, detect the RR peaks, perform spectral analysis of the PPG data, and extract the HRV signal. A user-friendly graphical user interface (GUI) was developed in LabView to display the PPG data and their spectra. The performance of each module (sensing unit, signal conditioning, wireless transmission/reception units, and graphical user interface) was assessed individually and the device was then tested as a whole. Consequently, PPG data were obtained from five healthy individuals to test the utility of the wireless system. The device was able to reliably acquire the PPG signals from the volunteers. To validate the accuracy of the MATLAB codes, RR peak information from each subject was fed into Kubios software as a text file. Kubios was able to generate a report sheet with the time domain and frequency domain parameters of the acquired data. These features were then compared against those calculated by MATLAB. The preliminary results demonstrate that the prototype wireless device could be used to perform HRV signal acquisition and analysis.

  5. Analysis of physical layer performance of hybrid optical-wireless access network

    NASA Astrophysics Data System (ADS)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  6. Challenges of CAC in Heterogeneous Wireless Cognitive Networks

    NASA Astrophysics Data System (ADS)

    Wang, Jiazheng; Fu, Xiuhua

    Call admission control (CAC) is known as an effective functionality in ensuring the QoS of wireless networks. The vision of next generation wireless networks has led to the development of new call admission control (CAC) algorithms specifically designed for heterogeneous wireless Cognitive networks. However, there will be a number of challenges created by dynamic spectrum access and scheduling techniques associated with the cognitive systems. In this paper for the first time, we recommend that the CAC policies should be distinguished between primary users and secondary users. The classification of different methods of cac policies in cognitive networks contexts is proposed. Although there have been some researches within the umbrella of Joint CAC and cross-layer optimization for wireless networks, the advent of the cognitive networks adds some additional problems. We present the conceptual models for joint CAC and cross-layer optimization respectively. Also, the benefit of Cognition can only be realized fully if application requirements and traffic flow contexts are determined or inferred in order to know what modes of operation and spectrum bands to use at each point in time. The process model of Cognition involved per-flow-based CAC is presented. Because there may be a number of parameters on different levels affecting a CAC decision and the conditions for accepting or rejecting a call must be computed quickly and frequently, simplicity and practicability are particularly important for designing a feasible CAC algorithm. In a word, a more thorough understanding of CAC in heterogeneous wireless cognitive networks may help one to design better CAC algorithms.

  7. A cost-effective WDM-PON architecture simultaneously supporting wired, wireless and optical VPN services

    NASA Astrophysics Data System (ADS)

    Wu, Yanzhi; Ye, Tong; Zhang, Liang; Hu, Xiaofeng; Li, Xinwan; Su, Yikai

    2011-03-01

    It is believed that next-generation passive optical networks (PONs) are required to provide flexible and various services to users in a cost-effective way. To address this issue, for the first time, this paper proposes and demonstrates a novel wavelength-division-multiplexed PON (WDM-PON) architecture to simultaneously support three types of services: 1) wireless access traffic, 2) optical virtual passive network (VPN) communications, and 3) conventional wired services. In the optical line terminal (OLT), we use two cascaded Mach-Zehnder modulators (MZMs) on each wavelength channel to generate an optical carrier, and produce the wireless and the downstream traffic using the orthogonal modulation technique. In each optical network unit (ONU), the obtained optical carrier is modulated by a single MZM to provide the VPN and upstream communications. Consequently, the light sources in the ONUs are saved and the system cost is reduced. The feasibility of our proposal is experimentally and numerically verified.

  8. Design and implementation of location-based wireless targeted advertising

    NASA Astrophysics Data System (ADS)

    Li, Benjamin; Xu, Deyin

    2001-10-01

    As advertisements are time and location sensitive, a challenge for wireless marketing is to have advertisements delivered when and where they are most convenient. In this paper we introduce a two-stage auction model for location-based wireless targeted advertising. This system extends the notion of location-based service by using location information to target advertising, and does so specifically by enabling advertisers to specify their preferences and bid for advertisement delivery, where those preferences are then used in a subsequent automated auction of actual deliveries to wireless data users. The automated auction in the second stage is especially effective because it can use information about the individual user profile data, including customer relationship management system contents as well as location from the wireless system's location management service, including potentially location history such as current trajectory from recent history and longer-term historical trip records for that user. Through two-stage auction, real-time bidding by advertisers and matching ads contents to mobile users help advertising information reach maximal value.

  9. Designed and User-Generated Activity in the Mobile Age

    ERIC Educational Resources Information Center

    Kukulska-Hulme, Agnes; Traxler, John; Pettit, John

    2007-01-01

    The paper addresses the question of how to design for learning taking place on mobile and wireless devices. The authors argue that learning activity designers need to consider the characteristics of mobile learning; at the same time, it is vital to realise that learners are already creating mobile learning experiences for themselves. Profound…

  10. A cloud-based X73 ubiquitous mobile healthcare system: design and implementation.

    PubMed

    Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji

    2014-01-01

    Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed "big data" processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems.

  11. The Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  12. Dynamic Network Selection for Multicast Services in Wireless Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Chen, Liang; Jin, Le; He, Feng; Cheng, Hanwen; Wu, Lenan

    In next generation mobile multimedia communications, different wireless access networks are expected to cooperate. However, it is a challenging task to choose an optimal transmission path in this scenario. This paper focuses on the problem of selecting the optimal access network for multicast services in the cooperative mobile and broadcasting networks. An algorithm is proposed, which considers multiple decision factors and multiple optimization objectives. An analytic hierarchy process (AHP) method is applied to schedule the service queue and an artificial neural network (ANN) is used to improve the flexibility of the algorithm. Simulation results show that by applying the AHP method, a group of weight ratios can be obtained to improve the performance of multiple objectives. And ANN method is effective to adaptively adjust weight ratios when users' new waiting threshold is generated.

  13. A Low-Cost Wireless Multi-Presentation on Single Screen in Classroom Using Raspberry Pi

    ERIC Educational Resources Information Center

    Yulianto, Budi; Layona, Rita; Dewi, Lusiana Citra

    2017-01-01

    Smartphone has become a daily necessity in supporting the mobility of users, including teachers and students. The need of users to make multi-presentation via a smartphone wirelessly does not fit with the cost and multiplatform support. This study aims to produce a solution by using Raspberry Pi as a wireless digital media player that will be…

  14. New ergonomic headset for Tongue-Drive System with wireless smartphone interface.

    PubMed

    Park, Hangue; Kim, Jeonghee; Huo, Xueliang; Hwang, In-O; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue-operated assistive technology (AT), developed for people with severe physical disabilities to control their environment using their tongue motion. We have developed a new ergonomic headset for the TDS with a user-friendly smartphone interface, through which users will be able to wirelessly control various devices, access computers, and drive wheelchairs. This headset design is expected to act as a flexible and multifunctional communication interface for the TDS and improve its usability, accessibility, aesthetics, and convenience for the end users.

  15. Integrated wireless sensor network and real time smart controlling and monitoring system for efficient energy management in standalone photovoltaic systems

    NASA Astrophysics Data System (ADS)

    Abou-Elnour, Ali; Thabt, A.; Helmy, S.; Kashf, Y.; Hadad, Y.; Tarique, M.; Abo-Elnor, Ossama

    2014-04-01

    In the present work, wireless sensor network and smart real-time controlling and monitoring system are integrated for efficient energy management of standalone photovoltaic system. The proposed system has two main components namely the monitoring and controlling system and the wireless communication system. LabView software has been used in the implementation of the monitoring and controlling system. On the other hand, ZigBee wireless modules have been used to implement the wireless system. The main functions of monitoring and controlling unit is to efficiently control the energy consumption form the photovoltaic system based on accurate determination of the periods of times at which the loads are required to be operated. The wireless communication system send the data from the monitoring and controlling unit to the loads at which desired switching operations are performed. The wireless communication system also continuously feeds the monitoring and controlling unit with updated input data from the sensors and from the photovoltaic module send to calculate and record the generated, the consumed, and the stored energy to apply load switching saving schemes if necessary. It has to be mentioned that our proposed system is a low cost and low power system because and it is flexible to be upgraded to fulfill additional users' requirements.

  16. A wireless blood pressure monitoring system for personal health management.

    PubMed

    Li, Wun-Jin; Luo, Yuan-Long; Chang, Yao-Shun; Lin, Yuan-Hsiang

    2010-01-01

    In this paper, we developed a wireless blood pressure monitoring system which provides a useful tool for users to measure and manage their daily blood pressure values. This system includes an ARM-based blood pressure monitor with a ZigBee wireless transmission module and a PC-based management unit with graphic user interface and database. The wireless blood pressure monitor can measure the blood pressure and heart rate and then store and forward the measuring information to the management unit through the ZigBee wireless transmission. On the management unit, user can easy to see their blood pressure variation in the past using a line chart. Accuracy of blood pressure measurement has been verified by a commercial blood pressure simulator and shown the bias of systolic blood pressure is ≤ 1 mmHg and the bias of diastolic blood pressure is ≤ 1.4 mmHg.

  17. Semantic Visualization of Wireless Sensor Networks for Elderly Monitoring

    NASA Astrophysics Data System (ADS)

    Stocklöw, Carsten; Kamieth, Felix

    In the area of Ambient Intelligence, Wireless Sensor Networks are commonly used for user monitoring purposes like health monitoring and user localization. Existing work on visualization of wireless sensor networks focuses mainly on displaying individual nodes and logical, graph-based topologies. This way, the relation to the real-world deployment is lost. This paper presents a novel approach for visualization of wireless sensor networks and interaction with complex services on the nodes. The environment is realized as a 3D model, and multiple nodes, that are worn by a single individual, are grouped together to allow an intuitive interface for end users. We describe application examples and show that our approach allows easier access to network information and functionality by comparing it with existing solutions.

  18. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    PubMed Central

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  19. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    PubMed

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  20. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network

    PubMed Central

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Wang, Hongbin; Cheng, Albert M. K.

    2017-01-01

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption. PMID:29039757

  1. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    PubMed

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  2. A Cloud-Based X73 Ubiquitous Mobile Healthcare System: Design and Implementation

    PubMed Central

    Ji, Zhanlin; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji

    2014-01-01

    Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed “big data” processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems. PMID:24737958

  3. The evolution and impact of PCS technology

    NASA Astrophysics Data System (ADS)

    Lawson, John R.

    1994-09-01

    In today's mobile society, communications services that focus on location (wired) are increasingly inadequate. But services that center around the individual (wireless) are being developed to serve society in a way that only recently could consumers have imagined. People-oriented communications tools will make life simpler and more productive. The essence of this concept is captured in a family of wireless services and devices that allow the user to communicate independent of location--Personal Communications Services, known as PCS. First generation PCS devices such a pagers and cellular phones were the instruments of the first wireless revolution, but they will soon be forced to relinquish the spotlight to the new generation of PCS and what should be a dazzling variety of individualized advanced telecommunications services and devices. Within the next two years, these new PCS models, recently described as 'the most exciting development in telecommunications since the breakup of AT&T,' should hit the marketplace, changing the way we communicate and, in turn, the way we live. This paper explores the status and likely development of PCS generally, including 'new PCS.'

  4. Resource allocation using ANN in LTE

    NASA Astrophysics Data System (ADS)

    Yigit, Tuncay; Ersoy, Mevlut

    2017-07-01

    LTE is the 4th generation wireless network technology, which provides flexible bandwidth, higher data speeds and lower delay. Difficulties may be experienced upon an increase in the number of users in LTE. The objective of this study is to ensure a faster solution to any such resource allocation problems which might arise upon an increase in the number of users. A fast and effective solution has been obtained by making use of Artificial Neural Network. As a result, fast working artificial intelligence methods may be used in resource allocation problems during operation.

  5. Wireless Sensor Network-Based Service Provisioning by a Brokering Platform

    PubMed Central

    Guijarro, Luis; Pla, Vicent; Vidal, Jose R.; Naldi, Maurizio; Mahmoodi, Toktam

    2017-01-01

    This paper proposes a business model for providing services based on the Internet of Things through a platform that intermediates between human users and Wireless Sensor Networks (WSNs). The platform seeks to maximize its profit through posting both the price charged to each user and the price paid to each WSN. A complete analysis of the profit maximization problem is performed in this paper. We show that the service provider maximizes its profit by incentivizing all users and all Wireless Sensor Infrastructure Providers (WSIPs) to join the platform. This is true not only when the number of users is high, but also when it is moderate, provided that the costs that the users bear do not trespass a cost ceiling. This cost ceiling depends on the number of WSIPs, on the value of the intrinsic value of the service and on the externality that the WSIP has on the user utility. PMID:28498347

  6. Wireless Sensor Network-Based Service Provisioning by a Brokering Platform.

    PubMed

    Guijarro, Luis; Pla, Vicent; Vidal, Jose R; Naldi, Maurizio; Mahmoodi, Toktam

    2017-05-12

    This paper proposes a business model for providing services based on the Internet of Things through a platform that intermediates between human users and Wireless Sensor Networks (WSNs). The platform seeks to maximize its profit through posting both the price charged to each user and the price paid to each WSN. A complete analysis of the profit maximization problem is performed in this paper. We show that the service provider maximizes its profit by incentivizing all users and all Wireless Sensor Infrastructure Providers (WSIPs) to join the platform. This is true not only when the number of users is high, but also when it is moderate, provided that the costs that the users bear do not trespass a cost ceiling. This cost ceiling depends on the number of WSIPs, on the value of the intrinsic value of the service and on the externality that the WSIP has on the user utility.

  7. Adoption of 4G Mobile Services from the Female Student's Perspective: Case of Princess Nora University

    ERIC Educational Resources Information Center

    Rawashdeh, Awni

    2015-01-01

    The aim this study was to examine the relationship between the perceived usefulness, perceived ease of use, perceived entertainment, attitude and the users' intention toward using the fourth-generation (4G) wireless mobile services. Data of this study were collected by survey with a cross sectional approach. The data were analyzed with factor…

  8. World Without Wires: Is Your District Ready to Go Wireless?

    ERIC Educational Resources Information Center

    Villano, Matt

    2005-01-01

    In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…

  9. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  10. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  11. MEMS high-speed angular-position sensing system with rf wireless transmission

    NASA Astrophysics Data System (ADS)

    Sun, Winston; Li, Wen J.

    2001-08-01

    A novel surface-micromachined non-contact high-speed angular-position sensor with total surface area under 4mm2 was developed using the Multi-User MEMS Processes (MUMPs) and integrated with a commercial RF transmitter at 433MHz carrier frequency for wireless signal detection. Currently, a 2.3 MHz internal clock of our data acquisition system and a sensor design with a 13mg seismic mass is sufficient to provide visual observation of a clear sinusoidal response wirelessly generated by the piezoresistive angular-position sensing system within speed range of 180 rpm to around 1000 rpm. Experimental results showed that the oscillation frequency and amplitude are related to the input angular frequency of the rotation disk and the tilt angle of the rotation axis, respectively. These important results could provide groundwork for MEMS researchers to estimate how gravity influences structural properties of MEMS devices under different circumstances.

  12. Commercial wireless technologies for public safety users

    DOT National Transportation Integrated Search

    2000-07-01

    This report on commercial wireless for public safety addresses the issues associated with the use of commercial services for public safety. It then reviews available wireless services for wide area data services: cellular, personal communication and ...

  13. New Applications for the Testing and Visualization of Wireless Networks

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Cauley, Michael A.; Pleva, Michael A.; Seibert, Marc A.; Lopez, Isaac

    2005-01-01

    Traditional techniques for examining wireless networks use physical link characteristics such as Signal-to-Noise (SNR) ratios to assess the performance of wireless networks. Such measurements may not be reliable indicators of available bandwidth. This work describes two new software applications developed at NASA Glenn Research Center for the investigation of wireless networks. GPSIPerf combines measurements of Transmission Control Protocol (TCP) throughput with Global Positioning System (GPS) coordinates to give users a map of wireless bandwidth for outdoor environments where a wireless infrastructure has been deployed. GPSIPerfView combines the data provided by GPSIPerf with high-resolution digital elevation maps (DEM) to help users visualize and assess the impact of elevation features on wireless networks in a given sample area. These applications were used to examine TCP throughput in several wireless network configurations at desert field sites near Hanksville, Utah during May of 2004. Use of GPSIPerf and GPSIPerfView provides a geographically referenced picture of the extent and deterioration of TCP throughput in tested wireless network configurations. GPSIPerf results from field-testing in Utah suggest that it can be useful in assessing other wireless network architectures, and may be useful to future human-robotic exploration missions.

  14. Data security issues arising from integration of wireless access into healthcare networks.

    PubMed

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  15. Active Cooperation Between Primary Users and Cognitive Radio Users in Heterogeneous Ad-Hoc Networks

    DTIC Science & Technology

    2012-04-01

    processing to wireless communications and networking, including space-time coding and modulation for MIMO wireless communications, MIMO - OFDM systems, and...multiinput-multioutput ( MIMO ) system that can significantly increase the link capacity and realize a new form of spatial diversity which has been termed

  16. A Strategic Bargaining Game for a Spectrum Sharing Scheme in Cognitive Radio-Based Heterogeneous Wireless Sensor Networks.

    PubMed

    Mao, Yuxing; Cheng, Tao; Zhao, Huiyuan; Shen, Na

    2017-11-27

    In Wireless Sensor Networks (WSNs), unlicensed users, that is, sensor nodes, have excessively exploited the unlicensed radio spectrum. Through Cognitive Radio (CR), licensed radio spectra, which are owned by licensed users, can be partly or entirely shared with unlicensed users. This paper proposes a strategic bargaining spectrum-sharing scheme, considering a CR-based heterogeneous WSN (HWSN). The sensors of HWSNs are discrepant and exist in different wireless environments, which leads to various signal-to-noise ratios (SNRs) for the same or different licensed users. Unlicensed users bargain with licensed users regarding the spectrum price. In each round of bargaining, licensed users are allowed to adaptively adjust their spectrum price to the best for maximizing their profits. . Then, each unlicensed user makes their best response and informs licensed users of "bargaining" and "warning". Through finite rounds of bargaining, this scheme can obtain a Nash bargaining solution (NBS), which makes all licensed and unlicensed users reach an agreement. The simulation results demonstrate that the proposed scheme can quickly find a NBS and all players in the game prefer to be honest. The proposed scheme outperforms existing schemes, within a certain range, in terms of fairness and trade success probability.

  17. Real-time software-based end-to-end wireless visual communications simulation platform

    NASA Astrophysics Data System (ADS)

    Chen, Ting-Chung; Chang, Li-Fung; Wong, Andria H.; Sun, Ming-Ting; Hsing, T. Russell

    1995-04-01

    Wireless channel impairments pose many challenges to real-time visual communications. In this paper, we describe a real-time software based wireless visual communications simulation platform which can be used for performance evaluation in real-time. This simulation platform consists of two personal computers serving as hosts. Major components of each PC host include a real-time programmable video code, a wireless channel simulator, and a network interface for data transport between the two hosts. The three major components are interfaced in real-time to show the interaction of various wireless channels and video coding algorithms. The programmable features in the above components allow users to do performance evaluation of user-controlled wireless channel effects without physically carrying out these experiments which are limited in scope, time-consuming, and costly. Using this simulation platform as a testbed, we have experimented with several wireless channel effects including Rayleigh fading, antenna diversity, channel filtering, symbol timing, modulation, and packet loss.

  18. Development of a wireless nonlinear wave modulation spectroscopy (NWMS) sensor node for fatigue crack detection

    NASA Astrophysics Data System (ADS)

    Liu, Peipei; Yang, Suyoung; Lim, Hyung Jin; Park, Hyung Chul; Ko, In Chang; Sohn, Hoon

    2014-03-01

    Fatigue crack is one of the main culprits for the failure of metallic structures. Recently, it has been shown that nonlinear wave modulation spectroscopy (NWMS) is effective in detecting nonlinear mechanisms produced by fatigue crack. In this study, an active wireless sensor node for fatigue crack detection is developed based on NWMS. Using PZT transducers attached to a target structure, ultrasonic waves at two distinctive frequencies are generated, and their modulation due to fatigue crack formation is detected using another PZT transducer. Furthermore, a reference-free NWMS algorithm is developed so that fatigue crack can be detected without relying on history data of the structure with minimal parameter adjustment by the end users. The algorithm is embedded into FPGA, and the diagnosis is transmitted to a base station using a commercial wireless communication system. The whole design of the sensor node is fulfilled in a low power working strategy. Finally, an experimental verification has been performed using aluminum plate specimens to show the feasibility of the developed active wireless NWMS sensor node.

  19. Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    NASA Astrophysics Data System (ADS)

    Kondo, Yoshihisa; Yomo, Hiroyuki; Yamaguchi, Shinji; Davis, Peter; Miura, Ryu; Obana, Sadao; Sampei, Seiichi

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  20. Triboelectric Nanogenerator Enabled Body Sensor Network for Self-Powered Human Heart-Rate Monitoring.

    PubMed

    Lin, Zhiming; Chen, Jun; Li, Xiaoshi; Zhou, Zhihao; Meng, Keyu; Wei, Wei; Yang, Jin; Wang, Zhong Lin

    2017-09-26

    Heart-rate monitoring plays a critical role in personal healthcare management. A low-cost, noninvasive, and user-friendly heart-rate monitoring system is highly desirable. Here, a self-powered wireless body sensor network (BSN) system is developed for heart-rate monitoring via integration of a downy-structure-based triboelectric nanogenerator (D-TENG), a power management circuit, a heart-rate sensor, a signal processing unit, and Bluetooth module for wireless data transmission. By converting the inertia energy of human walking into electric power, a maximum power of 2.28 mW with total conversion efficiency of 57.9% was delivered at low operation frequency, which is capable of immediately and sustainably driving the highly integrated BSN system. The acquired heart-rate signal by the sensor would be processed in the signal process circuit, sent to an external device via the Bluetooth module, and displayed on a personal cell phone in a real-time manner. Moreover, by combining a TENG-based generator and a TENG-based sensor, an all-TENG-based wireless BSN system was developed, realizing continuous and self-powered heart-rate monitoring. This work presents a potential method for personal heart-rate monitoring, featured as being self-powered, cost-effective, noninvasive, and user-friendly.

  1. Multimedia information processing in the SWAN mobile networked computing system

    NASA Astrophysics Data System (ADS)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  2. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    PubMed

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  3. Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals

    NASA Astrophysics Data System (ADS)

    Leontiev, I. V.

    Information technologies become vital due to information processing needs, database access, data analysis and decision support. Currently, a lot of scientific projects are oriented on database integration of heterogeneous systems. The problem of on-line and rapid access to large integrated systems of digital collections is also very important. Usually users move between different locations, either at work or at home. In most cases users need an efficient and remote access to information, stored in integrated data collections. Desktop computers are unable to fulfill the needs, so mobile and wireless devices become helpful. Handhelds and data terminals are nessessary in medical assistance (they store detailed information about each patient, and helpful for nurses), immediate access to data collections is used in a Highway patrol services (databanks of cars, owners, driver licences). Using mobile access, warehouse operations can be validated. Library and museum items cyclecounting will speed up using online barcode-scanning and central database access. That's why mobile devices - cell phones, PDA, handheld computers with wireless access, WindowsCE and PalmOS terminals become popular. Generally, mobile devices have a relatively slow processor, and limited display capabilities, but they are effective for storing and displaying textual data, recognize user hand-writing with stylus, support GUI. Users can perform operations on handheld terminal, and exchange data with the main system (using immediate radio access, or offline access during syncronization process) for update. In our report, we give an approach for mobile access to data collections, which raises an efficiency of data processing in a book library, helps to control available books, books in stock, validate service charges, eliminate staff mistakes, generate requests for book delivery. Our system uses mobile devices Symbol RF (with radio-channel access), and data terminals Symbol Palm Terminal for batch-processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.

  4. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    PubMed

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  5. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  6. Reliability and throughput issues for optical wireless and RF wireless systems

    NASA Astrophysics Data System (ADS)

    Yu, Meng

    The fast development of wireless communication technologies has two main trends. On one hand, in point-to-point communications, the demand for higher throughput called for the emergence of wireless broadband techniques including optical wireless (OW). One the other hand, wireless networks are becoming pervasive. New application of wireless networks ask for more flexible system infrastructures beyond the point-to-point prototype to achieve better performance. This dissertation investigates two topics on the reliability and throughput issues of new wireless technologies. The first topic is to study the capacity, and practical forward error control strategies for OW systems. We investigate the performance of OW systems under weak atmospheric turbulence. We first investigate the capacity and power allocation for multi-laser and multi-detector systems. Our results show that uniform power allocation is a practically optimal solution for paralleled channels. We also investigate the performance of Reed Solomon (RS) codes and turbo codes for OW systems. We present RS codes as good candidates for OW systems. The second topic targets user cooperation in wireless networks. We evaluate the relative merits of amplify-forward (AF) and decode-forward (DF) in practical scenarios. Both analysis and simulations show that the overall system performance is critically affected by the quality of the inter-user channel. Following this result, we investigate two schemes to improve the overall system performance. We first investigate the impact of the relay location on the overall system performance and determine the optimal location of relay. A best-selective single-relay 1 system is proposed and evaluated. Through the analysis of the average capacity and outage, we show that a small candidate pool of 3 to 5 relays suffices to reap most of the "geometric" gain available to a selective system. Second, we propose a new user cooperation scheme to provide an effective better inter-user channel. Most user cooperation protocols work in a time sharing manner, where a node forwards others' messages and sends its own message at different sections within a provisioned time slot. In the proposed scheme the two messages are encoded together in a single codework using network coding and transmitted in the given time slot. We also propose a general multiple-user cooperation framework. Under this framework, we show that network coding can achieve better diversity and provide effective better inter-user channels than time sharing. The last part of the dissertation focuses on multi-relay packet transmission. We propose an adaptive and distributive coding scheme for the relay nodes to adaptively cooperate and forward messages. The adaptive scheme shows performance gain over fixed schemes. Then we shift our viewpoint and represent the network as part of encoders and part of decoders.

  7. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    NASA Astrophysics Data System (ADS)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  8. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    NASA Astrophysics Data System (ADS)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets are captured for analytical purposes on the mobile user node. Experimental results are obtained and analysed. Future work is identified towards further improvement of the current design and implementation. With this new mobile video networking concept and paradigm implemented and evaluated, results and observations obtained from this study would form the basis of a more in-depth, comprehensive understanding of various challenges and opportunities in supporting high-quality real-time video streaming in mobile cloud over heterogeneous wireless networks.

  9. Collaboration in a Wireless Grid Innovation Testbed by Virtual Consortium

    NASA Astrophysics Data System (ADS)

    Treglia, Joseph; Ramnarine-Rieks, Angela; McKnight, Lee

    This paper describes the formation of the Wireless Grid Innovation Testbed (WGiT) coordinated by a virtual consortium involving academic and non-academic entities. Syracuse University and Virginia Tech are primary university partners with several other academic, government, and corporate partners. Objectives include: 1) coordinating knowledge sharing, 2) defining key parameters for wireless grids network applications, 3) dynamically connecting wired and wireless devices, content and users, 4) linking to VT-CORNET, Virginia Tech Cognitive Radio Network Testbed, 5) forming ad hoc networks or grids of mobile and fixed devices without a dedicated server, 6) deepening understanding of wireless grid application, device, network, user and market behavior through academic, trade and popular publications including online media, 7) identifying policy that may enable evaluated innovations to enter US and international markets and 8) implementation and evaluation of the international virtual collaborative process.

  10. Technology Acceptance Model for Wireless Internet.

    ERIC Educational Resources Information Center

    Lu, June; Yu, Chun-Sheng; Liu, Chang; Yao, James E.

    2003-01-01

    Develops a technology acceptance model (TAM) for wireless Internet via mobile devices (WIMD) and proposes that constructs, such as individual differences, technology complexity, facilitating conditions, social influences, and wireless trust environment determine user-perceived short and long-term usefulness, and ease of using WIMD. Twelve…

  11. Multiple Sensing Application on Wireless Sensor Network Simulation using NS3

    NASA Astrophysics Data System (ADS)

    Kurniawan, I. F.; Bisma, R.

    2018-01-01

    Hardware enhancement provides opportunity to install various sensor device on single monitoring node which then enables users to acquire multiple data simultaneously. Constructing multiple sensing application in NS3 is a challenging task since numbers of aspects such as wireless communication, packet transmission pattern, and energy model must be taken into account. Despite of numerous types of monitoring data available, this study only considers two types such as periodic, and event-based data. Periodical data will generate monitoring data follows configured interval, while event-based transmit data when certain determined condition is met. Therefore, this study attempts to cover mentioned aspects in NS3. Several simulations are performed with different number of nodes on arbitrary communication scheme.

  12. Ubiquitous health monitoring system for multiple users using a ZigBee and WLAN dual-network.

    PubMed

    Cha, Yong Dae; Yoon, Gilwon

    2009-11-01

    A ubiquitous health monitoring system for multiple users was developed based on a ZigBee and wireless local area network (WLAN) dual-network. A compact biosignal monitoring unit (BMU) for measuring electrocardiogram (ECG), photoplethysmogram (PPG), and temperature was also developed. A single 8-bit microcontroller operated the BMU including most of digital filtering and wireless communication. The BMU with its case was reduced to 55 x 35 x 15 mm and 33 g. In routine use, vital signs of 6 bytes/sec (heart rate, temperature, pulse transit time) per each user were transmitted through a ZigBee module even though all the real-time data were recorded in a secure digital memory of the BMU. In an emergency or when need arises, a channel of a particular user was switched to another ZigBee module, called the emergency module, that sent all ECG and PPG waveforms in real time. Each emergency ZigBee module handled up to a few users. Data from multiple users were wirelessly received by the ZigBee receiver modules in a controller called ZigBee-WLAN gateway, where the ZigBee modules were connected to a WLAN module. This WLAN module sent all data wirelessly to a monitoring center. Operating the dual modes of ZigBee/WLAN utilized an advantage of ZigBee by handling multiple users with minimum power consumption, and overcame the ZigBee limitation of low data rate. This dual-network system for LAN is economically competitive and reliable.

  13. Zero-forcing pre-coding for MIMO WiMAX transceivers: Performance analysis and implementation issues

    NASA Astrophysics Data System (ADS)

    Cattoni, A. F.; Le Moullec, Y.; Sacchi, C.

    Next generation wireless communication networks are expected to achieve ever increasing data rates. Multi-User Multiple-Input-Multiple-Output (MU-MIMO) is a key technique to obtain the expected performance, because such a technique combines the high capacity achievable using MIMO channel with the benefits of space division multiple access. In MU-MIMO systems, the base stations transmit signals to two or more users over the same channel, for this reason every user can experience inter-user interference. This paper provides a capacity analysis of an online, interference-based pre-coding algorithm able to mitigate the multi-user interference of the MU-MIMO systems in the context of a realistic WiMAX application scenario. Simulation results show that pre-coding can significantly increase the channel capacity. Furthermore, the paper presents several feasibility considerations for implementation of the analyzed technique in a possible FPGA-based software defined radio.

  14. Unpowered wireless generation and sensing of ultrasound

    NASA Astrophysics Data System (ADS)

    Huang, Haiying

    2013-04-01

    This paper presents a wireless ultrasound pitch-catch system that demonstrates the wireless generation and sensing of ultrasounds based on the principle of frequency conversion. The wireless ultrasound pitch-catch system consists of a wireless interrogator and two wireless ultrasound transducers. The wireless interrogator generates an ultrasound-modulated signal and a carrier signal, both at the microwave frequency, and transmits these two signals to the wireless ultrasound actuator using a pair of antennas. Upon receiving these two signals, the wireless ultrasound actuator recovers the ultrasound excitation signal using a passive mixer and then supplies it to a piezoelectric wafer sensor for ultrasound generation in the structure. For wireless ultrasound sensing, the frequency conversion process is reversed. The ultrasound sensing signal is up-converted to a microwave signal by the wireless ultrasound sensor and is recovered at the wireless interrogator using a homodyne receiver. To differentiate the wireless actuator from the wireless sensor, each wireless transducer is equipped with a narrowband microwave filter so that it only responds to the carrier frequency that matches the filter's operation bandwidth. The principle of operation of the wireless pitch-catch system, the hardware implementation, and the associated data processing algorithm to recover the ultrasound signal from the wirelessly received signal are described. The wirelessly acquired ultrasound signal is compared with those acquired using wired connection in both time and frequency domain.

  15. Speech Recognition of Bimodal Cochlear Implant Recipients Using a Wireless Audio Streaming Accessory for the Telephone.

    PubMed

    Wolfe, Jace; Morais, Mila; Schafer, Erin

    2016-02-01

    The goals of the present investigation were (1) to evaluate recognition of recorded speech presented over a mobile telephone for a group of adult bimodal cochlear implant users, and (2) to measure the potential benefits of wireless hearing assistance technology (HAT) for mobile telephone speech recognition using bimodal stimulation (i.e., a cochlear implant in one ear and a hearing aid on the other ear). A three-by-two-way repeated measures design was used to evaluate mobile telephone sentence-recognition performance differences obtained in quiet and in noise with and without the wireless HAT accessory coupled to the hearing aid alone, CI sound processor alone, and in the bimodal condition. Outpatient cochlear implant clinic. Sixteen bimodal users with Nucleus 24, Freedom, CI512, or CI422 cochlear implants participated in this study. Performance was measured with and without the use of a wireless HAT for the telephone used with the hearing aid alone, CI alone, and bimodal condition. CNC word recognition in quiet and in noise with and without the use of a wireless HAT telephone accessory in the hearing aid alone, CI alone, and bimodal conditions. Results suggested that the bimodal condition gave significantly better speech recognition on the mobile telephone with the wireless HAT. A wireless HAT for the mobile telephone provides bimodal users with significant improvement in word recognition in quiet and in noise over the mobile telephone.

  16. Design of remote car anti-theft system based on ZigBee

    NASA Astrophysics Data System (ADS)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  17. Processing module operating methods, processing modules, and communications systems

    DOEpatents

    McCown, Steven Harvey; Derr, Kurt W.; Moore, Troy

    2014-09-09

    A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving the encrypted code from the wireless communications device. The wireless communications device is unable to decrypt the encrypted code. The method further includes using the processing module, decrypting the encrypted code, executing the decrypted code, and preventing the wireless communications device from accessing the decrypted code. Another processing module operating method includes using a processing module physically connected to a host device, executing an application within the processing module, allowing the application to exchange user interaction data communicated using a user interface of the host device with the host device, and allowing the application to use the host device as a communications device for exchanging information with a remote device distinct from the host device.

  18. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  19. An economical wireless cavity-nest viewer

    Treesearch

    Daniel P. Huebner; Sarah R. Hurteau

    2007-01-01

    Inspection of cavity nests and nest boxes is often required during studies of cavity-nesting birds, and fiberscopes and pole-mounted video cameras are sometimes used for such inspection. However, the cost of these systems may be prohibitive for some potential users. We describe a user-built, wireless cavity viewer that can be used to access cavities as high as 15 m and...

  20. A Wireless Communications Laboratory on Cellular Network Planning

    ERIC Educational Resources Information Center

    Dawy, Z.; Husseini, A.; Yaacoub, E.; Al-Kanj, L.

    2010-01-01

    The field of radio network planning and optimization (RNPO) is central for wireless cellular network design, deployment, and enhancement. Wireless cellular operators invest huge sums of capital on deploying, launching, and maintaining their networks in order to ensure competitive performance and high user satisfaction. This work presents a lab…

  1. Warming Up to Wireless

    ERIC Educational Resources Information Center

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  2. Spectrum Access In Cognitive Radio Using a Two-Stage Reinforcement Learning Approach

    NASA Astrophysics Data System (ADS)

    Raj, Vishnu; Dias, Irene; Tholeti, Thulasi; Kalyani, Sheetal

    2018-02-01

    With the advent of the 5th generation of wireless standards and an increasing demand for higher throughput, methods to improve the spectral efficiency of wireless systems have become very important. In the context of cognitive radio, a substantial increase in throughput is possible if the secondary user can make smart decisions regarding which channel to sense and when or how often to sense. Here, we propose an algorithm to not only select a channel for data transmission but also to predict how long the channel will remain unoccupied so that the time spent on channel sensing can be minimized. Our algorithm learns in two stages - a reinforcement learning approach for channel selection and a Bayesian approach to determine the optimal duration for which sensing can be skipped. Comparisons with other learning methods are provided through extensive simulations. We show that the number of sensing is minimized with negligible increase in primary interference; this implies that lesser energy is spent by the secondary user in sensing and also higher throughput is achieved by saving on sensing.

  3. A 12 GHz wavelength spacing multi-wavelength laser source for wireless communication systems

    NASA Astrophysics Data System (ADS)

    Peng, P. C.; Shiu, R. K.; Bitew, M. A.; Chang, T. L.; Lai, C. H.; Junior, J. I.

    2017-08-01

    This paper presents a multi-wavelength laser source with 12 GHz wavelength spacing based on a single distributed feedback laser. A light wave generated from the distributed feedback laser is fed into a frequency shifter loop consisting of 50:50 coupler, dual-parallel Mach-Zehnder modulator, optical amplifier, optical filter, and polarization controller. The frequency of the input wavelength is shifted and then re-injected into the frequency shifter loop. By re-injecting the shifted wavelengths multiple times, we have generated 84 optical carriers with 12 GHz wavelength spacing and stable output power. For each channel, two wavelengths are modulated by a wireless data using the phase modulator and transmitted through a 25 km single mode fiber. In contrast to previously developed schemes, the proposed laser source does not incur DC bias drift problem. Moreover, it is a good candidate for radio-over-fiber systems to support multiple users using a single distributed feedback laser.

  4. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    PubMed Central

    Chen, Huifang; Xie, Lei

    2014-01-01

    Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked. PMID:25529204

  5. Totally Connected Healthcare with TV White Spaces.

    PubMed

    Katzis, Konstantinos; Jones, Richard W; Despotou, Georgios

    2017-01-01

    Recent technological advances in electronics, wireless communications and low cost medical sensors generated a plethora of Wearable Medical Devices (WMDs), which are capable of generating considerably large amounts of new, unstructured real-time data. This contribution outlines how this data can be propagated to a healthcare system through the internet, using long distance Radio Access Networks (RANs) and proposes a novel communication system architecture employing White Space Devices (WSD) to provide seamless connectivity to its users. Initial findings indicate that the proposed communication system can facilitate broadband services over a large geographical area taking advantage of the freely available TV White Spaces (TVWS).

  6. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    ERIC Educational Resources Information Center

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  7. 76 FR 34845 - Medical Devices; Ear, Nose, and Throat Devices; Classification of the Wireless Air-Conduction...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... control by other users with a similar medical device. Exposure to non-ionizing radiation Wireless... Administration (FDA) is classifying the wireless air-conduction hearing aid into class II (special controls). The Agency is classifying the device into class II (special controls) in order to provide a reasonable...

  8. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    PubMed Central

    Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm. PMID:25276862

  9. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  10. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  11. Marine C2 in Support of HA/DR: Observations and Critical Assessments Following Super-Typhoon Haiyan

    DTIC Science & Technology

    2014-06-01

    farm (Figure 1), established Internet access over commercial satellite service 6 (Figure 2), and configured a wireless local area network ( WLAN ...included support for a larger diameter wireless local area network ( WLAN ), providing greater freedom of movement for users accessing the GATR...emerging commercial capabilities, both communications systems and handheld/user-access devices involves the establishment of a synergistic application

  12. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities

    PubMed Central

    Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-01-01

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds. PMID:29099745

  13. A Middleware Solution for Wireless IoT Applications in Sparse Smart Cities.

    PubMed

    Bellavista, Paolo; Giannelli, Carlo; Lanzone, Stefano; Riberto, Giulio; Stefanelli, Cesare; Tortonesi, Mauro

    2017-11-03

    The spread of off-the-shelf mobile devices equipped with multiple wireless interfaces together with sophisticated sensors is paving the way to novel wireless Internet of Things (IoT) environments, characterized by multi-hop infrastructure-less wireless networks where devices carried by users act as sensors/actuators as well as network nodes. In particular, the paper presents Real Ad-hoc Multi-hop Peer-to peer-Wireless IoT Application (RAMP-WIA), a novel solution that facilitates the development, deployment, and management of applications in sparse Smart City environments, characterized by users willing to collaborate by allowing new applications to be deployed on their smartphones to remotely monitor and control fixed/mobile devices. RAMP-WIA allows users to dynamically configure single-hop wireless links, to manage opportunistically multi-hop packet dispatching considering that the network topology (together with the availability of sensors and actuators) may abruptly change, to actuate reliably sensor nodes specifically considering that only part of them could be actually reachable in a timely manner, and to upgrade dynamically the nodes through over-the-air distribution of new software components. The paper also reports the performance of RAMP-WIA on simple but realistic cases of small-scale deployment scenarios with off-the-shelf Android smartphones and Raspberry Pi devices; these results show not only the feasibility and soundness of the proposed approach, but also the efficiency of the middleware implemented when deployed on real testbeds.

  14. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  15. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  16. A Fast and Scalable Algorithm for Calculating the Achievable Capacity of a Wireless Mesh Network

    DTIC Science & Technology

    2016-05-09

    an optimal wireless transmission schedule for a predetermined set of links without the addition of routing is NP-Hard [5]. We effectively bypass the... wireless communications have used omni-directional antennas, where a user’s transmission inter- feres with others users in all directions. Different...interference from some particular transmission . Hence, δ = ∆(Ḡc) = max(i,j)∈E |Fij |. IV. ALGORITHM FOR RAPIDLY DETERMINING WIRELESS NETWORK CAPACITY In

  17. Interactive computation of coverage regions for indoor wireless communication

    NASA Astrophysics Data System (ADS)

    Abbott, A. Lynn; Bhat, Nitin; Rappaport, Theodore S.

    1995-12-01

    This paper describes a system which assists in the strategic placement of rf base stations within buildings. Known as the site modeling tool (SMT), this system allows the user to display graphical floor plans and to select base station transceiver parameters, including location and orientation, interactively. The system then computes and highlights estimated coverage regions for each transceiver, enabling the user to assess the total coverage within the building. For single-floor operation, the user can choose between distance-dependent and partition- dependent path-loss models. Similar path-loss models are also available for the case of multiple floors. This paper describes the method used by the system to estimate coverage for both directional and omnidirectional antennas. The site modeling tool is intended to be simple to use by individuals who are not experts at wireless communication system design, and is expected to be very useful in the specification of indoor wireless systems.

  18. An arch-shaped intraoral tongue drive system with built-in tongue-computer interfacing SoC.

    PubMed

    Park, Hangue; Ghovanloo, Maysam

    2014-11-14

    We present a new arch-shaped intraoral Tongue Drive System (iTDS) designed to occupy the buccal shelf in the user's mouth. The new arch-shaped iTDS, which will be referred to as the iTDS-2, incorporates a system-on-a-chip (SoC) that amplifies and digitizes the raw magnetic sensor data and sends it wirelessly to an external TDS universal interface (TDS-UI) via an inductive coil or a planar inverted-F antenna. A built-in transmitter (Tx) employs a dual-band radio that operates at either 27 MHz or 432 MHz band, according to the wireless link quality. A built-in super-regenerative receiver (SR-Rx) monitors the wireless link quality and switches the band if the link quality is below a predetermined threshold. An accompanying ultra-low power FPGA generates data packets for the Tx and handles digital control functions. The custom-designed TDS-UI receives raw magnetic sensor data from the iTDS-2, recognizes the intended user commands by the sensor signal processing (SSP) algorithm running in a smartphone, and delivers the classified commands to the target devices, such as a personal computer or a powered wheelchair. We evaluated the iTDS-2 prototype using center-out and maze navigation tasks on two human subjects, which proved its functionality. The subjects' performance with the iTDS-2 was improved by 22% over its predecessor, reported in our earlier publication.

  19. Preserving Source Location Privacy for Energy Harvesting WSNs.

    PubMed

    Huang, Changqin; Ma, Ming; Liu, Yuxin; Liu, Anfeng

    2017-03-30

    Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a redundancy branch convergence-based preserved source location privacy scheme (RBCPSLP) is proposed for energy harvesting sensor networks, with the following advantages: numerous routing branches are created in non-hotspot areas with abundant energy, and those routing branches can merge into a few routing paths before they reach the hotspot areas. The generation time, the duration of routing, and the number of routing branches are then decided independently based on the amount of energy obtained, so as to maximize network energy utilization, greatly enhance privacy protection, and provide long network lifetimes. Theoretical analysis and experimental results show that the RBCPSLP scheme allows a several-fold improvement of the network energy utilization as well as the source location privacy preservation, while maximizing network lifetimes.

  20. Preserving Source Location Privacy for Energy Harvesting WSNs

    PubMed Central

    Huang, Changqin; Ma, Ming; Liu, Yuxin; Liu, Anfeng

    2017-01-01

    Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a redundancy branch convergence-based preserved source location privacy scheme (RBCPSLP) is proposed for energy harvesting sensor networks, with the following advantages: numerous routing branches are created in non-hotspot areas with abundant energy, and those routing branches can merge into a few routing paths before they reach the hotspot areas. The generation time, the duration of routing, and the number of routing branches are then decided independently based on the amount of energy obtained, so as to maximize network energy utilization, greatly enhance privacy protection, and provide long network lifetimes. Theoretical analysis and experimental results show that the RBCPSLP scheme allows a several-fold improvement of the network energy utilization as well as the source location privacy preservation, while maximizing network lifetimes. PMID:28358341

  1. Investigation of the performance of EOTD for GSM users in telematics applications

    NASA Astrophysics Data System (ADS)

    Sharawi, Mohammad S.; Aloi, Daniel N.

    2003-08-01

    Location-based services have been standardized for incorporation into 3rd generation wireless communications as a result of the Federal Communications Commission"s (FCC) mandate on wireless carriers to provide automatic location information (ALI) during emergency911 calls. This mandate has driven the wireless carriers to explore terrestrial, satellite, and hybrid based location technology solutions. This paper presents a communications model that investigates the position accuracyof a Global Standard Mobile (GSM) phone employing the enhanced observed time difference (EOTD) location technology. The EOTD positioning technique requires the mobile station (MS) to detect signals from at least three base stations (BS). This studyassumes the three BSs are synchronized in time. For a given BS geometry with respect to the MS, a Monte Carlo simulation was performed to assess the two-dimensional position accuracyof the MS in Rayleigh and Ricean fading channels. In each channel, a Monte Carlo simulation was performed for a good and a bad BS-to-MS geometry. The paper concludes with a list of pros/cons of implementing EOTD as a location technologyenabler in telematics applications.

  2. From Zero to Wireless in 4 Essential Steps

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…

  3. Wireless as Enabler of Innovation in 21.

    PubMed

    Ball, Eddie; Vasileiadis, Athanasios

    2017-01-01

    This paper overviews new and emerging wireless technologies that could positively impact on the lives of the elderly or disabled, as Social Care users of Assistive Technology (AT) for 'independent living'. Novel Internet of Things (IoT) radio systems and wireless locating systems being researched at The University of Sheffield are discussed in the context of Social Care technology use-cases.

  4. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and decision makers who extract information from the OCHO data in the databases form the foundation of the situation management problem.

  5. A Spectrum Access Based on Quality of Service (QoS) in Cognitive Radio Networks.

    PubMed

    Zhai, Linbo; Wang, Hua; Gao, Chuangen

    2016-01-01

    The quality of service (QoS) is important issue for cognitive radio networks. In the cognitive radio system, the licensed users, also called primary users (PUs), are authorized to utilize the wireless spectrum, while unlicensed users, also called secondary users (SUs), are not authorized to use the wireless spectrum. SUs access the wireless spectrum opportunistically when the spectrum is idle. While SUs use an idle channel, the instance that PUs come back makes SUs terminate their communications and leave the current channel. Therefore, quality of service (QoS) is difficult to be ensured for SUs. In this paper, we first propose an analysis model to obtain QoS for cognitive radio networks such as blocking probability, completed traffic and termination probability of SUs. When the primary users use the channels frequently, QoS of SUs is difficult to be ensured, especially the termination probability. Then, we propose a channel reservation scheme to improve QoS of SUs. The scheme makes the terminated SUs move to the reserved channels and keep on communications. Simulation results show that our scheme can improve QoS of SUs especially the termination probability with a little cost of blocking probability in dynamic environment.

  6. Integration of hybrid wireless networks in cloud services oriented enterprise information systems

    NASA Astrophysics Data System (ADS)

    Li, Shancang; Xu, Lida; Wang, Xinheng; Wang, Jue

    2012-05-01

    This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.

  7. Adaptive Traffic Route Control in QoS Provisioning for Cognitive Radio Technology with Heterogeneous Wireless Systems

    NASA Astrophysics Data System (ADS)

    Yamamoto, Toshiaki; Ueda, Tetsuro; Obana, Sadao

    As one of the dynamic spectrum access technologies, “cognitive radio technology,” which aims to improve the spectrum efficiency, has been studied. In cognitive radio networks, each node recognizes radio conditions, and according to them, optimizes its wireless communication routes. Cognitive radio systems integrate the heterogeneous wireless systems not only by switching over them but also aggregating and utilizing them simultaneously. The adaptive control of switchover use and concurrent use of various wireless systems will offer a stable and flexible wireless communication. In this paper, we propose the adaptive traffic route control scheme that provides high quality of service (QoS) for cognitive radio technology, and examine the performance of the proposed scheme through the field trials and computer simulations. The results of field trials show that the adaptive route control according to the radio conditions improves the user IP throughput by more than 20% and reduce the one-way delay to less than 1/6 with the concurrent use of IEEE802.16 and IEEE802.11 wireless media. Moreover, the simulation results assuming hundreds of mobile terminals reveal that the number of users receiving the required QoS of voice over IP (VoIP) service and the total network throughput of FTP users increase by more than twice at the same time with the proposed algorithm. The proposed adaptive traffic route control scheme can enhance the performances of the cognitive radio technologies by providing the appropriate communication routes for various applications to satisfy their required QoS.

  8. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  9. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  10. A PDA study management tool (SMT) utilizing wireless broadband and full DICOM viewing capability

    NASA Astrophysics Data System (ADS)

    Documet, Jorge; Liu, Brent; Zhou, Zheng; Huang, H. K.; Documet, Luis

    2007-03-01

    During the last 4 years IPI (Image Processing and Informatics) Laboratory has been developing a web-based Study Management Tool (SMT) application that allows Radiologists, Film librarians and PACS-related (Picture Archiving and Communication System) users to dynamically and remotely perform Query/Retrieve operations in a PACS network. The users utilizing a regular PDA (Personal Digital Assistant) can remotely query a PACS archive to distribute any study to an existing DICOM (Digital Imaging and Communications in Medicine) node. This application which has proven to be convenient to manage the Study Workflow [1, 2] has been extended to include a DICOM viewing capability in the PDA. With this new feature, users can take a quick view of DICOM images providing them mobility and convenience at the same time. In addition, we are extending this application to Metropolitan-Area Wireless Broadband Networks. This feature requires Smart Phones that are capable of working as a PDA and have access to Broadband Wireless Services. With the extended application to wireless broadband technology and the preview of DICOM images, the Study Management Tool becomes an even more powerful tool for clinical workflow management.

  11. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    PubMed

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  12. A wireless PDA-based physiological monitoring system for patient transport.

    PubMed

    Lin, Yuan-Hsiang; Jan, I-Chien; Ko, Patrick Chow-In; Chen, Yen-Yu; Wong, Jau-Min; Jan, Gwo-Jen

    2004-12-01

    This paper proposes a mobile patient monitoring system, which integrates current personal digital assistant (PDA) technology and wireless local area network (WLAN) technology. At the patient's location, a wireless PDA-based monitor is used to acquire continuously the patient's vital signs, including heart rate, three-lead electrocardiography, and SpO2. Through the WLAN, the patient's biosignals can be transmitted in real-time to a remote central management unit, and authorized medical staffs can access the data and the case history of the patient, either by the central management unit or the wireless devices. A prototype of this system has been developed and implemented. The system has been evaluated by technical verification, clinical test, and user survey. The evaluation of performance yields a high degree of satisfaction (mean = 4.64, standard deviation--SD = 0.53 in a five-point Likert scale) of users who used the PDA-based system for intrahospital transport. The results also show that the wireless PDA model is superior to the currently used monitors both in mobility and in usability, and is, therefore, better suited to patient transport.

  13. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  14. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  15. Write, read and answer emails with a dry 'n' wireless brain-computer interface system.

    PubMed

    Pinegger, Andreas; Deckert, Lisa; Halder, Sebastian; Barry, Norbert; Faller, Josef; Käthner, Ivo; Hintermüller, Christoph; Wriessnegger, Selina C; Kübler, Andrea; Müller-Putz, Gernot R

    2014-01-01

    Brain-computer interface (BCI) users can control very complex applications such as multimedia players or even web browsers. Therefore, different biosignal acquisition systems are available to noninvasively measure the electrical activity of the brain, the electroencephalogram (EEG). To make BCIs more practical, hardware and software are nowadays designed more user centered and user friendly. In this paper we evaluated one of the latest innovations in the area of BCI: A wireless EEG amplifier with dry electrode technology combined with a web browser which enables BCI users to use standard webmail. With this system ten volunteers performed a daily life task: Write, read and answer an email. Experimental results of this study demonstrate the power of the introduced BCI system.

  16. Washington State Ferries : evaluation results : wireless connection project

    DOT National Transportation Integrated Search

    2005-08-23

    The purpose of the Wireless Connection Project was "to provide passengers if the WSF system continuous high-speed Internet access at the dock and onboard ferries wjile en route to enhance the user experience." The objective of this evaluation report ...

  17. Washington State Ferries (WSF) Wireless Connection Project (WCP) evaluation

    DOT National Transportation Integrated Search

    2005-05-31

    The purpose of the Washington State Ferries (WSF) Wireless Connection Project (WCP) was to provide passengers of the WSF system continuous high speed internet access at the dock and onboard ferries while en route to enhance the user experience. Th...

  18. Competition in the domain of wireless networks security

    NASA Astrophysics Data System (ADS)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  19. Energy scavenging system by acoustic wave and integrated wireless communication

    NASA Astrophysics Data System (ADS)

    Kim, Albert

    The purpose of the project was developing an energy-scavenging device for other bio implantable devices. Researchers and scientist have studied energy scavenging method because of the limitation of traditional power source, especially for bio-implantable devices. In this research, piezoelectric power generator that activates by acoustic wave, or music was developed. Follow by power generator, a wireless communication also integrated with the device for monitoring the power generation. The Lead Zirconate Titanate (PZT) bimorph cantilever with a proof mass at the free end tip was studied to convert acoustic wave to power. The music or acoustic wave played through a speaker to vibrate piezoelectric power generator. The LC circuit integrated with the piezoelectric material for purpose of wireless monitoring power generation. However, wireless monitoring can be used as wireless power transmission, which means the signal received via wireless communication also can be used for power for other devices. Size of 74 by 7 by 7cm device could generate and transmit 100mVp from 70 mm distance away with electrical resonant frequency at 420.2 kHz..

  20. All optical OFDM transmission for passive optical networks

    NASA Astrophysics Data System (ADS)

    Kachare, Nitin; Ashik T., J.; Bai, K. Kalyani; Kumar, D. Sriram

    2017-06-01

    This paper demonstrates the idea of data transmission at a very higher rate (Tbits/s) through optical fibers in a passive optical network using the most efficient data transmission technique widely used in wireless communication that is orthogonal frequency division multiplexing. With an increase in internet users, data traffic has also increased significantly and the current dense wavelength division multiplexing (DWDM) systems may not support the next generation passive optical networks (PONs) requirements. The approach discussed in this paper allows to increase the downstream data rate per user and extend the standard single-mode fiber reach for future long-haul applications. All-optical OFDM is a promising solution for terabit per second capable single wavelength transmission, with high spectral efficiency and high tolerance to chromatic dispersion.

  1. Context-based user grouping for multi-casting in heterogeneous radio networks

    NASA Astrophysics Data System (ADS)

    Mannweiler, C.; Klein, A.; Schneider, J.; Schotten, H. D.

    2011-08-01

    Along with the rise of sophisticated smartphones and smart spaces, the availability of both static and dynamic context information has steadily been increasing in recent years. Due to the popularity of social networks, these data are complemented by profile information about individual users. Making use of this information by classifying users in wireless networks enables targeted content and advertisement delivery as well as optimizing network resources, in particular bandwidth utilization, by facilitating group-based multi-casting. In this paper, we present the design and implementation of a web service for advanced user classification based on user, network, and environmental context information. The service employs simple and advanced clustering algorithms for forming classes of users. Available service functionalities include group formation, context-aware adaptation, and deletion as well as the exposure of group characteristics. Moreover, the results of a performance evaluation, where the service has been integrated in a simulator modeling user behavior in heterogeneous wireless systems, are presented.

  2. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  3. Connecting AAC devices to the world of information technology.

    PubMed

    Caves, Kevin; Shane, Howard C; DeRuyter, Frank

    2002-01-01

    Modern day information technology (IT) is converging around wireless networks. It is now possible to check E-mail and view information from the World Wide Web from commercially available mobile phones. For individuals with disabilities, the ability to access multiple and different types of information not only promises convenience, but also can help to promote independence and facilitate access to public and private information systems. There are many barriers to access for people with disabilities, including technological hurdles, security, privacy, and access to these emerging wireless technologies. However, legislation, advocacy, standards, and research and development can ensure that users of augmentative and alternative communication (AAC) and assistive technology have access to these technologies. This article provides a historical context for the field of AAC and IT development, a review of the current state of these technologies, a glimpse of the potential of wireless information access for the lives of AAC users, and a description of some of the barriers and enablers to making access available to users of AAC and assistive technologies.

  4. Evaluation of a wireless wearable tongue–computer interface by individuals with high-level spinal cord injuries

    PubMed Central

    Huo, Xueliang; Ghovanloo, Maysam

    2010-01-01

    The tongue drive system (TDS) is an unobtrusive, minimally invasive, wearable and wireless tongue–computer interface (TCI), which can infer its users' intentions, represented in their volitional tongue movements, by detecting the position of a small permanent magnetic tracer attached to the users' tongues. Any specific tongue movements can be translated into user-defined commands and used to access and control various devices in the users' environments. The latest external TDS (eTDS) prototype is built on a wireless headphone and interfaced to a laptop PC and a powered wheelchair. Using customized sensor signal processing algorithms and graphical user interface, the eTDS performance was evaluated by 13 naive subjects with high-level spinal cord injuries (C2–C5) at the Shepherd Center in Atlanta, GA. Results of the human trial show that an average information transfer rate of 95 bits/min was achieved for computer access with 82% accuracy. This information transfer rate is about two times higher than the EEG-based BCIs that are tested on human subjects. It was also demonstrated that the subjects had immediate and full control over the powered wheelchair to the extent that they were able to perform complex wheelchair navigation tasks, such as driving through an obstacle course. PMID:20332552

  5. Coexistence: Threat to the Performance of Heterogeneous Network

    NASA Astrophysics Data System (ADS)

    Sharma, Neetu; Kaur, Amanpreet

    2010-11-01

    Wireless technology is gaining broad acceptance as users opt for the freedom that only wireless network can provide. Well-accepted wireless communication technologies generally operate in frequency bands that are shared among several users, often using different RF schemes. This is true in particular for WiFi, Bluetooth, and more recently ZigBee. These all three operate in the unlicensed 2.4 GHz band, also known as ISM band, which has been key to the development of a competitive and innovative market for wireless embedded devices. But, as with any resource held in common, it is crucial that those technologies coexist peacefully to allow each user of the band to fulfill its communication goals. This has led to an increase in wireless devices intended for use in IEEE 802.11 wireless local area networks (WLANs) and wireless personal area networks (WPANs), both of which support operation in the crowded 2.4-GHz industrial, scientific and medical (ISM) band. Despite efforts made by standardization bodies to ensure smooth coexistence it may occur that communication technologies transmitting for instance at very different power levels interfere with each other. In particular, it has been pointed out that ZigBee could potentially experience interference from WiFi traffic given that while both protocols can transmit on the same channel, WiFi transmissions usually occur at much higher power level. In this work, we considered a heterogeneous network and analyzed the impact of coexistence between IEEE 802.15.4 and IEEE 802.11b. To evaluate the performance of this network, measurement and simulation study are conducted and developed in the QualNet Network simulator, version 5.0.Model is analyzed for different placement models or topologies such as Random. Grid & Uniform. Performance is analyzed on the basis of characteristics such as throughput, average jitter and average end to end delay. Here, the impact of varying different antenna gain & shadowing model for this heterogeneous network is considered for the purpose of analysis.

  6. A wirelessly programmable actuation and sensing system for structural health monitoring

    NASA Astrophysics Data System (ADS)

    Long, James; Büyüköztürk, Oral

    2016-04-01

    Wireless sensor networks promise to deliver low cost, low power and massively distributed systems for structural health monitoring. A key component of these systems, particularly when sampling rates are high, is the capability to process data within the network. Although progress has been made towards this vision, it remains a difficult task to develop and program 'smart' wireless sensing applications. In this paper we present a system which allows data acquisition and computational tasks to be specified in Python, a high level programming language, and executed within the sensor network. Key features of this system include the ability to execute custom application code without firmware updates, to run multiple users' requests concurrently and to conserve power through adjustable sleep settings. Specific examples of sensor node tasks are given to demonstrate the features of this system in the context of structural health monitoring. The system comprises of individual firmware for nodes in the wireless sensor network, and a gateway server and web application through which users can remotely submit their requests.

  7. Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices.

    PubMed

    Mehta, Rajvi; Nankivil, Derek; Zielinski, David J; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T; Kopper, Regis; Izatt, Joseph A; Kuo, Anthony N

    2017-01-01

    Optical coherence tomography (OCT) is widely used in ophthalmology clinics and has potential for more general medical settings and remote diagnostics. In anticipation of remote applications, we developed wireless interactive control of an OCT system using mobile devices. A web-based user interface (WebUI) was developed to interact with a handheld OCT system. The WebUI consisted of key OCT displays and controls ported to a webpage using HTML and JavaScript. Client-server relationships were created between the WebUI and the OCT system computer. The WebUI was accessed on a cellular phone mounted to the handheld OCT probe to wirelessly control the OCT system. Twenty subjects were imaged using the WebUI to assess the system. System latency was measured using different connection types (wireless 802.11n only, wireless to remote virtual private network [VPN], and cellular). Using a cellular phone, the WebUI was successfully used to capture posterior eye OCT images in all subjects. Simultaneous interactivity by a remote user on a laptop was also demonstrated. On average, use of the WebUI added only 58, 95, and 170 ms to the system latency using wireless only, wireless to VPN, and cellular connections, respectively. Qualitatively, operator usage was not affected. Using a WebUI, we demonstrated wireless and remote control of an OCT system with mobile devices. The web and open source software tools used in this project make it possible for any mobile device to potentially control an OCT system through a WebUI. This platform can be a basis for remote, teleophthalmology applications using OCT.

  8. A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks

    NASA Astrophysics Data System (ADS)

    Kustiawan, I.; Purnama, W.

    2018-02-01

    Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.

  9. A wideband dual-antenna receiver for wireless recording from animals behaving in large arenas.

    PubMed

    Lee, Seung Bae; Yin, Ming; Manns, Joseph R; Ghovanloo, Maysam

    2013-07-01

    A low-noise wideband receiver (Rx) is presented for a multichannel wireless implantable neural recording (WINeR) system that utilizes time-division multiplexing of pulse width modulated (PWM) samples. The WINeR-6 Rx consists of four parts: 1) RF front end; 2) signal conditioning; 3) analog output (AO); and 4) field-programmable gate array (FPGA) back end. The RF front end receives RF-modulated neural signals in the 403-490 MHz band with a wide bandwidth of 18 MHz. The frequency-shift keying (FSK) PWM demodulator in the FPGA is a time-to-digital converter with 304 ps resolution, which converts the analog pulse width information to 16-bit digital samples. Automated frequency tracking has been implemented in the Rx to lock onto the free-running voltage-controlled oscillator in the transmitter (Tx). Two antennas and two parallel RF paths are used to increase the wireless coverage area. BCI-2000 graphical user interface has been adopted and modified to acquire, visualize, and record the recovered neural signals in real time. The AO module picks three demultiplexed channels and converts them into analog signals for direct observation on an oscilloscope. One of these signals is further amplified to generate an audio output, offering users the ability to listen to ongoing neural activity. Bench-top testing of the Rx performance with a 32-channel WINeR-6 Tx showed that the input referred noise of the entire system at a Tx-Rx distance of 1.5 m was 4.58 μV rms with 8-bit resolution at 640 kSps. In an in vivo experiment, location-specific receptive fields of hippocampal place cells were mapped during a behavioral experiment in which a rat completed 40 laps in a large circular track. Results were compared against those acquired from the same animal and the same set of electrodes by a commercial hardwired recording system to validate the wirelessly recorded signals.

  10. A Wideband Dual-Antenna Receiver for Wireless Recording From Animals Behaving in Large Arenas

    PubMed Central

    Lee, Seung Bae; Yin, Ming; Manns, Joseph R.

    2014-01-01

    A low-noise wideband receiver (Rx) is presented for a multichannel wireless implantable neural recording (WINeR) system that utilizes time-division multiplexing of pulse width modulated (PWM) samples. The WINeR-6 Rx consists of four parts: 1) RF front end; 2) signal conditioning; 3) analog output (AO); and 4) field-programmable gate array (FPGA) back end. The RF front end receives RF-modulated neural signals in the 403–490 MHz band with a wide bandwidth of 18 MHz. The frequency-shift keying (FSK) PWM demodulator in the FPGA is a time-to-digital converter with 304 ps resolution, which converts the analog pulse width information to 16-bit digital samples. Automated frequency tracking has been implemented in the Rx to lock onto the free-running voltage-controlled oscillator in the transmitter (Tx). Two antennas and two parallel RF paths are used to increase the wireless coverage area. BCI-2000 graphical user interface has been adopted and modified to acquire, visualize, and record the recovered neural signals in real time. The AO module picks three demultiplexed channels and converts them into analog signals for direct observation on an oscilloscope. One of these signals is further amplified to generate an audio output, offering users the ability to listen to ongoing neural activity. Bench-top testing of the Rx performance with a 32-channel WINeR-6 Tx showed that the input referred noise of the entire system at a Tx–Rx distance of 1.5 m was 4.58 μVrms with 8-bit resolution at 640 kSps. In an in vivo experiment, location-specific receptive fields of hippocampal place cells were mapped during a behavioral experiment in which a rat completed 40 laps in a large circular track. Results were compared against those acquired from the same animal and the same set of electrodes by a commercial hardwired recording system to validate the wirelessly recorded signals. PMID:23428612

  11. Exploiting Spatial Channel Occupancy Information in WLANs

    DTIC Science & Technology

    2014-05-15

    transmit signal UDP user datagram protocol WLAN wireless local area network ix Acknowledgements I owe a great debt of gratitude to my advisor, Professor...information. Unlike in wired networks , each node in a wireless network observes a different medium depending on its location. As a result, standard local... wireless LANs [15, 23, 29]. In [23], Li et. al. model the throughput of an 802.11 network using full spatial information. Their approach is from a

  12. Glass-type wireless PPG measuring system.

    PubMed

    Lee, E M; Shin, J Y; Hong, J H; Cha, E J; Lee, T S

    2010-01-01

    This paper is about a glass-type wireless bio-signal transmitter that can monitor the user's health state in daily life. The device implemented in this study consists of the transmission part and the receiving part. The transmission part includes a photoplethysmography(PPG) sensor for detecting pulse wave signals, accelerometer for detecting kinetic signals, and a wireless controller for transmitting acquired bio-information. The receiving part is designed to check and process transmitted data through interoperation with a PC. In the experiments, we collected data during a sitting posture and repeated sit-to-stand motion in laboratory environment, and analyzed the data. As to accuracy, the correlation between the peak-to-peak intervals in the signals of the Biopac equipment and the developed device measured in a sitting posture was 97.5%, and that measured in sit-to-stand motion was 87%. In addition, when bio-signals were transmitted through wireless communication, the transmission was successful 100% without any error. When pulse wave signals and kinetic signals were obtained and compared, the results proved the accuracy and daily applicability of the developed device, and the glass-type wireless bio-signal transmission system is expected to be applicable to unobtrusive health monitoring for the user.

  13. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  14. National Evaluation Program CapWIN: the capital wireless integrated net phase III final report.

    DOT National Transportation Integrated Search

    2008-04-01

    The Capital Area Wireless Integrated Net (CapWIN) is comprised of first responder agencies in the Washington, DC metropolitan area. Through the use of the CapWIN application, responders are able to: 1. Exchange messages with other users at roadside l...

  15. The benefits of convergence.

    PubMed

    Chang, Gee-Kung; Cheng, Lin

    2016-03-06

    A multi-tier radio access network (RAN) combining the strength of fibre-optic and radio access technologies employing adaptive microwave photonics interfaces and radio-over-fibre (RoF) techniques is envisioned for future heterogeneous wireless communications. All-band radio spectrum from 0.1 to 100 GHz will be used to deliver wireless services with high capacity, high link speed and low latency. The multi-tier RAN will improve the cell-edge performance in an integrated heterogeneous environment enabled by fibre-wireless integration and networking for mobile fronthaul/backhaul, resource sharing and all-layer centralization of multiple standards with different frequency bands and modulation formats. In essence, this is a 'no-more-cells' architecture in which carrier aggregation among multiple frequency bands can be easily achieved with seamless handover between cells. In this way, current and future mobile network standards such as 4G and 5G can coexist with optimized and continuous cell coverage using multi-tier RoF regardless of the underlying network topology or protocol. In terms of users' experience, the future-proof approach achieves the goals of system capacity, link speed, latency and continuous heterogeneous cell coverage while overcoming the bandwidth crunch in next-generation communication networks. © 2016 The Author(s).

  16. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks.

    PubMed

    Lyu, Bin; Yang, Zhen; Gui, Guan; Sari, Hikmet

    2017-06-01

    This paper proposes a wireless powered communication network (WPCN) assisted by backscatter communication (BackCom). This model consists of a power station, an information receiver and multiple users that can work in either BackCom mode or harvest-then-transmit (HTT) mode. The time block is mainly divided into two parts corresponding to the data backscattering and transmission periods, respectively. The users first backscatter data to the information receiver in time division multiple access (TDMA) during the data backscattering period. When one user works in the BackCom mode, the other users harvest energy from the power station. During the data transmission period, two schemes, i.e., non-orthogonal multiple access (NOMA) and TDMA, are considered. To maximize the system throughput, the optimal time allocation policies are obtained. Simulation results demonstrate the superiority of the proposed model.

  17. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks

    PubMed Central

    Lyu, Bin; Yang, Zhen; Gui, Guan; Sari, Hikmet

    2017-01-01

    This paper proposes a wireless powered communication network (WPCN) assisted by backscatter communication (BackCom). This model consists of a power station, an information receiver and multiple users that can work in either BackCom mode or harvest-then-transmit (HTT) mode. The time block is mainly divided into two parts corresponding to the data backscattering and transmission periods, respectively. The users first backscatter data to the information receiver in time division multiple access (TDMA) during the data backscattering period. When one user works in the BackCom mode, the other users harvest energy from the power station. During the data transmission period, two schemes, i.e., non-orthogonal multiple access (NOMA) and TDMA, are considered. To maximize the system throughput, the optimal time allocation policies are obtained. Simulation results demonstrate the superiority of the proposed model. PMID:28587171

  18. Experience of wireless local area network in a radiation oncology department.

    PubMed

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  19. Bio-Inspired Distributed Transmission Power Control Considering QoS Fairness in Wireless Body Area Sensor Networks

    PubMed Central

    2017-01-01

    Recently, the development of wireless body area sensor network (WBASN) has accelerated due to the rapid development of wireless technology. In the WBASN environment, many WBASNs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Although nodes in a WBASN typically operate at a low power level, to avoid adversely affecting the human body, high transmission rates may be required to support some applications. In addition to this, since many varieties of applications exist in the WBASN environment, each prospective user may have different quality of service (QoS) requirements. Hence, the following issues should be considered in the WBASN environment: (1) interference between adjacent WBASNs, which influences the performance of a specific system, and (2) the degree of satisfaction on the QoS of each user, i.e., the required QoS such as user throughput should be considered to ensure that all users in the network are provided with a fair QoS satisfaction. Thus, in this paper, we propose a transmission power adjustment algorithm that addresses interference problems and guarantees QoS fairness between users. First, we use a new utility function to measure the degree of the satisfaction on the QoS for each user. Then, the transmission power of each sensor node is calculated using the Cucker–Smale model, and the QoS satisfaction of each user is synchronized dispersively. The results of simulations show that the proposed algorithm performs better than existing algorithms, with respect to QoS fairness and energy efficiency. PMID:29036924

  20. Bio-Inspired Distributed Transmission Power Control Considering QoS Fairness in Wireless Body Area Sensor Networks.

    PubMed

    Lee, Chan-Jae; Jung, Ji-Young; Lee, Jung-Ryun

    2017-10-14

    Recently, the development of wireless body area sensor network (WBASN) has accelerated due to the rapid development of wireless technology. In the WBASN environment, many WBASNs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Although nodes in a WBASN typically operate at a low power level, to avoid adversely affecting the human body, high transmission rates may be required to support some applications. In addition to this, since many varieties of applications exist in the WBASN environment, each prospective user may have different quality of service (QoS) requirements. Hence, the following issues should be considered in the WBASN environment: (1) interference between adjacent WBASNs, which influences the performance of a specific system, and (2) the degree of satisfaction on the QoS of each user, i.e., the required QoS such as user throughput should be considered to ensure that all users in the network are provided with a fair QoS satisfaction. Thus, in this paper, we propose a transmission power adjustment algorithm that addresses interference problems and guarantees QoS fairness between users. First, we use a new utility function to measure the degree of the satisfaction on the QoS for each user. Then, the transmission power of each sensor node is calculated using the Cucker-Smale model, and the QoS satisfaction of each user is synchronized dispersively. The results of simulations show that the proposed algorithm performs better than existing algorithms, with respect to QoS fairness and energy efficiency.

  1. Dynamic Task Optimization in Remote Diabetes Monitoring Systems.

    PubMed

    Suh, Myung-Kyung; Woodbridge, Jonathan; Moin, Tannaz; Lan, Mars; Alshurafa, Nabil; Samy, Lauren; Mortazavi, Bobak; Ghasemzadeh, Hassan; Bui, Alex; Ahmadi, Sheila; Sarrafzadeh, Majid

    2012-09-01

    Diabetes is the seventh leading cause of death in the United States, but careful symptom monitoring can prevent adverse events. A real-time patient monitoring and feedback system is one of the solutions to help patients with diabetes and their healthcare professionals monitor health-related measurements and provide dynamic feedback. However, data-driven methods to dynamically prioritize and generate tasks are not well investigated in the domain of remote health monitoring. This paper presents a wireless health project (WANDA) that leverages sensor technology and wireless communication to monitor the health status of patients with diabetes. The WANDA dynamic task management function applies data analytics in real-time to discretize continuous features, applying data clustering and association rule mining techniques to manage a sliding window size dynamically and to prioritize required user tasks. The developed algorithm minimizes the number of daily action items required by patients with diabetes using association rules that satisfy a minimum support, confidence and conditional probability thresholds. Each of these tasks maximizes information gain, thereby improving the overall level of patient adherence and satisfaction. Experimental results from applying EM-based clustering and Apriori algorithms show that the developed algorithm can predict further events with higher confidence levels and reduce the number of user tasks by up to 76.19 %.

  2. Dynamic Task Optimization in Remote Diabetes Monitoring Systems

    PubMed Central

    Suh, Myung-kyung; Woodbridge, Jonathan; Moin, Tannaz; Lan, Mars; Alshurafa, Nabil; Samy, Lauren; Mortazavi, Bobak; Ghasemzadeh, Hassan; Bui, Alex; Ahmadi, Sheila; Sarrafzadeh, Majid

    2016-01-01

    Diabetes is the seventh leading cause of death in the United States, but careful symptom monitoring can prevent adverse events. A real-time patient monitoring and feedback system is one of the solutions to help patients with diabetes and their healthcare professionals monitor health-related measurements and provide dynamic feedback. However, data-driven methods to dynamically prioritize and generate tasks are not well investigated in the domain of remote health monitoring. This paper presents a wireless health project (WANDA) that leverages sensor technology and wireless communication to monitor the health status of patients with diabetes. The WANDA dynamic task management function applies data analytics in real-time to discretize continuous features, applying data clustering and association rule mining techniques to manage a sliding window size dynamically and to prioritize required user tasks. The developed algorithm minimizes the number of daily action items required by patients with diabetes using association rules that satisfy a minimum support, confidence and conditional probability thresholds. Each of these tasks maximizes information gain, thereby improving the overall level of patient adherence and satisfaction. Experimental results from applying EM-based clustering and Apriori algorithms show that the developed algorithm can predict further events with higher confidence levels and reduce the number of user tasks by up to 76.19 %. PMID:27617297

  3. Development and evaluation of a gyroscope-based wheel rotation monitor for manual wheelchair users.

    PubMed

    Hiremath, Shivayogi V; Ding, Dan; Cooper, Rory A

    2013-07-01

    To develop and evaluate a wireless gyroscope-based wheel rotation monitor (G-WRM) that can estimate speeds and distances traveled by wheelchair users during regular wheelchair propulsion as well as wheelchair sports such as handcycling, and provide users with real-time feedback through a smartphone application. The speeds and the distances estimated by the G-WRM were compared with the criterion measures by calculating absolute difference, mean difference, and percentage errors during a series of laboratory-based tests. Intraclass correlations (ICC) and the Bland-Altman plots were also used to assess the agreements between the G-WRM and the criterion measures. In addition, battery life and wireless data transmission tests under a number of usage conditions were performed. The percentage errors for the angular velocities, speeds, and distances obtained from three prototype G-WRMs were less than 3% for all the test trials. The high ICC values (ICC (3,1) > 0.94) and the Bland-Altman plots indicate excellent agreement between the estimated speeds and distances by the G-WRMs and the criterion measures. The battery life tests showed that the device could last for 35 hours in wireless mode and 139 hours in secure digital card mode. The wireless data transmission tests indicated less than 0.3% of data loss. The results indicate that the G-WRM is an appropriate tool for tracking a spectrum of wheelchair-related activities from regular wheelchair propulsion to wheelchair sports such as handcycling. The real-time feedback provided by the G-WRM can help wheelchair users self-monitor their everyday activities.

  4. Wireless infrared computer control

    NASA Astrophysics Data System (ADS)

    Chen, George C.; He, Xiaofei

    2004-04-01

    Wireless mouse is not restricted by cable"s length and has advantage over its wired counterpart. However, all the mice available in the market have detection range less than 2 meters and angular coverage less than 180 degrees. Furthermore, commercial infrared mice are based on track ball and rollers to detect movements. This restricts them to be used in those occasions where users want to have dynamic movement, such as presentations and meetings etc. This paper presents our newly developed infrared wireless mouse, which has a detection range of 6 meters and angular coverage of 180 degrees. This new mouse uses buttons instead of traditional track ball and is developed to be a hand-held device like remote controller. It enables users to control cursor with a distance closed to computer and the mouse to be free from computer operation.

  5. Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices

    PubMed Central

    Mehta, Rajvi; Nankivil, Derek; Zielinski, David J.; Waterman, Gar; Keller, Brenton; Limkakeng, Alexander T.; Kopper, Regis; Izatt, Joseph A.; Kuo, Anthony N.

    2017-01-01

    Purpose Optical coherence tomography (OCT) is widely used in ophthalmology clinics and has potential for more general medical settings and remote diagnostics. In anticipation of remote applications, we developed wireless interactive control of an OCT system using mobile devices. Methods A web-based user interface (WebUI) was developed to interact with a handheld OCT system. The WebUI consisted of key OCT displays and controls ported to a webpage using HTML and JavaScript. Client–server relationships were created between the WebUI and the OCT system computer. The WebUI was accessed on a cellular phone mounted to the handheld OCT probe to wirelessly control the OCT system. Twenty subjects were imaged using the WebUI to assess the system. System latency was measured using different connection types (wireless 802.11n only, wireless to remote virtual private network [VPN], and cellular). Results Using a cellular phone, the WebUI was successfully used to capture posterior eye OCT images in all subjects. Simultaneous interactivity by a remote user on a laptop was also demonstrated. On average, use of the WebUI added only 58, 95, and 170 ms to the system latency using wireless only, wireless to VPN, and cellular connections, respectively. Qualitatively, operator usage was not affected. Conclusions Using a WebUI, we demonstrated wireless and remote control of an OCT system with mobile devices. Translational Relevance The web and open source software tools used in this project make it possible for any mobile device to potentially control an OCT system through a WebUI. This platform can be a basis for remote, teleophthalmology applications using OCT. PMID:28138415

  6. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  7. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  8. SHER: a colored petri net based random mobility model for wireless communications.

    PubMed

    Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal

    2015-01-01

    In wireless network research, simulation is the most imperative technique to investigate the network's behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the errors of our proposed model.

  9. SHER: A Colored Petri Net Based Random Mobility Model for Wireless Communications

    PubMed Central

    Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal

    2015-01-01

    In wireless network research, simulation is the most imperative technique to investigate the network’s behavior and validation. Wireless networks typically consist of mobile hosts; therefore, the degree of validation is influenced by the underlying mobility model, and synthetic models are implemented in simulators because real life traces are not widely available. In wireless communications, mobility is an integral part while the key role of a mobility model is to mimic the real life traveling patterns to study. The performance of routing protocols and mobility management strategies e.g. paging, registration and handoff is highly dependent to the selected mobility model. In this paper, we devise and evaluate the Show Home and Exclusive Regions (SHER), a novel two-dimensional (2-D) Colored Petri net (CPN) based formal random mobility model, which exhibits sociological behavior of a user. The model captures hotspots where a user frequently visits and spends time. Our solution eliminates six key issues of the random mobility models, i.e., sudden stops, memoryless movements, border effect, temporal dependency of velocity, pause time dependency, and speed decay in a single model. The proposed model is able to predict the future location of a mobile user and ultimately improves the performance of wireless communication networks. The model follows a uniform nodal distribution and is a mini simulator, which exhibits interesting mobility patterns. The model is also helpful to those who are not familiar with the formal modeling, and users can extract meaningful information with a single mouse-click. It is noteworthy that capturing dynamic mobility patterns through CPN is the most challenging and virulent activity of the presented research. Statistical and reachability analysis techniques are presented to elucidate and validate the performance of our proposed mobility model. The state space methods allow us to algorithmically derive the system behavior and rectify the errors of our proposed model. PMID:26267860

  10. Cooperation and information replication in wireless networks.

    PubMed

    Poularakis, Konstantinos; Tassiulas, Leandros

    2016-03-06

    A significant portion of today's network traffic is due to recurring downloads of a few popular contents. It has been observed that replicating the latter in caches installed at network edges-close to users-can drastically reduce network bandwidth usage and improve content access delay. Such caching architectures are gaining increasing interest in recent years as a way of dealing with the explosive traffic growth, fuelled further by the downward slope in storage space price. In this work, we provide an overview of caching with a particular emphasis on emerging network architectures that enable caching at the radio access network. In this context, novel challenges arise due to the broadcast nature of the wireless medium, which allows simultaneously serving multiple users tuned into a multicast stream, and the mobility of the users who may be frequently handed off from one cell tower to another. Existing results indicate that caching at the wireless edge has a great potential in removing bottlenecks on the wired backbone networks. Taking into consideration the schedule of multicast service and mobility profiles is crucial to extract maximum benefit in network performance. © 2016 The Author(s).

  11. [Design of Smart Care Tele-Monitoring System for Mother and Fetus].

    PubMed

    Xi, Haiyan; Gan, Guanghui; Zhang, Huilian; Chen, Chaomin

    2015-03-01

    To study and design a maternal and fetal monitoring system based on the cloud computing and internet of things, which can monitor and take smart care of the mother and fetus in 24 h. Using a new kind of wireless fetal monitoring detector and a mobile phone, thus the doctor can keep touch with hospital through internet. The mobile terminal was developed on the Android system, which accepted the data of fetal heart rate and uterine contraction transmitted from the wireless detector, exchange information with the server and display the monitoring data and the doctor's advice in real-time. The mobile phone displayed the fetal heart rate line and uterine contraction line in real-time, recorded the fetus' grow process. It implemented the real-time communication between the doctor and the user, through wireless communication technology. The system removes the constraint of traditional telephone cable for users, while the users can get remote monitoring from the medical institutions at home or in the nearest community at any time, providing health and safety guarantee for mother and fetus.

  12. An Abstract Model of Rogue Code Insertion into Radio Frequency Wireless Networks. The Effects of Computer Viruses on the Program Management Office

    DTIC Science & Technology

    1994-04-01

    numerous articles on wireless LANs, only one by Lathrop discusses their vulnerabilities’. Lathrop’s paper provides an overview of wireless LANs and...to detect any action which deviates from the user’s observed recorded past behavior. These profiles list the operator’s commonly used commands, typing...current system activity audit records to rules describing past behavior patterns. W&S is especially effective in detecting rogue program penetrations. It

  13. Common MD-IS infrastructure for wireless data technologies

    NASA Astrophysics Data System (ADS)

    White, Malcolm E.

    1995-12-01

    The expansion of global networks, caused by growth and acquisition within the commercial sector, is forcing users to move away from proprietary systems in favor of standards-based, open systems architectures. The same is true in the wireless data communications arena, where operators of proprietary wireless data networks have endeavored to convince users that their particular implementation provides the best service. However, most of the vendors touting these solutions have failed to gain the critical mass that might have lead to their technologies' adoption as a defacto standard, and have been held back by a lack of applications and the high cost of mobile devices. The advent of the cellular digital packet data (CDPD) specification and its support by much of the public cellular service industry has set the stage for the ubiquitous coverage of wireless packet data services across the Unites States. Although CDPD was developed for operation over the advanced mobile phone system (AMPS) cellular network, many of the defined protocols are industry standards that can be applied to the construction of a common infrastructure supporting multiple airlink standards. This approach offers overall cost savings and operation efficiency for service providers, hardware, and software developers and end-users alike, and could be equally advantageous for those service operators using proprietary end system protocols, should they wish to migrate towards an open standard.

  14. Mobile Internet Revenues: An Empirical Study of the I-Mode Portal.

    ERIC Educational Resources Information Center

    Jonason, Andreas; Eliasson, Gunnar

    2001-01-01

    Discusses new electronic commerce applications enabled by mobility and personalization over mobile devices; considers the convergence of the wireless, the fixed Internet, and the media industries; describes innovative pricing models; and reports results from a survey of users of I-mode, a wireless Internet service offering Web browsing and email…

  15. The Cybermobile: A Gateway for Public Access to Network-Based Information.

    ERIC Educational Resources Information Center

    Drumm, John E.; Groom, Frank M.

    1997-01-01

    Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…

  16. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    PubMed Central

    Wang, Qiuhua

    2017-01-01

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423

  17. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    PubMed

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  18. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  19. Graphical user interface for wireless sensor networks simulator

    NASA Astrophysics Data System (ADS)

    Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy

    2008-01-01

    Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.

  20. Automatic identification of solid-phase medication intake using wireless wearable accelerometers.

    PubMed

    Rui Wang; Sitova, Zdenka; Xiaoqing Jia; Xiang He; Abramson, Tobi; Gasti, Paolo; Balagani, Kiran S; Farajidavar, Aydin

    2014-01-01

    We have proposed a novel solution to a fundamental problem encountered in implementing non-ingestion based medical adherence monitoring systems, namely, how to reliably identify pill medication intake. We show how wireless wearable devices with tri-axial accelerometer can be used to detect and classify hand gestures of users during solid-phase medication intake. Two devices were worn on the wrists of each user. Users were asked to perform two activities in the way that is natural and most comfortable to them: (1) taking empty gelatin capsules with water, and (2) drinking water and wiping mouth. 25 users participated in this study. The signals obtained from the devices were filtered and the patterns were identified using dynamic time warping algorithm. Using hand gesture signals, we achieved 84.17 percent true positive rate and 13.33 percent false alarm rate, thus demonstrating that the hand gestures could be used to effectively identify pill taking activity.

  1. Body surface mounted biomedical monitoring system using Bluetooth.

    PubMed

    Nambu, Masayuki

    2007-01-01

    Continuous monitoring in daily life is important for the health condition control of the elderly. However, portable or wearable devices need to carry by user on their own will. On the other hand, implantation sensors are not adoptable, because of generic users dislike to insert the any object in the body for monitoring. Therefore, another monitoring system of the health condition to carry it easily is necessary. In addition, ID system is necessary even if the subject live with few families. Furthermore, every measurement system should be wireless system, because not to obstruct the daily life of the user. In this paper, we propose the monitoring system, which is mounted on the body surface. This system will not obstruct the action or behavior of user in daily life, because this system attached the body surface on the back of the user. In addition, this system has wireless communication system, using Bluetooth, and acquired data transfer to the outside of the house via the Internet.

  2. Blind information-theoretic multiuser detection algorithms for DS-CDMA and WCDMA downlink systems.

    PubMed

    Waheed, Khuram; Salem, Fathi M

    2005-07-01

    Code division multiple access (CDMA) is based on the spread-spectrum technology and is a dominant air interface for 2.5G, 3G, and future wireless networks. For the CDMA downlink, the transmitted CDMA signals from the base station (BS) propagate through a noisy multipath fading communication channel before arriving at the receiver of the user equipment/mobile station (UE/MS). Classical CDMA single-user detection (SUD) algorithms implemented in the UE/MS receiver do not provide the required performance for modern high data-rate applications. In contrast, multi-user detection (MUD) approaches require a lot of a priori information not available to the UE/MS. In this paper, three promising adaptive Riemannian contra-variant (or natural) gradient based user detection approaches, capable of handling the highly dynamic wireless environments, are proposed. The first approach, blind multiuser detection (BMUD), is the process of simultaneously estimating multiple symbol sequences associated with all the users in the downlink of a CDMA communication system using only the received wireless data and without any knowledge of the user spreading codes. This approach is applicable to CDMA systems with relatively short spreading codes but becomes impractical for systems using long spreading codes. We also propose two other adaptive approaches, namely, RAKE -blind source recovery (RAKE-BSR) and RAKE-principal component analysis (RAKE-PCA) that fuse an adaptive stage into a standard RAKE receiver. This adaptation results in robust user detection algorithms with performance exceeding the linear minimum mean squared error (LMMSE) detectors for both Direct Sequence CDMA (DS-CDMA) and wide-band CDMA (WCDMA) systems under conditions of congestion, imprecise channel estimation and unmodeled multiple access interference (MAI).

  3. Wireless augmented reality communication system

    NASA Technical Reports Server (NTRS)

    Devereaux, Ann (Inventor); Agan, Martin (Inventor); Jedrey, Thomas (Inventor)

    2006-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  4. Secure relay selection based on learning with negative externality in wireless networks

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  5. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Jedrey, Thomas (Inventor); Agan, Martin (Inventor); Devereaux, Ann (Inventor)

    2014-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  6. Wireless Augmented Reality Communication System

    NASA Technical Reports Server (NTRS)

    Agan, Martin (Inventor); Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor)

    2016-01-01

    The system of the present invention is a highly integrated radio communication system with a multimedia co-processor which allows true two-way multimedia (video, audio, data) access as well as real-time biomedical monitoring in a pager-sized portable access unit. The system is integrated in a network structure including one or more general purpose nodes for providing a wireless-to-wired interface. The network architecture allows video, audio and data (including biomedical data) streams to be connected directly to external users and devices. The portable access units may also be mated to various non-personal devices such as cameras or environmental sensors for providing a method for setting up wireless sensor nets from which reported data may be accessed through the portable access unit. The reported data may alternatively be automatically logged at a remote computer for access and viewing through a portable access unit, including the user's own.

  7. Full Scale Software Support on Mobile Lightweight Devices by Utilization of All Types of Wireless Technologies

    NASA Astrophysics Data System (ADS)

    Krejcar, Ondrej

    New kind of mobile lightweight devices can run full scale applications with same comfort as on desktop devices only with several limitations. One of them is insufficient transfer speed on wireless connectivity. Main area of interest is in a model of a radio-frequency based system enhancement for locating and tracking users of a mobile information system. The experimental framework prototype uses a wireless network infrastructure to let a mobile lightweight device determine its indoor or outdoor position. User location is used for data prebuffering and pushing information from server to user’s PDA. All server data is saved as artifacts along with its position information in building or larger area environment. The accessing of prebuffered data on mobile lightweight device can highly improve response time needed to view large multimedia data. This fact can help with design of new full scale applications for mobile lightweight devices.

  8. Optimized optical wireless channel for indoor and intra-vehicle communications: power distribution and SNR analysis

    NASA Astrophysics Data System (ADS)

    Shaaban, Rana; Faruque, Saleh

    2018-01-01

    Light emitting diodes - LEDs are modernizing the indoor illumination and replacing current incandescent and fluorescent lamps rapidly. LEDs have multiple advantages such as extremely high energy efficient, longer lifespan, and lower heat generation. Due to the ability to switch to different light intensity at a very fast rate, LED has given rise to a unique communication technology (visible light communication - VLC) used for high speed data transmission. By studying various kinds of commonly used VLC channel analysis: diffuse and line of sight channels, we presented a simply improved indoor and intra-vehicle visible light communication transmission model. Employing optical wireless communications within the vehicle, not only enhance user mobility, but also alleviate radio frequency interference, and increase efficiency by lowering the complexity of copper cabling. Moreover, a solution to eliminate ambient noise caused by environmental conditions is examined by using optical differential receiver. The simulation results show the improved received power distribution and signal to noise ratio - SNR.

  9. Samba: a real-time motion capture system using wireless camera sensor networks.

    PubMed

    Oh, Hyeongseok; Cha, Geonho; Oh, Songhwai

    2014-03-20

    There is a growing interest in 3D content following the recent developments in 3D movies, 3D TVs and 3D smartphones. However, 3D content creation is still dominated by professionals, due to the high cost of 3D motion capture instruments. The availability of a low-cost motion capture system will promote 3D content generation by general users and accelerate the growth of the 3D market. In this paper, we describe the design and implementation of a real-time motion capture system based on a portable low-cost wireless camera sensor network. The proposed system performs motion capture based on the data-driven 3D human pose reconstruction method to reduce the computation time and to improve the 3D reconstruction accuracy. The system can reconstruct accurate 3D full-body poses at 16 frames per second using only eight markers on the subject's body. The performance of the motion capture system is evaluated extensively in experiments.

  10. Samba: A Real-Time Motion Capture System Using Wireless Camera Sensor Networks

    PubMed Central

    Oh, Hyeongseok; Cha, Geonho; Oh, Songhwai

    2014-01-01

    There is a growing interest in 3D content following the recent developments in 3D movies, 3D TVs and 3D smartphones. However, 3D content creation is still dominated by professionals, due to the high cost of 3D motion capture instruments. The availability of a low-cost motion capture system will promote 3D content generation by general users and accelerate the growth of the 3D market. In this paper, we describe the design and implementation of a real-time motion capture system based on a portable low-cost wireless camera sensor network. The proposed system performs motion capture based on the data-driven 3D human pose reconstruction method to reduce the computation time and to improve the 3D reconstruction accuracy. The system can reconstruct accurate 3D full-body poses at 16 frames per second using only eight markers on the subject's body. The performance of the motion capture system is evaluated extensively in experiments. PMID:24658618

  11. Energy-Efficient Optimal Power Allocation in Integrated Wireless Sensor and Cognitive Satellite Terrestrial Networks

    PubMed Central

    Li, Guangxia; An, Kang; Gao, Bin; Zheng, Gan

    2017-01-01

    This paper proposes novel satellite-based wireless sensor networks (WSNs), which integrate the WSN with the cognitive satellite terrestrial network. Having the ability to provide seamless network access and alleviate the spectrum scarcity, cognitive satellite terrestrial networks are considered as a promising candidate for future wireless networks with emerging requirements of ubiquitous broadband applications and increasing demand for spectral resources. With the emerging environmental and energy cost concerns in communication systems, explicit concerns on energy efficient resource allocation in satellite networks have also recently received considerable attention. In this regard, this paper proposes energy-efficient optimal power allocation schemes in the cognitive satellite terrestrial networks for non-real-time and real-time applications, respectively, which maximize the energy efficiency (EE) of the cognitive satellite user while guaranteeing the interference at the primary terrestrial user below an acceptable level. Specifically, average interference power (AIP) constraint is employed to protect the communication quality of the primary terrestrial user while average transmit power (ATP) or peak transmit power (PTP) constraint is adopted to regulate the transmit power of the satellite user. Since the energy-efficient power allocation optimization problem belongs to the nonlinear concave fractional programming problem, we solve it by combining Dinkelbach’s method with Lagrange duality method. Simulation results demonstrate that the fading severity of the terrestrial interference link is favorable to the satellite user who can achieve EE gain under the ATP constraint comparing to the PTP constraint. PMID:28869546

  12. Intuitive wireless control of a robotic arm for people living with an upper body disability.

    PubMed

    Fall, C L; Turgeon, P; Campeau-Lecours, A; Maheu, V; Boukadoum, M; Roy, S; Massicotte, D; Gosselin, C; Gosselin, B

    2015-08-01

    Assistive Technologies (ATs) also called extrinsic enablers are useful tools for people living with various disabilities. The key points when designing such useful devices not only concern their intended goal, but also the most suitable human-machine interface (HMI) that should be provided to users. This paper describes the design of a highly intuitive wireless controller for people living with upper body disabilities with a residual or complete control of their neck and their shoulders. Tested with JACO, a six-degree-of-freedom (6-DOF) assistive robotic arm with 3 flexible fingers on its end-effector, the system described in this article is made of low-cost commercial off-the-shelf components and allows a full emulation of JACO's standard controller, a 3 axis joystick with 7 user buttons. To do so, three nine-degree-of-freedom (9-DOF) inertial measurement units (IMUs) are connected to a microcontroller and help measuring the user's head and shoulders position, using a complementary filter approach. The results are then transmitted to a base-station via a 2.4-GHz low-power wireless transceiver and interpreted by the control algorithm running on a PC host. A dedicated software interface allows the user to quickly calibrate the controller, and translates the information into suitable commands for JACO. The proposed controller is thoroughly described, from the electronic design to implemented algorithms and user interfaces. Its performance and future improvements are discussed as well.

  13. Wireless Internet Gateways (WINGS)

    DTIC Science & Technology

    1997-01-01

    WIRELESS INTERNET GATEWAYS (WINGS) J.J. Garcia-Luna-Aceves, Chane L. Fullmer, Ewerton Madruga Computer Engineering Department University of...rooftop.com Abstract— Today’s internetwork technology has been extremely success- ful in linking huge numbers of computers and users. However, to date...this technology has been oriented to computer interconnection in relatively stable operational environments, and thus cannot adequately support many of

  14. Teaching the Fundamentals of Cell Phones and Wireless Communications

    ERIC Educational Resources Information Center

    Davids, Mark; Forrest, Rick; Pata, Don

    2010-01-01

    Wireless communications are ubiquitous. Students and teachers use iPhones[R], BlackBerrys[R], and other smart phones at home and at work. More than 275 million Americans had cell phones in June of 2009 and expanded access to broadband is predicted this year. Despite the plethora of users, most students and teachers do not understand "how they…

  15. Four Commandments for Writing Policies for Public-Access Wireless Networks

    ERIC Educational Resources Information Center

    Sauers, Michael

    2006-01-01

    In this article, the author describes what components should be included in a comprehensive policy for public wireless usage in a library. He lists four basic steps, which include: (1) Introduce the service; (2) List the technical requirements; (3) Spell out disclaimers on access, assistance, and liability; and (4) Alert users to security concerns.

  16. Support of Wheelchairs Using Pheromone Information with Two Types of Communication Methods

    NASA Astrophysics Data System (ADS)

    Yamamoto, Koji; Nitta, Katsumi

    In this paper, we propose a communication framework which combined two types of communication among wheelchairs and mobile devices. Due to restriction of range of activity, there is a problem that wheelchair users tend to shut themselves up in their houses. We developed a navigational wheelchair which loads a system that displays information on a map through WWW. However, this wheelchair is expensive because it needs a solid PC, a precise GPS, a battery, and so on. We introduce mobile devices and use this framework to provide information to wheelchair users and to facilitate them to go out. When a user encounters other users, they exchange messages which they have by short-distance wireless communication. Once a message is delivered to a navigational wheelchair, the wheelchair uploads the message to the system. We use two types of pheromone information which represent trends of user's movement and existences of a crowd of users. First, when users gather, ``crowd of people pheromone'' is emitted virtually. Users do not send these pheromones to the environment but carry them. If the density exceeds the threshold, messages that express ``people gethered'' are generated automatically. The other pheromone is ``movement trend pheromone'', which is used to improve probability of successful transmissions. From results of experiments, we concluded that our method can deliver information that wheelchair users gathered to other wheelchairs.

  17. Wireless sensor network

    NASA Astrophysics Data System (ADS)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  18. Diffusion of innovations: smartphones and wireless anatomy learning resources.

    PubMed

    Trelease, Robert B

    2008-01-01

    The author has previously reported on principles of diffusion of innovations, the processes by which new technologies become popularly adopted, specifically in relation to anatomy and education. In presentations on adopting handheld computers [personal digital assistants (PDAs)] and personal media players for health sciences education, particular attention has been directed to the anticipated integration of PDA functions into popular cellular telephones. However, limited distribution of early "smartphones" (e.g., Palm Treo and Blackberry) has provided few potential users for anatomical learning resources. In contrast, iPod media players have been self-adopted by millions of students, and "podcasting" has become a popular medium for distributing educational media content. The recently introduced Apple iPhone has combined smartphone and higher resolution media player capabilities. The author successfully tested the iPhone and the "work alike" iPod touch wireless media player with text-based "flashcard" resources, existing PDF educational documents, 3D clinical imaging data, lecture "podcasts," and clinical procedure video. These touch-interfaced, mobile computing devices represent just the first of a new generation providing practical, scalable wireless Web access with enhanced multimedia capabilities. With widespread student self-adoption of such new personal technology, educators can look forward to increasing portability of well-designed, multiplatform "learn anywhere" resources. Copyright 2008 American Association of Anatomists

  19. Progress on the Development of Future Airport Surface Wireless Communications Network

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Budinger, James M.; Brooks, David E.; Franklin, Morgan; DeHart, Steve; Dimond, Robert P.; Borden, Michael

    2009-01-01

    Continuing advances in airport surface management and improvements in airport surface safety are required to enable future growth in air traffic throughout the airspace, as airport arrival and departure delays create a major system bottleneck. These airport management and safety advances will be built upon improved communications, navigation, surveillance, and weather sensing, creating an information environment supporting system automation. The efficient movement of the digital data generated from these systems requires an underlying communications network infrastructure to connect data sources with the intended users with the required quality of service. Current airport surface communications consists primarily of buried copper or fiber cable. Safety related communications with mobile airport surface assets occurs over 25 kHz VHF voice and data channels. The available VHF spectrum, already congested in many areas, will be insufficient to support future data traffic requirements. Therefore, a broadband wireless airport surface communications network is considered a requirement for the future airport component of the air transportation system. Progress has been made on defining the technology and frequency spectrum for the airport surface wireless communications network. The development of a test and demonstration facility and the definition of required testing and standards development are now underway. This paper will review the progress and planned future work.

  20. Connecting the snowpack to the internet of things: an IPv6 architecture for providing real-time measurements of hydrologic systems

    NASA Astrophysics Data System (ADS)

    Kerkez, B.; Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.

    2012-12-01

    We describe our improved, robust, and scalable architecture by which to rapidly instrument large-scale watersheds, while providing the resulting data in real-time. Our system consists of more than twenty wireless sensor networks and thousands of sensors, which will be deployed in the American River basin (5000 sq. km) of California. The core component of our system is known as a mote, a tiny, ultra-low-power, embedded wireless computer that can be used for any number of sensing applications. Our new generation of motes is equipped with IPv6 functionality, effectively giving each sensor in the field its own unique IP address, thus permitting users to remotely interact with the devices without going through intermediary services. Thirty to fifty motes will be deployed across 1-2 square kilometer regions to form a mesh-based wireless sensor network. Redundancy of local wireless links will ensure that data will always be able to traverse the network, even if hash wintertime conditions adversely affect some network nodes. These networks will be used to develop spatial estimates of a number of hydrologic parameters, focusing especially on snowpack. Each wireless sensor network has one main network controller, which is responsible with interacting with an embedded Linux computer to relay information across higher-powered, long-range wireless links (cell modems, satellite, WiFi) to neighboring networks and remote, offsite servers. The network manager is also responsible for providing an Internet connection to each mote. Data collected by the sensors can either be read directly by remote hosts, or stored on centralized servers for future access. With 20 such networks deployed in the American River, our system will comprise an unprecedented cyber-physical architecture for measuring hydrologic parameters in large-scale basins. The spatiotemporal density and real-time nature of the data is also expected to significantly improve operational hydrology and water resource management in the basin.

  1. 40 Gb/s W-band (75-110 GHz) 16-QAM radio-over-fiber signal generation and its wireless transmission.

    PubMed

    Kanno, Atsushi; Inagaki, Keizo; Morohashi, Isao; Sakamoto, Takahide; Kuri, Toshiaki; Hosako, Iwao; Kawanishi, Tetsuya; Yoshida, Yuki; Kitayama, Ken-ichi

    2011-12-12

    The generation of a 40-Gb/s 16-QAM radio-over-fiber (RoF) signal and its demodulation of the wireless signal transmitted over free space of 30 mm in W-band (75-110 GHz) is demonstrated. The 16-QAM signal is generated by a coherent polarization synthesis method using a dual-polarization QPSK modulator. A combination of the simple RoF generation and the versatile digital receiver technique is suitable for the proposed coherent optical/wireless seamless network. © 2011 Optical Society of America

  2. Analog design of wireless control for home equipment

    NASA Astrophysics Data System (ADS)

    Zheng, Shiyong; Li, Zhao; Li, Biqing; Jiang, Suping

    2018-04-01

    This design consists of a STC89C52 microcontroller, a serial Bluetooth module and the Android system. Production of STC89C52 controlled by single-chip computer telephone systems. The system is composed of mobile phone Android system as a master in the family centre,via serial Bluetooth module pass instructions and information to implement wireless transceiver using STC89C52 MCU wireless Bluetooth transmission to control homedevices. System high reliability, low cost easy to use, stong applicability and other characerristics, can be used in single-user family, has great significance.

  3. The Application of Wireless Sensor Networks in Management of Orchard

    NASA Astrophysics Data System (ADS)

    Zhu, Guizhi

    A monitoring system based on wireless sensor network is established, aiming at the difficulty of information acquisition in the orchard on the hill at present. The temperature and humidity sensors are deployed around fruit trees to gather the real-time environmental parameters, and the wireless communication modules with self-organized form, which transmit the data to a remote central server, can realize the function of monitoring. By setting the parameters of data intelligent analysis judgment, the information on remote diagnosis and decision support can be timely and effectively feed back to users.

  4. Bluetooth: The invisible connector. Short-range wireless technology for the contemporary orthodontic practice.

    PubMed

    Mupparapu, Muralidhar

    2007-06-01

    Although it sounds like a nonvital tooth, Bluetooth is actually one of technology's hottest trends. It is an industrial specification for wireless personal area networks, but for a busy orthodontic practice, it translates to freedom from cables and cords. Despite its enigmatic name, Bluetooth-based devices and the wireless technology that these gadgets work with are here to stay. They promise to make life easier for the electronic-device users of all stripes, and orthodontists are no exception. The purpose of this article is to orient orthodontists, office staff, and auxiliary personnel to this universal wireless technology that is slowly becoming an integral part of every office.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Madhu Sudhan; Onar, Omer C; Campbell, Steven L

    Integrated charger topologies that have been researched so far are with the dc-dc converters and the charging functionality usually have no isolation in the system. Isolation is an important feature that is required for user interface systems that have grid connections and therefore is a major limitation that needs to be addressed along with the integrated functionality. This study features a unique way of combining the wired and wireless charging functionalities with vehicle side boost converter integration and maintaining the isolation to provide the best solution to the plug-in electric vehicle (PEV) users. The new performance of the proposed architecturemore » is presented for wired and wireless charging options at different power levels.« less

  6. A Reinforcement Sensor Embedded Vertical Handoff Controller for Vehicular Heterogeneous Wireless Networks

    PubMed Central

    Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin

    2013-01-01

    Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience. PMID:24193101

  7. Practical Issues of Wireless Mobile Devices Usage with Downlink Optimization

    NASA Astrophysics Data System (ADS)

    Krejcar, Ondrej; Janckulik, Dalibor; Motalova, Leona

    Mobile device makers produce tens of new complex mobile devices per year to put users a special mobile device with a possibility to do anything, anywhere, anytime. These devices can operate full scale applications with nearly the same comfort as their desktop equivalents only with several limitations. One of such limitation is insufficient download on wireless connectivity in case of the large multimedia files. Main area of paper is in a possibilities description of solving this problem as well as the test of several new mobile devices along with server interface tests and common software descriptions. New devices have a full scale of wireless connectivity which can be used not only to communication with outer land. Several such possibilities of use are described. Mobile users will have also an online connection to internet all time powered on. Internet is mainly the web pages but the web services use is still accelerate up. The paper deal also with a possibility of maximum user amounts to have a connection at same time to current server type. At last the new kind of database access - Linq technology is compare to ADO.NET in response time meaning.

  8. Mobile collaborative medical display system.

    PubMed

    Park, Sanghun; Kim, Wontae; Ihm, Insung

    2008-03-01

    Because of recent advances in wireless communication technologies, the world of mobile computing is flourishing with a variety of applications. In this study, we present an integrated architecture for a personal digital assistant (PDA)-based mobile medical display system that supports collaborative work between remote users. We aim to develop a system that enables users in different regions to share a working environment for collaborative visualization with the potential for exploring huge medical datasets. Our system consists of three major components: mobile client, gateway, and parallel rendering server. The mobile client serves as a front end and enables users to choose the visualization and control parameters interactively and cooperatively. The gateway handles requests and responses between mobile clients and the rendering server for efficient communication. Through the gateway, it is possible to share working environments between users, allowing them to work together in computer supported cooperative work (CSCW) mode. Finally, the parallel rendering server is responsible for performing heavy visualization tasks. Our experience indicates that some features currently available to our mobile clients for collaborative scientific visualization are limited due to the poor performance of mobile devices and the low bandwidth of wireless connections. However, as mobile devices and wireless network systems are experiencing considerable elevation in their capabilities, we believe that our methodology will be utilized effectively in building quite responsive, useful mobile collaborative medical systems in the very near future.

  9. Cooperative Interference Alignment for the Multiple Access Channel

    DTIC Science & Technology

    2015-11-01

    Communications. I. INTRODUCTION Conventional wireless networks were previously thought to be interference-limited, where interference is mainly caused by...interference-free capacity for any number of users K at high SNR. This fundamental result showed that wireless networks are not interference-limited as...decoding of the K users’ messages. This is applicable in uplink transmissions in cellular communications, where mobiles transmit independent messages

  10. Exploitation of Multi-beam Directional Antennas for a Wireless TDMA/FDD MAC

    NASA Astrophysics Data System (ADS)

    Atmaca, Sedat; Ceken, Celal; Erturk, Ismail

    2008-05-01

    The effects of the multi-beam directional antennas on the performance of a new wireless TDMA/FDD MAC system are presented. Directional antennas intrinsically enable development of the SDMA systems and allow transmitting and receiving signals simultaneously at the same time slot. Employing a dynamic slot allocation table at a base station with 4 or 8 sector directional antennas and holding the wireless terminals' location information, a new SDMA/TDMA/FDD frame structure has been developed for wireless communications. The simulation studies realized using OPNET Modeler show that the proposed SDMA/TDMA/FDD system has substantially increased the traditional TDMA/FDD system capacity and provides 1.37 to 4 times better mean delay results when the number of users is increased from 4 to 32 under the same load in the wireless network models.

  11. A comparative study of wireless sensor networks and their routing protocols.

    PubMed

    Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  12. Evaluation of a wireless audio streaming accessory to improve mobile telephone performance of cochlear implant users.

    PubMed

    Wolfe, Jace; Morais Duke, Mila; Schafer, Erin; Cire, George; Menapace, Christine; O'Neill, Lori

    2016-01-01

    The objective of this study was to evaluate the potential improvement in word recognition in quiet and in noise obtained with use of a Bluetooth-compatible wireless hearing assistance technology (HAT) relative to the acoustic mobile telephone condition (e.g. the mobile telephone receiver held to the microphone of the sound processor). A two-way repeated measures design was used to evaluate differences in telephone word recognition obtained in quiet and in competing noise in the acoustic mobile telephone condition compared to performance obtained with use of the CI sound processor and a telephone HAT. Sixteen adult users of Nucleus cochlear implants and the Nucleus 6 sound processor were included in this study. Word recognition over the mobile telephone in quiet and in noise was significantly better with use of the wireless HAT compared to performance in the acoustic mobile telephone condition. Word recognition over the mobile telephone was better in quiet when compared to performance in noise. The results of this study indicate that use of a wireless HAT improves word recognition over the mobile telephone in quiet and in noise relative to performance in the acoustic mobile telephone condition for a group of adult cochlear implant recipients.

  13. Wireless Phone Use and Risk of Adult Glioma: Evidence from a Meta-Analysis.

    PubMed

    Wang, Peng; Hou, Chongxian; Li, Yanwen; Zhou, Dong

    2018-04-28

    Wireless phone use has been increasing rapidly and is associated with the risk of glioma. Many studies have been conducted on this association without reaching agreement. The aim of this meta-analysis was to determine the possible association between wireless phone use and risk of adult glioma. Eligible studies were identified by searching PubMed and Embase up to July 2017. Random-effects or fixed-effects model was used to combine the results depending on the heterogeneity of the analysis. Publication bias was evaluated using Begg's funnel plot and Egger's regression asymmetry test. Subgroup analysis was performed to evaluate possible influence of these variables. Ten studies on the association of wireless phone use and risk of glioma were included. The combined odds ratio of adult gliomas associated with ever use of wireless phones was 1.03 (95% confidence interval [CI], 0.92-1.16) with high heterogeneity (I 2  = 54.2%, P = 0.013). In subgroup analyses, no significant association was found between tumor location in the temporal lobe and adult glioma risk, with odds ratios of 1.26 (95% CI, 0.87-1.84), 0.93 (95% CI, 0.69-1.24), and 1.61 (95% CI, 0.78-3.33). A significant association with risk of glioma was found in long-term users (≥10 years) with odds ratio of 1.33 (95% CI, 1.05-1.67). Ever use of wireless phones was not significantly associated with risk of adult glioma, but there could be increased risk in long-term users. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Impact of different cloud deployments on real-time video applications for mobile video cloud users

    NASA Astrophysics Data System (ADS)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2015-02-01

    The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical results are presented and discussed to quantify and explain the different impacts resulted from various cloud deployments, video application and wireless/mobile network setting, and user mobility. Additionally, this paper analyses the advantages, disadvantages, limitations and optimization techniques in various cloud networking deployments, in particular the cloudlet approach compared with the Internet cloud approach, with recommendations of optimized deployments highlighted. Finally, federated clouds and inter-cloud collaboration challenges and opportunities are discussed in the context of supporting real-time video applications for mobile users.

  15. Terahertz wireless communication based on InP-related devices (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Lee, Eui Su; Kim, Hyun-Soo; Park, Jeong-Woo; Park, Dong Woo; Park, Kyung Hyun

    2017-02-01

    Recently, a wide interest has been gathered in using terahertz (THz) waves as the carrier waves for the next generation of broadband wireless communications. Upon this objective, the photonics technologies are very attractive for their usefulness in signal generations, modulations and detections with enhanced bandwidth and data rates, and the readiness in combining to the existing fiber-optic or wireless networks. In this paper, as a preliminary step toward the THz wireless communications, a THz wireless interconnection system with a broadband antenna-integrated uni-traveling-carrier photodiode (UTC-PD) and a Shottky-barrier diode (SBD) module will be presented. In our system, optical beating signals are generated and digitally modulated by the optical intensity modulator driven by a pulse pattern generator (PPG). As the receiver a SBD and an IF filter followed by a low-noise preamplifier and a limiting amplifier was used. With a 6-mA photocurrent of the UTC-PD which corresponds to the transmitter output power of about 30 μW at 280 GHz, an error-free (BER<10-9) transmission has been achieved at 2.5 Gbit/s which is limited by a limiting amplifier. With this system, a 1.485-Gbit/s video signal with a high-definition serial digital interface format was successfully transmitted over a wireless link.

  16. Radio Resource Allocation on Complex 4G Wireless Cellular Networks

    NASA Astrophysics Data System (ADS)

    Psannis, Kostas E.

    2015-09-01

    In this article we consider the heuristic algorithm which improves step by step wireless data delivery over LTE cellular networks by using the total transmit power with the constraint on users’ data rates, and the total throughput with the constraints on the total transmit power as well as users’ data rates, which are jointly integrated into a hybrid-layer design framework to perform radio resource allocation for multiple users, and to effectively decide the optimal system parameter such as modulation and coding scheme (MCS) in order to adapt to the varying channel quality. We propose new heuristic algorithm which balances the accessible data rate, the initial data rates of each user allocated by LTE scheduler, the priority indicator which signals delay- throughput- packet loss awareness of the user, and the buffer fullness by achieving maximization of radio resource allocation for multiple users. It is noted that the overall performance is improved with the increase in the number of users, due to multiuser diversity. Experimental results illustrate and validate the accuracy of the proposed methodology.

  17. DIY-style GIS service in mobile navigation system integrated with web and wireless GIS

    NASA Astrophysics Data System (ADS)

    Yan, Yongbin; Wu, Jianping; Fan, Caiyou; Wang, Minqi; Dai, Sheng

    2007-06-01

    Mobile navigation system based on handheld device can not only provide basic GIS services, but also enable these GIS services to be provided without location limit, to be more instantly interacted between users and devices. However, we still see that most navigation systems have common defects on user experience like limited map format, few map resources, and unable location share. To overcome the above defects, we propose DIY-style GIS service which provide users a more free software environment and allow uses to customize their GIS services. These services include defining geographical coordinate system of maps which helps to hugely enlarge the map source, editing vector feature, related property information and hotlink images, customizing covered area of download map via General Packet Radio Service (GPRS), and sharing users' location information via SMS (Short Message Service) which establishes the communication between users who needs GIS services. The paper introduces the integration of web and wireless GIS service in a mobile navigation system and presents an implementation sample of a DIY-Style GIS service in a mobile navigation system.

  18. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    PubMed

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  19. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    PubMed Central

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-01-01

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764

  20. Entanglement routers via a wireless quantum network based on arbitrary two qubit systems

    NASA Astrophysics Data System (ADS)

    Metwally, N.

    2014-12-01

    A wireless quantum network is generated between multi-hops, where each hop consists of two entangled nodes. These nodes share a finite number of entangled two-qubit systems randomly. Different types of wireless quantum bridges (WQBS) are generated between the non-connected nodes. The efficiency of these WQBS to be used as quantum channels between its terminals to perform quantum teleportation is investigated. We suggest a theoretical wireless quantum communication protocol to teleport unknown quantum signals from one node to another, where the more powerful WQBS are used as quantum channels. It is shown that, by increasing the efficiency of the sources that emit the initial partial entangled states, one can increase the efficiency of the wireless quantum communication protocol.

  1. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  2. Wireless device connection problems and design solutions

    NASA Astrophysics Data System (ADS)

    Song, Ji-Won; Norman, Donald; Nam, Tek-Jin; Qin, Shengfeng

    2016-09-01

    Users, especially the non-expert users, commonly experience problems when connecting multiple devices with interoperability. While studies on multiple device connections are mostly concentrated on spontaneous device association techniques with a focus on security aspects, the research on user interaction for device connection is still limited. More research into understanding people is needed for designers to devise usable techniques. This research applies the Research-through-Design method and studies the non-expert users' interactions in establishing wireless connections between devices. The "Learning from Examples" concept is adopted to develop a study focus line by learning from the expert users' interaction with devices. This focus line is then used for guiding researchers to explore the non-expert users' difficulties at each stage of the focus line. Finally, the Research-through-Design approach is used to understand the users' difficulties, gain insights to design problems and suggest usable solutions. When connecting a device, the user is required to manage not only the device's functionality but also the interaction between devices. Based on learning from failures, an important insight is found that the existing design approach to improve single-device interaction issues, such as improvements to graphical user interfaces or computer guidance, cannot help users to handle problems between multiple devices. This study finally proposes a desirable user-device interaction in which images of two devices function together with a system image to provide the user with feedback on the status of the connection, which allows them to infer any required actions.

  3. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    PubMed

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  4. Scientific progress - wireless phones and brain cancer: current state of the science.

    PubMed

    Carlo, G L; Jenrow, R S

    2000-07-11

    The current science is not definitive about health risks from wireless phones; however, the legitimate questions about safety that have arisen from recent studies make claims of absolute safety no longer supportable. The objective of this paper is to outline for primary care providers the results of the most current research on the possible impact of wireless phone use on human health. Presented are study results from Wireless Technology Research (WTR) program, the 7-year, $27 million effort funded by the wireless industry in the United States, that represents the world's most comprehensive research effort addressing this issue to date. Science-based recommendations for consumer interventions and future research are presented. Original studies performed under the WTR program as well as other relevant research from around the world. This article presents a synopsis of the peer-reviewed in vitro and in vivo laboratory research, and the peer-reviewed epidemiology studies supported by the WTR, as well as a summary of other relevant work. Only peer-reviewed scientific studies are presented, primarily WTR-sponsored research. In addition, results of the WTR literature surveillance program, which identified other relevant toxicology and epidemiology studies on an ongoing basis, are presented. These studies are presented in the context of their usefulness in providing intervention recommendations for consumers. Following a qualitative synthesis of specific relevant non-WTR research and a critical assessment of the WTR results, the following represents the current state of scientific understanding relevant to the public health impact of wireless phones: laboratory studies appear to have confirmed that radio frequency radiation from wireless phone antennas is insufficient to cause DNA breakage; however, this same radiation appears to cause genetic damage in human blood as measured through the formation of micronuclei. An increase in the rate of brain cancer mortality among hand-held cellular phone users as compared to car phone users, though not statistically significant, was observed in the WTR cohort study. A statistically significant increase in the risk of neuro-epithelial brain tumors was observed among cellular phone users in another case-control study. As new data emerge, our understanding of this complex problem will improve; however, at present there is a critical need for ongoing and open evaluation of the public health impact of new science, and communication of this science and derivative intervention options to those who are potentially affected.

  5. Seamless interworking architecture for WBAN in heterogeneous wireless networks with QoS guarantees.

    PubMed

    Khan, Pervez; Ullah, Niamat; Ullah, Sana; Kwak, Kyung Sup

    2011-10-01

    The IEEE 802.15.6 standard is a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. Providing high mobility with guaranteed Quality of Service (QoS) to a WBAN user in heterogeneous wireless networks is a challenging task. A WBAN uses a Personal Digital Assistant (PDA) to gather data from body sensors and forwards it to a remote server through wide range wireless networks. In this paper, we present a coexistence study of WBAN with Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWANs). The main issue is interworking of WBAN in heterogenous wireless networks including seamless handover, QoS, emergency services, cooperation and security. We propose a Seamless Interworking Architecture (SIA) for WBAN in heterogenous wireless networks based on a cost function. The cost function is based on power consumption and data throughput costs. Our simulation results show that the proposed scheme outperforms typical approaches in terms of throughput, delay and packet loss rate.

  6. Preliminary Results from a Model-Driven Architecture Methodology for Development of an Event-Driven Space Communications Service Concept

    NASA Technical Reports Server (NTRS)

    Roberts, Christopher J.; Morgenstern, Robert M.; Israel, David J.; Borky, John M.; Bradley, Thomas H.

    2017-01-01

    NASA's next generation space communications network will involve dynamic and autonomous services analogous to services provided by current terrestrial wireless networks. This architecture concept, known as the Space Mobile Network (SMN), is enabled by several technologies now in development. A pillar of the SMN architecture is the establishment and utilization of a continuous bidirectional control plane space link channel and a new User Initiated Service (UIS) protocol to enable more dynamic and autonomous mission operations concepts, reduced user space communications planning burden, and more efficient and effective provider network resource utilization. This paper provides preliminary results from the application of model driven architecture methodology to develop UIS. Such an approach is necessary to ensure systematic investigation of several open questions concerning the efficiency, robustness, interoperability, scalability and security of the control plane space link and UIS protocol.

  7. Battery-free Wireless Sensor Network For Advanced Fossil-Fuel Based Power Generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yi Jia

    2011-02-28

    This report summarizes technical progress achieved during the project supported by the Department of Energy under Award Number DE-FG26-07NT4306. The aim of the project was to conduct basic research into battery-free wireless sensing mechanism in order to develop novel wireless sensors and sensor network for physical and chemical parameter monitoring in a harsh environment. Passive wireless sensing platform and five wireless sensors including temperature sensor, pressure sensor, humidity sensor, crack sensor and networked sensors developed and demonstrated in our laboratory setup have achieved the objective for the monitoring of various physical and chemical parameters in a harsh environment through remotemore » power and wireless sensor communication, which is critical to intelligent control of advanced power generation system. This report is organized by the sensors developed as detailed in each progress report.« less

  8. Joint Cross-Layer Design for Wireless QoS Content Delivery

    NASA Astrophysics Data System (ADS)

    Chen, Jie; Lv, Tiejun; Zheng, Haitao

    2005-12-01

    In this paper, we propose a joint cross-layer design for wireless quality-of-service (QoS) content delivery. Central to our proposed cross-layer design is the concept of adaptation. Adaptation represents the ability to adjust protocol stacks and applications to respond to channel variations. We focus our cross-layer design especially on the application, media access control (MAC), and physical layers. The network is designed based on our proposed fast frequency-hopping orthogonal frequency division multiplex (OFDM) technique. We also propose a QoS-awareness scheduler and a power adaptation transmission scheme operating at both the base station and mobile sides. The proposed MAC scheduler coordinates the transmissions of an IP base station and mobile nodes. The scheduler also selects appropriate transmission formats and packet priorities for individual users based on current channel conditions and the users' QoS requirements. The test results show that our cross-layer design provides an excellent framework for wireless QoS content delivery.

  9. Design of QoS-Aware Multi-Level MAC-Layer for Wireless Body Area Network.

    PubMed

    Hu, Long; Zhang, Yin; Feng, Dakui; Hassan, Mohammad Mehedi; Alelaiwi, Abdulhameed; Alamri, Atif

    2015-12-01

    With the advances in wearable computing and various wireless technologies, there is an increasing trend to outsource body signals from wireless body area network (WBAN) to outside world including cyber space, healthcare big data clouds, etc. Since the environmental and physiological data collected by multimodal sensors have different importance, the provisioning of quality of service (QoS) for the sensory data in WBAN is a critical issue. This paper proposes multiple level-based QoS design at WBAN media access control layer in terms of user level, data level and time level. In the proposed QoS provisioning scheme, different users have different priorities, various sensory data collected by different sensor nodes have different importance, while data priority for the same sensor node varies over time. The experimental results show that the proposed multi-level based QoS provisioning solution in WBAN yields better performance for meeting QoS requirements of personalized healthcare applications while achieving energy saving.

  10. Challenges for Social Control in Wireless Mobile Grids

    NASA Astrophysics Data System (ADS)

    Balke, Tina; Eymann, Torsten

    The evolution of mobile phones has lead to new wireless mobile grids that lack a central controlling instance and require the cooperation of autonomous entities that can voluntarily commit resources, forming a common pool which can be used in order to achieve common and/or individual goals. The social dilemma in such systems is that it is advantageous for rational users to access the common pool resources without any own commitment, since every commitment has its price (see ? for example). However, if a substantial number of users would follow this selfish strategy, the network itself would be at stake. Thus, the question arises on how cooperation can be fostered in wireless mobile grids. Whereas many papers have dealt with this question from a technical point of view, instead this paper will concentrate on a concept that has lately been discussed a lot with this regard: social control. Thereby social control concepts will be contrasted to technical approaches and resulting challenges (as well as possible solutions to these challenges) for social concepts will be discussed.

  11. Development and experimental validation of downlink multiuser MIMO-OFDM in gigabit wireless LAN systems

    NASA Astrophysics Data System (ADS)

    Ishihara, Koichi; Asai, Yusuke; Kudo, Riichi; Ichikawa, Takeo; Takatori, Yasushi; Mizoguchi, Masato

    2013-12-01

    Multiuser multiple-input multiple-output (MU-MIMO) has been proposed as a means to improve spectrum efficiency for various future wireless communication systems. This paper reports indoor experimental results obtained for a newly developed and implemented downlink (DL) MU-MIMO orthogonal frequency division multiplexing (OFDM) transceiver for gigabit wireless local area network systems in the microwave band. In the transceiver, the channel state information (CSI) is estimated at each user and fed back to an access point (AP) on a real-time basis. At the AP, the estimated CSI is used to calculate the transmit beamforming weight for DL MU-MIMO transmission. This paper also proposes a recursive inverse matrix computation scheme for computing the transmit weight in real time. Experiments with the developed transceiver demonstrate its feasibility in a number of indoor scenarios. The experimental results clarify that DL MU-MIMO-OFDM transmission can achieve a 972-Mbit/s transmission data rate with simple digital signal processing of single-antenna users in an indoor environment.

  12. Rethinking Indoor Localization Solutions Towards the Future of Mobile Location-Based Services

    NASA Astrophysics Data System (ADS)

    Guney, C.

    2017-11-01

    Satellite navigation systems with GNSS-enabled devices, such as smartphones, car navigation systems, have changed the way users travel in outdoor environment. GNSS is generally not well suited for indoor location and navigation because of two reasons: First, GNSS does not provide a high level of accuracy although indoor applications need higher accuracies. Secondly, poor coverage of satellite signals for indoor environments decreases its accuracy. So rather than using GNSS satellites within closed environments, existing indoor navigation solutions rely heavily on installed sensor networks. There is a high demand for accurate positioning in wireless networks in GNSS-denied environments. However, current wireless indoor positioning systems cannot satisfy the challenging needs of indoor location-aware applications. Nevertheless, access to a user's location indoors is increasingly important in the development of context-aware applications that increases business efficiency. In this study, how can the current wireless location sensing systems be tailored and integrated for specific applications, like smart cities/grids/buildings/cars and IoT applications, in GNSS-deprived areas.

  13. Improving the Capture and Re-Use of Data with Wearable Computers

    NASA Technical Reports Server (NTRS)

    Pfarr, Barbara; Fating, Curtis C.; Green, Daniel; Powers, Edward I. (Technical Monitor)

    2001-01-01

    At the Goddard Space Flight Center, members of the Real-Time Software Engineering Branch are developing a wearable, wireless, voice-activated computer for use in a wide range of crosscutting space applications that would benefit from having instant Internet, network, and computer access with complete mobility and hands-free operations. These applications can be applied across many fields and disciplines including spacecraft fabrication, integration and testing (including environmental testing), and astronaut on-orbit control and monitoring of experiments with ground based experimenters. To satisfy the needs of NASA customers, this wearable computer needs to be connected to a wireless network, to transmit and receive real-time video over the network, and to receive updated documents via the Internet or NASA servers. The voice-activated computer, with a unique vocabulary, will allow the users to access documentation in a hands free environment and interact in real-time with remote users. We will discuss wearable computer development, hardware and software issues, wireless network limitations, video/audio solutions and difficulties in language development.

  14. Waiting on the Wave

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2007-01-01

    University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…

  15. 77 FR 8324 - Applications for the Environment: Real-Time Information Synthesis (AERIS) User Needs Workshop...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-14

    ... (AERIS) User Needs Workshop; Notice of Public Meeting AGENCY: Research and Innovative Technology... transformative capabilities of wireless technology to make surface transportation safer, smarter, and greener... significant environmental benefits. The AERIS Transformative Concepts include: (1) Eco-signal operations, (2...

  16. Research on a power management system for thermoelectric generators to drive wireless sensors on a spindle unit.

    PubMed

    Li, Sheng; Yao, Xinhua; Fu, Jianzhong

    2014-07-16

    Thermoelectric energy harvesting is emerging as a promising alternative energy source to drive wireless sensors in mechanical systems. Typically, the waste heat from spindle units in machine tools creates potential for thermoelectric generation. However, the problem of low and fluctuant ambient temperature differences in spindle units limits the application of thermoelectric generation to drive a wireless sensor. This study is devoted to presenting a transformer-based power management system and its associated control strategy to make the wireless sensor work stably at different speeds of the spindle. The charging/discharging time of capacitors is optimized through this energy-harvesting strategy. A rotating spindle platform is set up to test the performance of the power management system at different speeds. The experimental results show that a longer sampling cycle time will increase the stability of the wireless sensor. The experiments also prove that utilizing the optimal time can make the power management system work more effectively compared with other systems using the same sample cycle.

  17. Research on a Power Management System for Thermoelectric Generators to Drive Wireless Sensors on a Spindle Unit

    PubMed Central

    Li, Sheng; Yao, Xinhua; Fu, Jianzhong

    2014-01-01

    Thermoelectric energy harvesting is emerging as a promising alternative energy source to drive wireless sensors in mechanical systems. Typically, the waste heat from spindle units in machine tools creates potential for thermoelectric generation. However, the problem of low and fluctuant ambient temperature differences in spindle units limits the application of thermoelectric generation to drive a wireless sensor. This study is devoted to presenting a transformer-based power management system and its associated control strategy to make the wireless sensor work stably at different speeds of the spindle. The charging/discharging time of capacitors is optimized through this energy-harvesting strategy. A rotating spindle platform is set up to test the performance of the power management system at different speeds. The experimental results show that a longer sampling cycle time will increase the stability of the wireless sensor. The experiments also prove that utilizing the optimal time can make the power management system work more effectively compared with other systems using the same sample cycle. PMID:25033189

  18. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    NASA Astrophysics Data System (ADS)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  19. Optimization of locations of diffusion spots in indoor optical wireless local area networks

    NASA Astrophysics Data System (ADS)

    Eltokhey, Mahmoud W.; Mahmoud, K. R.; Ghassemlooy, Zabih; Obayya, Salah S. A.

    2018-03-01

    In this paper, we present a novel optimization of the locations of the diffusion spots in indoor optical wireless local area networks, based on the central force optimization (CFO) scheme. The users' performance uniformity is addressed by using the CFO algorithm, and adopting different objective function's configurations, while considering maximization and minimization of the signal to noise ratio and the delay spread, respectively. We also investigate the effect of varying the objective function's weights on the system and the users' performance as part of the adaptation process. The results show that the proposed objective function configuration-based optimization procedure offers an improvement of 65% in the standard deviation of individual receivers' performance.

  20. Development and functional demonstration of a wireless intraoral inductive tongue computer interface for severely disabled persons.

    PubMed

    N S Andreasen Struijk, Lotte; Lontis, Eugen R; Gaihede, Michael; Caltenco, Hector A; Lund, Morten Enemark; Schioeler, Henrik; Bentsen, Bo

    2017-08-01

    Individuals with tetraplegia depend on alternative interfaces in order to control computers and other electronic equipment. Current interfaces are often limited in the number of available control commands, and may compromise the social identity of an individual due to their undesirable appearance. The purpose of this study was to implement an alternative computer interface, which was fully embedded into the oral cavity and which provided multiple control commands. The development of a wireless, intraoral, inductive tongue computer was described. The interface encompassed a 10-key keypad area and a mouse pad area. This system was embedded wirelessly into the oral cavity of the user. The functionality of the system was demonstrated in two tetraplegic individuals and two able-bodied individuals Results: The system was invisible during use and allowed the user to type on a computer using either the keypad area or the mouse pad. The maximal typing rate was 1.8 s for repetitively typing a correct character with the keypad area and 1.4 s for repetitively typing a correct character with the mouse pad area. The results suggest that this inductive tongue computer interface provides an esthetically acceptable and functionally efficient environmental control for a severely disabled user. Implications for Rehabilitation New Design, Implementation and detection methods for intra oral assistive devices. Demonstration of wireless, powering and encapsulation techniques suitable for intra oral embedment of assistive devices. Demonstration of the functionality of a rechargeable and fully embedded intra oral tongue controlled computer input device.

  1. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  2. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    PubMed Central

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  3. An inversion strategy for energy saving in smart building through wireless monitoring

    NASA Astrophysics Data System (ADS)

    Anselmi, N.; Moriyama, T.

    2017-10-01

    The building plants represent one of the main sources of power consumption and of greenhouse gases emission in urban scenarios. The efficiency of energy management is also related to the indoor environmental conditions that reflect on the user comfort. The constant monitoring of comfort indicators enables the accurate management of building plants with the final objective of reducing energy waste and satisfying the user needs. This paper presents an inversion methodology based on support vector regression for the reconstruction and forecasting of the thermal comfort of users starting from the indoor environmental features of the building. The environmental monitoring is performed by means of a wireless sensor network, which pervasively measures the spatial variability of indoor conditions. The proposed system has been experimentally validated in a real test-site to assess the advantages and the limitations in supporting the management of the building plants towards energy saving.

  4. Access point selection game with mobile users using correlated equilibrium.

    PubMed

    Sohn, Insoo

    2015-01-01

    One of the most important issues in wireless local area network (WLAN) systems with multiple access points (APs) is the AP selection problem. Game theory is a mathematical tool used to analyze the interactions in multiplayer systems and has been applied to various problems in wireless networks. Correlated equilibrium (CE) is one of the powerful game theory solution concepts, which is more general than the Nash equilibrium for analyzing the interactions in multiplayer mixed strategy games. A game-theoretic formulation of the AP selection problem with mobile users is presented using a novel scheme based on a regret-based learning procedure. Through convergence analysis, we show that the joint actions based on the proposed algorithm achieve CE. Simulation results illustrate that the proposed algorithm is effective in a realistic WLAN environment with user mobility and achieves maximum system throughput based on the game-theoretic formulation.

  5. Access Point Selection Game with Mobile Users Using Correlated Equilibrium

    PubMed Central

    Sohn, Insoo

    2015-01-01

    One of the most important issues in wireless local area network (WLAN) systems with multiple access points (APs) is the AP selection problem. Game theory is a mathematical tool used to analyze the interactions in multiplayer systems and has been applied to various problems in wireless networks. Correlated equilibrium (CE) is one of the powerful game theory solution concepts, which is more general than the Nash equilibrium for analyzing the interactions in multiplayer mixed strategy games. A game-theoretic formulation of the AP selection problem with mobile users is presented using a novel scheme based on a regret-based learning procedure. Through convergence analysis, we show that the joint actions based on the proposed algorithm achieve CE. Simulation results illustrate that the proposed algorithm is effective in a realistic WLAN environment with user mobility and achieves maximum system throughput based on the game-theoretic formulation. PMID:25785726

  6. The Device Centric Communication System for 5G Networks

    NASA Astrophysics Data System (ADS)

    Biswash, S. K.; Jayakody, D. N. K.

    2017-01-01

    The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.

  7. High fidelity wireless network evaluation for heterogeneous cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Ding, Lei; Sagduyu, Yalin; Yackoski, Justin; Azimi-Sadjadi, Babak; Li, Jason; Levy, Renato; Melodia, Tammaso

    2012-06-01

    We present a high fidelity cognitive radio (CR) network emulation platform for wireless system tests, measure- ments, and validation. This versatile platform provides the configurable functionalities to control and repeat realistic physical channel effects in integrated space, air, and ground networks. We combine the advantages of scalable simulation environment with reliable hardware performance for high fidelity and repeatable evaluation of heterogeneous CR networks. This approach extends CR design only at device (software-defined-radio) or lower-level protocol (dynamic spectrum access) level to end-to-end cognitive networking, and facilitates low-cost deployment, development, and experimentation of new wireless network protocols and applications on frequency- agile programmable radios. Going beyond the channel emulator paradigm for point-to-point communications, we can support simultaneous transmissions by network-level emulation that allows realistic physical-layer inter- actions between diverse user classes, including secondary users, primary users, and adversarial jammers in CR networks. In particular, we can replay field tests in a lab environment with real radios perceiving and learning the dynamic environment thereby adapting for end-to-end goals over distributed spectrum coordination channels that replace the common control channel as a single point of failure. CR networks offer several dimensions of tunable actions including channel, power, rate, and route selection. The proposed network evaluation platform is fully programmable and can reliably evaluate the necessary cross-layer design solutions with configurable op- timization space by leveraging the hardware experiments to represent the realistic effects of physical channel, topology, mobility, and jamming on spectrum agility, situational awareness, and network resiliency. We also provide the flexibility to scale up the test environment by introducing virtual radios and establishing seamless signal-level interactions with real radios. This holistic wireless evaluation approach supports a large-scale, het- erogeneous, and dynamic CR network architecture and allows developing cross-layer network protocols under high fidelity, repeatable, and scalable wireless test scenarios suitable for heterogeneous space, air, and ground networks.

  8. Integrating Conjoint Analysis with TOPSIS Algorithm to the Visual Effect of Icon Design Based on Multiple Users' Image Perceptions

    ERIC Educational Resources Information Center

    Tung, Ting-Chun; Chen, Hung-Yuan

    2017-01-01

    With the advance of mobile computing and wireless technology, a user's intent to interact with the interface of a mobile device is motivated not only by its intuitional operation, but also by the emotional perception induced by its aesthetic appeal. A graphical interface employing icons with suitable visual effect based on the users' emotional…

  9. High-throughput and low-latency 60GHz small-cell network architectures over radio-over-fiber technologies

    NASA Astrophysics Data System (ADS)

    Pleros, N.; Kalfas, G.; Mitsolidou, C.; Vagionas, C.; Tsiokos, D.; Miliou, A.

    2017-01-01

    Future broadband access networks in the 5G framework will need to be bilateral, exploiting both optical and wireless technologies. This paper deals with new approaches and synergies on radio-over-fiber (RoF) technologies and how those can be leveraged to seamlessly converge wireless technology for agility and mobility with passive optical networks (PON)-based backhauling. The proposed convergence paradigm is based upon a holistic network architecture mixing mm-wave wireless access with photonic integration, dynamic capacity allocation and network coding schemes to enable high bandwidth and low-latency fixed and 60GHz wireless personal area communications for gigabit rate per user, proposing and deploying on top a Medium-Transparent MAC (MT-MAC) protocol as a low-latency bandwidth allocation mechanism. We have evaluated alternative network topologies between the central office (CO) and the access point module (APM) for data rates up to 2.5 Gb/s and SC frequencies up to 60 GHz. Optical network coding is demonstrated for SCM-based signaling to enhance bandwidth utilization and facilitate optical-wireless convergence in 5G applications, reporting medium-transparent network coding directly at the physical layer between end-users communicating over a RoF infrastructure. Towards equipping the physical layer with the appropriate agility to support MT-MAC protocols, a monolithic InP-based Remote Antenna Unit optoelectronic PIC interface is shown that ensures control over the optical resource allocation assisting at the same time broadband wireless service. Finally, the MT-MAC protocol is analysed and simulation and analytical theoretical results are presented that are found to be in good agreement confirming latency values lower than 1msec for small- to mid-load conditions.

  10. Optical network unit placement in Fiber-Wireless (FiWi) access network by Moth-Flame optimization algorithm

    NASA Astrophysics Data System (ADS)

    Singh, Puja; Prakash, Shashi

    2017-07-01

    Hybrid wireless-optical broadband access network (WOBAN) or Fiber-Wireless (FiWi) is the integration of wireless access network and optical network. This hybrid multi-domain network adopts the advantages of wireless and optical domains and serves the demand of technology savvy users. FiWi exhibits the properties of cost effectiveness, robustness, flexibility, high capacity, reliability and is self organized. Optical Network Unit (ONU) placement problem in FiWi contributes in simplifying the network design and enhances the performance in terms of cost efficiency and increased throughput. Several individual-based algorithms, such as Simulated Annealing (SA), Tabu Search, etc. have been suggested for ONU placement, but these algorithms suffer from premature convergence (trapping in a local optima). The present research work undertakes the deployment of FiWi and proposes a novel nature-inspired heuristic paradigm called Moth-Flame optimization (MFO) algorithm for multiple optical network units' placement. MFO is a population based algorithm. Population-based algorithms are better in handling local optima avoidance. The simulation results are compared with the existing Greedy and Simulated Annealing algorithms to optimize the position of ONUs. To the best of our knowledge, MFO algorithm has been used for the first time in this domain, moreover it has been able to provide very promising and competitive results. The performance of MFO algorithm has been analyzed by varying the 'b' parameter. MFO algorithm results in faster convergence than the existing strategies of Greedy and SA and returns a lower value of overall cost function. The results exhibit the dependence of the objective function on the distribution of wireless users also.

  11. Wireless Biological Electronic Sensors.

    PubMed

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  12. Electromagnetic spectrum management system

    DOEpatents

    Seastrand, Douglas R.

    2017-01-31

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process the unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.

  13. Real-time video streaming using H.264 scalable video coding (SVC) in multihomed mobile networks: a testbed approach

    NASA Astrophysics Data System (ADS)

    Nightingale, James; Wang, Qi; Grecos, Christos

    2011-03-01

    Users of the next generation wireless paradigm known as multihomed mobile networks expect satisfactory quality of service (QoS) when accessing streamed multimedia content. The recent H.264 Scalable Video Coding (SVC) extension to the Advanced Video Coding standard (AVC), offers the facility to adapt real-time video streams in response to the dynamic conditions of multiple network paths encountered in multihomed wireless mobile networks. Nevertheless, preexisting streaming algorithms were mainly proposed for AVC delivery over multipath wired networks and were evaluated by software simulation. This paper introduces a practical, hardware-based testbed upon which we implement and evaluate real-time H.264 SVC streaming algorithms in a realistic multihomed wireless mobile networks environment. We propose an optimised streaming algorithm with multi-fold technical contributions. Firstly, we extended the AVC packet prioritisation schemes to reflect the three-dimensional granularity of SVC. Secondly, we designed a mechanism for evaluating the effects of different streamer 'read ahead window' sizes on real-time performance. Thirdly, we took account of the previously unconsidered path switching and mobile networks tunnelling overheads encountered in real-world deployments. Finally, we implemented a path condition monitoring and reporting scheme to facilitate the intelligent path switching. The proposed system has been experimentally shown to offer a significant improvement in PSNR of the received stream compared with representative existing algorithms.

  14. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  15. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  16. Smart Adaptive Socket to Improve Fit and Relieve Pain in Wounded Warriors

    DTIC Science & Technology

    2016-10-01

    applications were developed for wireless interaction with the socket system firmware. A control algorithm was designed and tested. Clinical trial...interface, Dynamic segmental volume control, Wireless connection, Pressure control system. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...charging jack, and power button are included in the design. A Bluetooth 4 radio is also included to allow for advanced user control via smartphone. The

  17. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    PubMed Central

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  18. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    PubMed

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  19. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    PubMed

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  20. Spectral and spatial characterization of perfluorinated graded-index polymer optical fibers for the distribution of optical wireless communication cells.

    PubMed

    Hajjar, Hani Al; Montero, David S; Lallana, Pedro C; Vázquez, Carmen; Fracasso, Bruno

    2015-02-10

    In this paper, the characterization of a perfluorinated graded-index polymer optical fiber (PF-GIPOF) for a high-bitrate indoor optical wireless system is reported. PF-GIPOF is used here to interconnect different optical wireless access points that distribute optical free-space high-bitrate wireless communication cells. The PF-GIPOF channel is first studied in terms of transmission attenuation and frequency response and, in a second step, the spatial power profile distribution at the fiber output is analyzed. Both characterizations are performed under varying restricted mode launch conditions, enabling us to assess the transmission channel performance subject to potential connectorization errors within an environment where the end users may intervene by themselves on the home network infrastructure.

  1. Distributing Data from Desktop to Hand-Held Computers

    NASA Technical Reports Server (NTRS)

    Elmore, Jason L.

    2005-01-01

    A system of server and client software formats and redistributes data from commercially available desktop to commercially available hand-held computers via both wired and wireless networks. This software is an inexpensive means of enabling engineers and technicians to gain access to current sensor data while working in locations in which such data would otherwise be inaccessible. The sensor data are first gathered by a data-acquisition server computer, then transmitted via a wired network to a data-distribution computer that executes the server portion of the present software. Data in all sensor channels -- both raw sensor outputs in millivolt units and results of conversion to engineering units -- are made available for distribution. Selected subsets of the data are transmitted to each hand-held computer via the wired and then a wireless network. The selection of the subsets and the choice of the sequences and formats for displaying the data is made by means of a user interface generated by the client portion of the software. The data displayed on the screens of hand-held units can be updated at rates from 1 to

  2. Teaching the Fundamentals of Cell Phones and Wireless Communications

    NASA Astrophysics Data System (ADS)

    Davids, Mark; Forrest, Rick; Pata, Don

    2010-04-01

    Wireless communications are ubiquitous. Students and teachers use iPhones®, BlackBerrys®, and other smart phones at home and at work. More than 275 million Americans had cell phones in June of 2009 and expanded access to broadband is predicted this year.2 Despite the plethora of users, most students and teachers do not understand "how they work." Over the past several years, three high school teachers have collaborated with engineers at Cingular, Motorola, and the University of Michigan to explore the underlying science and design a three-week, student-centered unit with a constructivist pedagogy consistent with the "Modeling in Physics" philosophy.3 This unique pilot program reinforces traditional physics topics including vibrations and waves, sound, light, electricity and magnetism, and also introduces key concepts in communications and information theory. This article will describe the motivation for our work, outline a few key concepts with the corresponding student activities, and provide a summary of the program that has been developed to engage and inspire the next generation of scientists, engineers, and citizens.

  3. An Approach for Smart Antenna Testbed

    NASA Astrophysics Data System (ADS)

    Kawitkar, R. S.; Wakde, D. G.

    2003-07-01

    The use of wireless, mobile, personal communications services are expanding rapidly. Adaptive or "Smart" antenna arrays can increase channel capacity through spatial division. Adaptive antennas can also track mobile users, improving both signal range and quality. For these reasons, smart antenna systems have attracted widespread interest in the telecommunications industry for applications to third generation wireless systems.This paper aims to design and develop an advanced antennas testbed to serve as a common reference for testing adaptive antenna arrays and signal combining algorithms, as well as complete systems. A flexible suite of off line processing software should be written using matlab to perform system calibration, test bed initialization, data acquisition control, data storage/transfer, off line signal processing and analysis and graph plotting. The goal of this paper is to develop low complexity smart antenna structures for 3G systems. The emphasis will be laid on ease of implementation in a multichannel / multi-user environment. A smart antenna test bed will be developed, and various state-of-the-art DSP structures and algorithms will be investigated.Facing the soaring demand for mobile communications, the use of smart antenna arrays in mobile communications systems to exploit spatial diversity to further improve spectral efficiency has recently received considerable attention. Basically, a smart antenna array comprises a number of antenna elements combined via a beamforming network (amplitude and phase control network). Some of the benefits that can be achieved by using SAS (Smart Antenna System) include lower mobile terminal power consumption, range extension, ISI reduction, higher data rate support, and ease of integration into the existing base station system. In terms of economic benefits, adaptive antenna systems employed at base station, though increases the per base station cost, can increase coverage area of each cell site, thereby reducing the total system cost dramatically - often by more than 50% without compromising the system performance. The testbed can be employed to illustrate enhancement of system capacity and service quality in wireless communications.

  4. 75 FR 67060 - Universal Service Reform Mobility Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-01

    ... CONTACT: Wireless Telecommunications Bureau, Auctions and Spectrum Access Division: Scott Mackoul at (202... the first cellular telephone licenses, the wireless industry has continually expanded and upgraded its networks to the point where third generation (called advanced or 3G) mobile wireless services are now...

  5. Wireless Biological Electronic Sensors

    PubMed Central

    Cui, Yue

    2017-01-01

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors. PMID:28991220

  6. A Silicon Carbide Wireless Temperature Sensing System for High Temperature Applications

    PubMed Central

    Yang, Jie

    2013-01-01

    In this article, an extreme environment-capable temperature sensing system based on state-of-art silicon carbide (SiC) wireless electronics is presented. In conjunction with a Pt-Pb thermocouple, the SiC wireless sensor suite is operable at 450 °C while under centrifugal load greater than 1,000 g. This SiC wireless temperature sensing system is designed to be non-intrusively embedded inside the gas turbine generators, acquiring the temperature information of critical components such as turbine blades, and wirelessly transmitting the information to the receiver located outside the turbine engine. A prototype system was developed and verified up to 450 °C through high temperature lab testing. The combination of the extreme temperature SiC wireless telemetry technology and integrated harsh environment sensors will allow for condition-based in-situ maintenance of power generators and aircraft turbines in field operation, and can be applied in many other industries requiring extreme environment monitoring and maintenance. PMID:23377189

  7. Development of self-powered wireless high temperature electrochemical sensor for in situ corrosion monitoring of coal-fired power plant.

    PubMed

    Aung, Naing Naing; Crowe, Edward; Liu, Xingbo

    2015-03-01

    Reliable wireless high temperature electrochemical sensor technology is needed to provide in situ corrosion information for optimal predictive maintenance to ensure a high level of operational effectiveness under the harsh conditions present in coal-fired power generation systems. This research highlights the effectiveness of our novel high temperature electrochemical sensor for in situ coal ash hot corrosion monitoring in combination with the application of wireless communication and an energy harvesting thermoelectric generator (TEG). This self-powered sensor demonstrates the successful wireless transmission of both corrosion potential and corrosion current signals to a simulated control room environment. Copyright © 2014 ISA. All rights reserved.

  8. Wired/wireless access integrated RoF-PON with scalable generation of multi-frequency MMWs enabled by polarization multiplexed FWM in SOA.

    PubMed

    Xiang, Yu; Chen, Chen; Zhang, Chongfu; Qiu, Kun

    2013-01-14

    In this paper, we propose and demonstrate a novel integrated radio-over-fiber passive optical network (RoF-PON) system for both wired and wireless access. By utilizing the polarization multiplexed four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA), scalable generation of multi-frequency millimeter-waves (MMWs) can be provided so as to assist the configuration of multi-frequency wireless access for the wire/wireless access integrated ROF-PON system. In order to obtain a better performance, the polarization multiplexed FWM effect is investigated in detail. Simulation results successfully verify the feasibility of our proposed scheme.

  9. Fast notification architecture for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Hahk

    2013-03-01

    In an emergency, since it is vital to transmit the message to the users immediately after analysing the data to prevent disaster, this article presents the deployment of a fast notification architecture for a wireless sensor network. The sensor nodes of the proposed architecture can monitor an emergency situation periodically and transmit the sensing data, immediately to the sink node. We decide on the grade of fire situation according to the decision rule using the sensing values of temperature, CO, smoke density and temperature increasing rate. On the other hand, to estimate the grade of air pollution, the sensing data, such as dust, formaldehyde, NO2, CO2, is applied to the given knowledge model. Since the sink node in the architecture has a ZigBee interface, it can transmit the alert messages in real time according to analysed results received from the host server to the terminals equipped with a SIM card-type ZigBee module. Also, the host server notifies the situation to the registered users who have cellular phone through short message service server of the cellular network. Thus, the proposed architecture can adapt an emergency situation dynamically compared to the conventional architecture using video processing. In the testbed, after generating air pollution and fire data, the terminal receives the message in less than 3 s. In the test results, this system can also be applied to buildings and public areas where many people gather together, to prevent unexpected disasters in urban settings.

  10. Interference from the Robledo DSN Transmitters to Central Madrid IMT-2000/UMTS System through Terrain Diffraction at S-Band

    NASA Technical Reports Server (NTRS)

    Ho, Christian M.; Sue, Miles K.; Peng, Ted K.; Smith, Ernest K.

    2002-01-01

    This study evaluates the possible interference from DSN Robledo 70-m transmitter with Madrid IMT-2000/UMTS wireless users in Spain as both systems will share the same frequency band. Using the effective earth radius, the 50 km terrain profile between Robledo and Madrid is modified and reconstructed. The diffraction propagation losses due to mountain peaks are calculated for the receivers in Madrid urban area. The mountains along the path are simplified into a rounded knife-edge and a rounded obstacle. The results show that for a near surface receiver (1.5 m above the ground) in Madrid, interference signal powers received are less than -135 dBm, which is far below the -109 dBm, the IMT-2000 wireless phone threshold. When a receiver is located at about 40 m above the ground (e.g., the top of Clock Tower of Cibeles Palace), diffraction will generate interference power less than -115 dBm. We find that our calculation results are basically consistent with those from the Longley-Rice model, while the latter has smaller loss because of the low resolution terrain profile used. As a comparison, we also find that the measurements of interference powers of -121.2 dBm at the top of Clock tower is in the range of the estimation. We conclude that the interference through the diffraction mechanism will not cause any problem to IMT-2000/UMTS users at near the surface of Madrid urban area.

  11. Electromagnetic spectrum management system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seastrand, Douglas R.

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process themore » unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.« less

  12. Physicality and Language Learning

    ERIC Educational Resources Information Center

    Park, Jaeuk; Seedhouse, Paul; Seedhouse, Rob; Kiaer, Jieun

    2016-01-01

    The study draws on the digital technology which allows users to be able to learn both linguistic and non-linguistic skills at the same time. Activity recognition as well as wireless sensor technology, similar to a Nintendo Wii, is embedded or attached to the equipment and ingredients, allowing users to detect and evaluate progress as they carry…

  13. A Novel Optimal Joint Resource Allocation Method in Cooperative Multicarrier Networks: Theory and Practice

    PubMed Central

    Gao, Yuan; Zhou, Weigui; Ao, Hong; Chu, Jian; Zhou, Quan; Zhou, Bo; Wang, Kang; Li, Yi; Xue, Peng

    2016-01-01

    With the increasing demands for better transmission speed and robust quality of service (QoS), the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT) scenario in joint processing mode of LTE-Advanced Pro. This paper focuses on resource allocation within capacity constrained backhaul in uplink cooperative wireless networks, where two base stations (BSs) equipped with single antennae serve multiple single-antennae users via multi-carrier transmission mode. In this work, we propose a novel cooperative transmission scheme based on compress-and-forward with user pairing to solve the joint mixed integer programming problem. To maximize the system capacity under the limited backhaul, we formulate the joint optimization problem of user sorting, subcarrier mapping and backhaul resource sharing among different pairs (subcarriers for users). A novel robust and efficient centralized algorithm based on alternating optimization strategy and perfect mapping is proposed. Simulations show that our novel method can improve the system capacity significantly under the constraint of the backhaul resource compared with the blind alternatives. PMID:27077865

  14. Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks.

    PubMed

    Jurdak, Raja; Nafaa, Abdelhamid; Barbirato, Alessio

    2008-11-24

    Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper.

  15. Multi-User Performance Issues in Wireless Impulse Radio Networks

    DTIC Science & Technology

    2004-01-01

    Performance Issues in Wireless Impulse Radio Networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) North Carolina State University,Department of...Electrical and Computer Engineering,Raleigh,NC,27695 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10

  16. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  17. Unpowered wireless ultrasound tomography system

    NASA Astrophysics Data System (ADS)

    Zahedi, Farshad; Huang, Haiying

    2016-04-01

    In this paper, an unpowered wireless ultrasound tomography system is presented. The system consists of two subsystems; the wireless interrogation unit (WIU) and three wireless nodes installed on the structure. Each node is designed to work in generation and sensing modes, but operates at a specific microwave frequency. Wireless transmission of the ultrasound signals between the WIU and the wireless nodes is achieved by converting ultrasound signals to microwave signals and vice versa, using a microwave carrier signal. In the generation mode, both a carrier signal and an ultrasound modulated microwave signal are transmitted to the sensor nodes. Only the node whose operating frequency matches the carrier signal will receive these signals and demodulate them to recover the original ultrasound signal. In the sensing mode, a microwave carrier signal with two different frequency components matching the operating frequencies of the sensor nodes is broadcasted by the WIU. The sensor nodes, in turn, receive the corresponding carrier signals, modulate it with the ultrasound sensing signal, and wirelessly transmit the modulated signal back to the WIU. The demodulation of the sensing signals is performed in the WIU using a digital signal processing. Implementing a software receiver significantly reduces the complexity and the cost of the WIU. A wireless ultrasound tomography system is realized by interchanging the carrier frequencies so that the wireless transducers can take turn to serve as the actuator and sensors.

  18. Cascaded neural networks for sequenced propagation estimation, multiuser detection, and adaptive radio resource control of third-generation wireless networks for multimedia services

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    1999-03-01

    A hybrid neural network approach is presented to estimate radio propagation characteristics and multiuser interference and to evaluate their combined impact on throughput, latency and information loss in third-generation (3G) wireless networks. The latter three performance parameters influence the quality of service (QoS) for multimedia services under consideration for 3G networks. These networks, based on a hierarchical architecture of overlaying macrocells on top of micro- and picocells, are planned to operate in mobile urban and indoor environments with service demands emanating from circuit-switched, packet-switched and satellite-based traffic sources. Candidate radio interfaces for these networks employ a form of wideband CDMA in 5-MHz and wider-bandwidth channels, with possible asynchronous operation of the mobile subscribers. The proposed neural network (NN) architecture allocates network resources to optimize QoS metrics. Parameters of the radio propagation channel are estimated, followed by control of an adaptive antenna array at the base station to minimize interference, and then joint multiuser detection is performed at the base station receiver. These adaptive processing stages are implemented as a sequence of NN techniques that provide their estimates as inputs to a final- stage Kohonen self-organizing feature map (SOFM). The SOFM optimizes the allocation of available network resources to satisfy QoS requirements for variable-rate voice, data and video services. As the first stage of the sequence, a modified feed-forward multilayer perceptron NN is trained on the pilot signals of the mobile subscribers to estimate the parameters of shadowing, multipath fading and delays on the uplinks. A recurrent NN (RNN) forms the second stage to control base stations' adaptive antenna arrays to minimize intra-cell interference. The third stage is based on a Hopfield NN (HNN), modified to detect multiple users on the uplink radio channels to mitigate multiaccess interference, control carrier-sense multiple-access (CSMA) protocols, and refine call handoff procedures. In the final stage, the Kohonen SOFM, operating in a hybrid continuous and discrete space, adaptively allocates the resources of antenna-based cell sectorization, activity monitoring, variable-rate coding, power control, handoff and caller admission to meet user demands for various multimedia services at minimum QoS levels. The performance of the NN cascade is evaluated through simulation of a candidate 3G wireless network using W-CDMA parameters in a small-cell environment. The simulated network consists of a representative number of cells. Mobile users with typical movement patterns are assumed. QoS requirements for different classes of multimedia services are considered. The proposed method is shown to provide relatively low probability of new call blocking and handoff dropping, while maintaining efficient use of the network's radio resources.

  19. Formal specification and design techniques for wireless sensor and actuator networks.

    PubMed

    Martínez, Diego; González, Apolinar; Blanes, Francisco; Aquino, Raúl; Simo, José; Crespo, Alfons

    2011-01-01

    A current trend in the development and implementation of industrial applications is to use wireless networks to communicate the system nodes, mainly to increase application flexibility, reliability and portability, as well as to reduce the implementation cost. However, the nondeterministic and concurrent behavior of distributed systems makes their analysis and design complex, often resulting in less than satisfactory performance in simulation and test bed scenarios, which is caused by using imprecise models to analyze, validate and design these systems. Moreover, there are some simulation platforms that do not support these models. This paper presents a design and validation method for Wireless Sensor and Actuator Networks (WSAN) which is supported on a minimal set of wireless components represented in Colored Petri Nets (CPN). In summary, the model presented allows users to verify the design properties and structural behavior of the system.

  20. (abstract) Experimental Results From Internetworking Data Applications Over Various Wireless Networks Using a Single Flexible Error Control Protocol

    NASA Technical Reports Server (NTRS)

    Kanai, T.; Kramer, M.; McAuley, A. J.; Nowack, S.; Pinck, D. S.; Ramirez, G.; Stewart, I.; Tohme, H.; Tong, L.

    1995-01-01

    This paper describes results from several wireless field trials in New Jersey, California, and Colorado, conducted jointly by researchers at Bellcore, JPL, and US West over the course of 1993 and 1994. During these trials, applications communicated over multiple wireless networks including satellite, low power PCS, high power cellular, packet data, and the wireline Public Switched Telecommunications Network (PSTN). Key goals included 1) designing data applications and an API suited to mobile users, 2) investigating internetworking issues, 3) characterizing wireless networks under various field conditions, and 4) comparing the performance of different protocol mechanisms over the diverse networks and applications. We describe experimental results for different protocol mechanisms and parameters, such as acknowledgment schemes and packet sizes. We show the need for powerful error control mechanisms such as selective acknowledgements and combining data from multiple transmissions. We highlight the possibility of a common protocol for all wireless networks, from micro-cellular PCS to satellite networks.

  1. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    PubMed

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  2. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks †

    PubMed Central

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels. PMID:26131675

  3. Collecting and distributing wearable sensor data: an embedded personal area network to local area network gateway server.

    PubMed

    Neuhaeuser, Jakob; D'Angelo, Lorenzo T

    2013-01-01

    The goal of the concept and of the device presented in this contribution is to be able to collect sensor data from wearable sensors directly, automatically and wirelessly and to make them available over a wired local area network. Several concepts in e-health and telemedicine make use of portable and wearable sensors to collect movement or activity data. Usually these data are either collected via a wireless personal area network or using a connection to the user's smartphone. However, users might not carry smartphones on them while inside a residential building such as a nursing home or a hospital, but also within their home. Also, in such areas the use of other wireless communication technologies might be limited. The presented system is an embedded server which can be deployed in several rooms in order to ensure live data collection in bigger buildings. Also, the collection of data batches recorded out of range, as soon as a connection is established, is also possible. Both, the system concept and the realization are presented.

  4. Passive wireless tags for tongue controlled assistive technology interfaces.

    PubMed

    Rakibet, Osman O; Horne, Robert J; Kelly, Stephen W; Batchelor, John C

    2016-03-01

    Tongue control with low profile, passive mouth tags is demonstrated as a human-device interface by communicating values of tongue-tag separation over a wireless link. Confusion matrices are provided to demonstrate user accuracy in targeting by tongue position. Accuracy is found to increase dramatically after short training sequences with errors falling close to 1% in magnitude with zero missed targets. The rate at which users are able to learn accurate targeting with high accuracy indicates that this is an intuitive device to operate. The significance of the work is that innovative very unobtrusive, wireless tags can be used to provide intuitive human-computer interfaces based on low cost and disposable mouth mounted technology. With the development of an appropriate reading system, control of assistive devices such as computer mice or wheelchairs could be possible for tetraplegics and others who retain fine motor control capability of their tongues. The tags contain no battery and are intended to fit directly on the hard palate, detecting tongue position in the mouth with no need for tongue piercings.

  5. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    PubMed

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-06-29

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

  6. Detecting Intra-Fraction Motion in Patients Undergoing Radiation Treatment Using a Low-Cost Wireless Accelerometer

    PubMed Central

    Farahmand, Farid; Khadivi, Kevin O.; Rodrigues, Joel J. P. C.

    2009-01-01

    The utility of a novel, high-precision, non-intrusive, wireless, accelerometer-based patient orientation monitoring system (APOMS) in determining orientation change in patients undergoing radiation treatment is reported here. Using this system a small wireless accelerometer sensor is placed on a patient’s skin, broadcasting its orientation to the receiving station connected to a PC in the control area. A threshold-based algorithm is developed to identify the exact amount of the patient’s head orientation change. Through real-time measurements, an audible alarm can alert the radiation therapist if the user-defined orientation threshold is violated. Our results indicate that, in spite of its low-cost and simplicity, the APOMS is highly sensitive and offers accurate measurements. Furthermore, the APOMS is patient friendly, vendor neutral, and requires minimal user training. The versatile architecture of the APOMS makes it potentially suitable for variety of applications, including study of correlation between external and internal markers during Image-Guided Radiation Therapy (IGRT), with no major changes in hardware setup or algorithm. PMID:22423196

  7. Global ring satellite communications system for future broadband network

    NASA Astrophysics Data System (ADS)

    Iida, Takashi; Suzuki, Yoshiaki; Arimoto, Yoshinori; Akaishi, Akira

    2005-04-01

    The purpose of this paper is to examine a cost model of a global ring satellite communications system as a 2G-satellite (second generation Internet satellite) for the future Internet satellite, whose capacity is around 120 Gbps. The authors proposed the future needs of research and development of communications satellite for the next 30 years and also proposed the approach of three generations for the future Internet satellites. First, the paper reviews and updates the original proposal for the future needs of communications satellite, considering the recent development of the quantum communication technology. It also examines the communications satellite applicability for bridging the digital divide in the Asia-Oceania as an example. The paper clarifies this possibility of communications satellite by showing various relationships among Internet penetration, land area, population growth, etc. Second, the cost of the global ring satellite is examined. The user terminal is considered as a combination of an earth terminal and wireless local area network for a user community. This paper shows that the global ring satellite has a possibility of a good cost-competitiveness to the terrestrial system because of the global communications system can be configured only by satellite system.

  8. Emerging Communication Technologies (ECT) Phase 3 Final Report

    NASA Technical Reports Server (NTRS)

    Bastin, Gary L.; Harris, William G.; Bates, Lakesha D.; Nelson, Richard A.

    2004-01-01

    The Emerging Communication Technology (ECT) project investigated three First Mile communication technologies in support of NASA s Second Generation Reusable Launch Vehicle (2nd Gen RLV), Orbital Space Plane, Advanced Range Technology Working Group (ARTWG) and the Advanced Spaceport Technology Working Group (ASTWG). These First Mile technologies have the purpose of interconnecting mobile users with existing Range Communication infrastructures. ECT was a continuation of the Range Information System Management (RISM) task started in 2002. RISM identified the three advance communication technologies investigated under ECT. These were Wireless Ethernet (Wi-Fi), Free Space Optics (FSO), and Ultra Wideband (UWB). Due to the report s size, it has been broken into three volumes: 1) Main Report 2) Appendices 3) UWB.

  9. Intercluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding

    NASA Astrophysics Data System (ADS)

    Chen, Xianfu; Zhao, Zhifeng; Jiang, Tao; Grace, David; Zhang, Honggang

    2009-12-01

    Cognitive wireless mesh networks have great flexibility to improve spectrum resource utilization, within which secondary users (SUs) can opportunistically access the authorized frequency bands while being complying with the interference constraint as well as the QoS (Quality-of-Service) requirement of primary users (PUs). In this paper, we consider intercluster connection between the neighboring clusters under the framework of cognitive wireless mesh networks. Corresponding to the collocated clusters, data flow which includes the exchanging of control channel messages usually needs four time slots in traditional relaying schemes since all involved nodes operate in half-duplex mode, resulting in significant bandwidth efficiency loss. The situation is even worse at the gateway node connecting the two colocated clusters. A novel scheme based on network coding is proposed in this paper, which needs only two time slots to exchange the same amount of information mentioned above. Our simulation shows that the network coding-based intercluster connection has the advantage of higher bandwidth efficiency compared with the traditional strategy. Furthermore, how to choose an optimal relaying transmission power level at the gateway node in an environment of coexisting primary and secondary users is discussed. We present intelligent approaches based on reinforcement learning to solve the problem. Theoretical analysis and simulation results both show that the intelligent approaches can achieve optimal throughput for the intercluster relaying in the long run.

  10. The wireless Web and patient care.

    PubMed

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  11. Research on dynamic routing mechanisms in wireless sensor networks.

    PubMed

    Zhao, A Q; Weng, Y N; Lu, Y; Liu, C Y

    2014-01-01

    WirelessHART is the most widely applied standard in wireless sensor networks nowadays. However, it does not provide any dynamic routing mechanism, which is important for the reliability and robustness of the wireless network applications. In this paper, a collection tree protocol based, dynamic routing mechanism was proposed for WirelessHART network. The dynamic routing mechanism was evaluated through several simulation experiments in three aspects: time for generating the topology, link quality, and stability of network. Besides, the data transmission efficiency of this routing mechanism was analyzed. The simulation and evaluation results show that this mechanism can act as a dynamic routing mechanism for the TDMA-based wireless sensor network.

  12. 75 FR 82026 - Granting of Request for Early Termination of the Waiting Period Under the Premerger Notification...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ..., LLC. 20110313 G News Corporation. G Wireless Generation, Inc. G Wireless Generation, Inc. 08-DEC-10.... G Exxon Mobil Corporation. G Mobile Eugene Island Pipeline Company. G Exxon Mobil Pipeline Company. G Mobil Oil Exploration & Producing Southeast Inc. 20110256 G Humana Inc. G Welsh, Carson, Anderson...

  13. Towards Situation Driven Mobile Tutoring System for Learning Languages and Communication Skills: Application to Users with Specific Needs

    ERIC Educational Resources Information Center

    Khemaja, Maha; Taamallah, Aroua

    2016-01-01

    Current advances in portable devices and wireless technologies had drastically impacted mobile and pervasive computing development and use. Nowadays, mobile and or pervasive applications, are increasingly being used to support users' everyday activities. These apps either distributed or standalone are characterized by the variability of the…

  14. Public Key Infrastructure Utilization to Provide an Added Level of Authenticity to Transmitted Data

    DTIC Science & Technology

    2010-03-01

    WIFI Wireless Fidelity – a trademark of the Wi-Fi Alliance that manufacturers may use to brand certified products that belong to a class of...removed by the receiving computer. This security concept is applicable for any WIFI or EVDO wireless transmitted computer because only the end users... hacked and keeping the computer safe from outside sources was still a definite concern. Therefore, a non-Hotmail e-mail account was designed

  15. Research and Design of Embedded Wireless Meal Ordering System Based on SQLite

    NASA Astrophysics Data System (ADS)

    Zhang, Jihong; Chen, Xiaoquan

    The paper describes features and internal architecture and developing method of SQLite. And then it gives a design and program of meal ordering system. The system realizes the information interaction among the users and embedded devices with SQLite as database system. The embedded database SQLite manages the data and achieves wireless communication by using Bluetooth. A system program based on Qt/Embedded and Linux drivers realizes the local management of environmental data.

  16. A phone-assistive device based on Bluetooth technology for cochlear implant users.

    PubMed

    Qian, Haifeng; Loizou, Philipos C; Dorman, Michael F

    2003-09-01

    Hearing-impaired people, and particularly hearing-aid and cochlear-implant users, often have difficulty communicating over the telephone. The intelligibility of telephone speech is considerably lower than the intelligibility of face-to-face speech. This is partly because of lack of visual cues, limited telephone bandwidth, and background noise. In addition, cellphones may cause interference with the hearing aid or cochlear implant. To address these problems that hearing-impaired people experience with telephones, this paper proposes a wireless phone adapter that can be used to route the audio signal directly to the hearing aid or cochlear implant processor. This adapter is based on Bluetooth technology. The favorable features of this new wireless technology make the adapter superior to traditional assistive listening devices. A hardware prototype was built and software programs were written to implement the headset profile in the Bluetooth specification. Three cochlear implant users were tested with the proposed phone-adapter and reported good speech quality.

  17. Long-range wireless mesh network for weather monitoring in unfriendly geographic conditions.

    PubMed

    Toledano-Ayala, Manuel; Herrera-Ruiz, Gilberto; Soto-Zarazúa, Genaro M; Rivas-Araiza, Edgar A; Bazán Trujillo, Rey D; Porrás-Trejo, Rafael E

    2011-01-01

    In this paper a long-range wireless mesh network system is presented. It consists of three main parts: Remote Terminal Units (RTUs), Base Terminal Units (BTUs) and a Central Server (CS). The RTUs share a wireless network transmitting in the industrial, scientific and medical applications ISM band, which reaches up to 64 Km in a single point-to-point communication. A BTU controls the traffic within the network and has as its main task interconnecting it to a Ku-band satellite link using an embedded microcontroller-based gateway. Collected data is stored in a CS and presented to the final user in a numerical and a graphical form in a web portal.

  18. Security Issues in mGovernment

    NASA Astrophysics Data System (ADS)

    Kumar, Manish; Hanumanthappa, M.; Reddy, Bhavanam Lakshma

    E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.

  19. Inductor-Free Wireless Energy Delivery via Maxwell's Displacement Current from an Electrodeless Triboelectric Nanogenerator.

    PubMed

    Cao, Xia; Zhang, Meng; Huang, Jinrong; Jiang, Tao; Zou, Jingdian; Wang, Ning; Wang, Zhong Lin

    2018-02-01

    Wireless power delivery has been a dream technology for applications in medical science, security, radio frequency identification (RFID), and the internet of things, and is usually based on induction coils and/or antenna. Here, a new approach is demonstrated for wireless power delivery by using the Maxwell's displacement current generated by an electrodeless triboelectric nanogenerator (TENG) that directly harvests ambient mechanical energy. A rotary electrodeless TENG is fabricated using the contact and sliding mode with a segmented structure. Due to the leakage of electric field between the segments during relative rotation, the generated Maxwell's displacement current in free space is collected by metal collectors. At a gap distance of 3 cm, the output wireless current density and voltage can reach 7 µA cm -2 and 65 V, respectively. A larger rotary electrodeless TENG and flexible wearable electrodeless TENG are demonstrated to power light-emitting diodes (LEDs) through wireless energy delivery. This innovative discovery opens a new avenue for noncontact, wireless energy transmission for applications in portable and wearable electronics. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Wireless Microphone Users Interference Protection Act

    THOMAS, 111th Congress

    Rep. Rush, Bobby L. [D-IL-1

    2009-12-16

    House - 12/19/2009 Referred to the Subcommittee on Communications, Technology, and the Internet. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Formal Specification and Design Techniques for Wireless Sensor and Actuator Networks

    PubMed Central

    Martínez, Diego; González, Apolinar; Blanes, Francisco; Aquino, Raúl; Simo, José; Crespo, Alfons

    2011-01-01

    A current trend in the development and implementation of industrial applications is to use wireless networks to communicate the system nodes, mainly to increase application flexibility, reliability and portability, as well as to reduce the implementation cost. However, the nondeterministic and concurrent behavior of distributed systems makes their analysis and design complex, often resulting in less than satisfactory performance in simulation and test bed scenarios, which is caused by using imprecise models to analyze, validate and design these systems. Moreover, there are some simulation platforms that do not support these models. This paper presents a design and validation method for Wireless Sensor and Actuator Networks (WSAN) which is supported on a minimal set of wireless components represented in Colored Petri Nets (CPN). In summary, the model presented allows users to verify the design properties and structural behavior of the system. PMID:22344203

  2. The Myth of Spatial Reuse with Directional Antennas in Indoor Wireless Networks

    NASA Astrophysics Data System (ADS)

    Lakshmanan, Sriram; Sundaresan, Karthikeyan; Rangarajan, Sampath; Sivakumar, Raghupathy

    Interference among co-channel users is a fundamental problem in wireless networks, which prevents nearby links from operating concurrently. Directional antennas allow the radiation patterns of wireless transmitters to be shaped to form directed beams. Conventionally, such beams are assumed to improve the spatial reuse (i.e. concurrency) in indoor wireless networks. In this paper, we use experiments in an indoor office setting of Wifi Access points equipped with directional antennas, to study their potential for interference mitigation and spatial reuse. In contrast to conventional wisdom, we observe that the interference mitigation benefits of directional antennas are minimal. On analyzing our experimental traces we observe that directional links do not reduce interference to nearby links due to the lack of signal confinement due to indoor multipath fading. We then use the insights derived from our study to develop an alternative approach that provides better interference reduction in indoor networks compared to directional links.

  3. Design and evaluation of a telemonitoring concept based on NFC-enabled mobile phones and sensor devices.

    PubMed

    Morak, Jürgen; Kumpusch, Hannes; Hayn, Dieter; Modre-Osprian, Robert; Schreier, Günter

    2012-01-01

    Utilization of information and communication technologies such as mobile phones and wireless sensor networks becomes more and more common in the field of telemonitoring for chronic diseases. Providing elderly people with a mobile-phone-based patient terminal requires a barrier-free design of the overall user interface including the setup of wireless communication links to sensor devices. To easily manage the connection between a mobile phone and wireless sensor devices, a concept based on the combination of Bluetooth and near-field communication technology has been developed. It allows us initiating communication between two devices just by bringing them close together for a few seconds without manually configuring the communication link. This concept has been piloted with a sensor device and evaluated in terms of usability and feasibility. Results indicate that this solution has the potential to simplify the handling of wireless sensor networks for people with limited technical skills.

  4. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  5. Wireless Sensing System Using Open-circuit, Electrically-conductive Spiral-trace Sensor

    NASA Technical Reports Server (NTRS)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2013-01-01

    A wireless sensing system includes a sensor made from an electrical conductor shaped to form an open-circuit, electrically-conductive spiral trace having inductance and capacitance. In the presence of a time-varying magnetic field, the sensor resonates to generate a harmonic response having a frequency, amplitude and bandwidth. A magnetic field response recorder wirelessly transmits the time-varying magnetic field to the sensor and wirelessly detects the sensor's response frequency, amplitude and bandwidth.

  6. Real-time Integration of Biological, Optical and Physical Oceanographic Data from Multiple Vessels and Nearshore Sites using a Wireless Network

    DTIC Science & Technology

    1997-09-30

    field experiments in Puget Sound . Each research vessel will use multi- sensor profiling instrument packages which obtain high-resolution physical...field deployment of the wireless network is planned for May-July, 1998, at Orcas Island, WA. IMPACT We expect that wireless communication systems will...East Sound project to be a first step toward continental shelf and open ocean deployments with the next generation of wireless and satellite

  7. Game-theoretic approach for improving cooperation in wireless multihop networks.

    PubMed

    Ng, See-Kee; Seah, Winston K G

    2010-06-01

    Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehavior problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. However, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power, and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this paper, pricing, promiscuous listening, and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts, and packet acknowledgments under a lossy wireless multihop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. We also provide a proof of the viability of the model under a theoretical wireless environment. Finally, we show how the model can be applied to design a generic protocol which we call the Selfishness Resilient Resource Reservation protocol, and validate the effectiveness of this protocol in ensuring cooperation using simulations.

  8. A fuzzy call admission control scheme in wireless networks

    NASA Astrophysics Data System (ADS)

    Ma, Yufeng; Gong, Shenguang; Hu, Xiulin; Zhang, Yunyu

    2007-11-01

    Scarcity of the spectrum resource and mobility of users make quality of service (QoS) provision a critical issue in wireless networks. This paper presents a fuzzy call admission control scheme to meet the requirement of the QoS. A performance measure is formed as a weighted linear function of new call and handoff call blocking probabilities. Simulation compares the proposed fuzzy scheme with an adaptive channel reservation scheme. Simulation results show that fuzzy scheme has a better robust performance in terms of average blocking criterion.

  9. Bluetooth based function control in a car

    NASA Astrophysics Data System (ADS)

    Karthikeyan, P.; Sumanth, N.; Jude, S.

    2017-11-01

    This paper aims to show the various functions that can be controlled in a Car using the Wireless Bluetooth Technology. Due to the portable and wireless nature of this technology, it is easier for the end user to operate the functions in a car. The functions that are built into the system can be used from a distance of 10 meters. The Passive Keyless System and the Remote Keyless System methodologies are adopted. These are operated by the ATMEGA328P microcontroller.

  10. A Clock Fingerprints-Based Approach for Wireless Transmitter Identification

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan

    Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.

  11. Robot Tracer with Visual Camera

    NASA Astrophysics Data System (ADS)

    Jabbar Lubis, Abdul; Dwi Lestari, Yuyun; Dafitri, Haida; Azanuddin

    2017-12-01

    Robot is a versatile tool that can function replace human work function. The robot is a device that can be reprogrammed according to user needs. The use of wireless networks for remote monitoring needs can be utilized to build a robot that can be monitored movement and can be monitored using blueprints and he can track the path chosen robot. This process is sent using a wireless network. For visual robot using high resolution cameras to facilitate the operator to control the robot and see the surrounding circumstances.

  12. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  13. Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations

    DTIC Science & Technology

    2011-03-01

    leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  14. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  15. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  16. Economic Feasibility of Wireless Sensor Network-Based Service Provision in a Duopoly Setting with a Monopolist Operator.

    PubMed

    Sanchis-Cano, Angel; Romero, Julián; Sacoto-Cabrera, Erwin J; Guijarro, Luis

    2017-11-25

    We analyze the feasibility of providing Wireless Sensor Network-data-based services in an Internet of Things scenario from an economical point of view. The scenario has two competing service providers with their own private sensor networks, a network operator and final users. The scenario is analyzed as two games using game theory. In the first game, sensors decide to subscribe or not to the network operator to upload the collected sensing-data, based on a utility function related to the mean service time and the price charged by the operator. In the second game, users decide to subscribe or not to the sensor-data-based service of the service providers based on a Logit discrete choice model related to the quality of the data collected and the subscription price. The sinks and users subscription stages are analyzed using population games and discrete choice models, while network operator and service providers pricing stages are analyzed using optimization and Nash equilibrium concepts respectively. The model is shown feasible from an economic point of view for all the actors if there are enough interested final users and opens the possibility of developing more efficient models with different types of services.

  17. Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks

    PubMed Central

    Jurdak, Raja; Nafaa, Abdelhamid; Barbirato, Alessio

    2008-01-01

    Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales. A central challenge to environmental monitoring applications of sensor networks is the short communication range of the sensor nodes, which increases the complexity and cost of monitoring commodities that are located in geographically spread areas. To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing sensed information in an integrated manner. Our architecture adopts a holistic approach targeted at improving the user experience by optimizing the system performance for handling data that originates at the sensors, traverses the mesh network, and resides at the server for user consumption. This holistic approach enables users to set high level policies that can adapt the resolution of information collected at the sensors, set the preferred performance targets for their application, and run a wide range of queries and analysis on both real-time and historical data. All system components and processes will be described in this paper. PMID:27873941

  18. Simultaneous transmission of wired and wireless signals based on double sideband carrier suppression

    NASA Astrophysics Data System (ADS)

    Bitew, Mekuanint Agegnehu; Shiu, Run-Kai; Peng, Peng-Chun; Wang, Cheng-Hao; Chen, Yan-Ming

    2017-11-01

    In this paper, we proposed and experimentally demonstrated simultaneous transmission of wired and wireless signals based on double sideband optical carrier suppression. By properly adjusting the bias point of the dual-output mach-zehnder modulator (MZM), a central carrier in one output port and a pair of first-order sidebands in another output port are generated. The pair of first-order sidebands are fed into a second MZM to generate second-order order sidebands. A wired signal is embedded on the central carrier while a wireless signal is embedded on the second-order sidebands. Unlike other schemes, we did not use optical filter to separate the carrier from the optical sidebands. The measured bit error rate (BER) and eye-diagrams after a 25 km single-mode-fiber (SMF) transmission proved that the proposed scheme is successful for both wired and wireless signals transmission. Moreover, the power penalty at the BER of 10-9 is 0.3 and 0.7 dB for wired and wireless signals, respectively.

  19. Experimental validation of wireless communication with chaos.

    PubMed

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  20. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

    PubMed Central

    Sampangi, Raghav V.; Sampalli, Srinivas

    2015-01-01

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899

  1. Experimental validation of wireless communication with chaos

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S.; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  2. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    PubMed

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  3. Experimental validation of wireless communication with chaos

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and anmore » integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.« less

  4. Energy Autonomous Wireless Sensing System Enabled by Energy Generated during Human Walking

    NASA Astrophysics Data System (ADS)

    Kuang, Yang; Ruan, Tingwen; Chew, Zheng Jun; Zhu, Meiling

    2016-11-01

    Recently, there has been a huge amount of work devoted to wearable energy harvesting (WEH) in a bid to establish energy autonomous wireless sensing systems for a range of health monitoring applications. However, limited work has been performed to implement and test such systems in real-world settings. This paper reports the development and real-world characterisation of a magnetically plucked wearable knee-joint energy harvester (Mag-WKEH) powered wireless sensing system, which integrates our latest research progresses in WEH, power conditioning and wireless sensing to achieve high energy efficiency. Experimental results demonstrate that with walking speeds of 3∼7 km/h, the Mag-WKEH generates average power of 1.9∼4.5 mW with unnoticeable impact on the wearer and is able to power the wireless sensor node (WSN) with three sensors to work at duty cycles of 6.6%∼13%. In each active period of 2 s, the WSN is able to measure and transmit 482 readings to the base station.

  5. Design of a Wireless Sensor Network Platform for Tele-Homecare

    PubMed Central

    Chung, Yu-Fang; Liu, Chia-Hui

    2013-01-01

    The problem of an ageing population has become serious in the past few years as the degeneration of various physiological functions has resulted in distinct chronic diseases in the elderly. Most elderly are not willing to leave home for healthcare centers, but caring for patients at home eats up caregiver resources, and can overwhelm patients' families. Besides, a lot of chronic disease symptoms cause the elderly to visit hospitals frequently. Repeated examinations not only exhaust medical resources, but also waste patients' time and effort. To make matters worse, this healthcare system does not actually appear to be effective as expected. In response to these problems, a wireless remote home care system is designed in this study, where ZigBee is used to set up a wireless network for the users to take measurements anytime and anywhere. Using suitable measuring devices, users' physiological signals are measured, and their daily conditions are monitored by various sensors. Being transferred through ZigBee network, vital signs are analyzed in computers which deliver distinct alerts to remind the users and the family of possible emergencies. The system could be further combined with electric appliances to remotely control the users' environmental conditions. The environmental monitoring function can be activated to transmit in real time dynamic images of the cared to medical personnel through the video function when emergencies occur. Meanwhile, in consideration of privacy, the video camera would be turned on only when it is necessary. The caregiver could adjust the angle of camera to a proper position and observe the current situation of the cared when a sensor on the cared or the environmental monitoring system detects exceptions. All physiological data are stored in the database for family enquiries or accurate diagnoses by medical personnel. PMID:24351630

  6. Design of a wireless sensor network platform for tele-homecare.

    PubMed

    Chung, Yu-Fang; Liu, Chia-Hui

    2013-12-12

    The problem of an ageing population has become serious in the past few years as the degeneration of various physiological functions has resulted in distinct chronic diseases in the elderly. Most elderly are not willing to leave home for healthcare centers, but caring for patients at home eats up caregiver resources, and can overwhelm patients' families. Besides, a lot of chronic disease symptoms cause the elderly to visit hospitals frequently. Repeated examinations not only exhaust medical resources, but also waste patients' time and effort. To make matters worse, this healthcare system does not actually appear to be effective as expected. In response to these problems, a wireless remote home care system is designed in this study, where ZigBee is used to set up a wireless network for the users to take measurements anytime and anywhere. Using suitable measuring devices, users' physiological signals are measured, and their daily conditions are monitored by various sensors. Being transferred through ZigBee network, vital signs are analyzed in computers which deliver distinct alerts to remind the users and the family of possible emergencies. The system could be further combined with electric appliances to remotely control the users' environmental conditions. The environmental monitoring function can be activated to transmit in real time dynamic images of the cared to medical personnel through the video function when emergencies occur. Meanwhile, in consideration of privacy, the video camera would be turned on only when it is necessary. The caregiver could adjust the angle of camera to a proper position and observe the current situation of the cared when a sensor on the cared or the environmental monitoring system detects exceptions. All physiological data are stored in the database for family enquiries or accurate diagnoses by medical personnel.

  7. Initial animal studies of a wireless, batteryless, MEMS implant for cardiovascular applications.

    PubMed

    Najafi, Nader; Ludomirsky, Achiau

    2004-03-01

    This paper reports the results of the initial animal studies of a wireless, batteryless, implantable pressure sensor using microelectromechanical systems (MEMS) technology. The animal studies were acute and proved the functional feasibility of using MEMS technology for wireless bio sensing. The results are very encouraging and surpassed the majority of the application's requirements, including high sampling speed and high resolution. Based on the lessons learned, second generation wireless sensors are being developed that will provide total system solution.

  8. Comparing Web and Touch Screen Transaction Log Files

    PubMed Central

    Huntington, Paul; Williams, Peter

    2001-01-01

    Background Digital health information is available on a wide variety of platforms including PC-access of the Internet, Wireless Application Protocol phones, CD-ROMs, and touch screen public kiosks. All these platforms record details of user sessions in transaction log files, and there is a growing body of research into the evaluation of this data. However, there is very little research that has examined the problems of comparing the transaction log files of kiosks and the Internet. Objectives To provide a first step towards examining the problems of comparing the transaction log files of kiosks and the Internet. Methods We studied two platforms: touch screen kiosks and a comparable Web site. For both of these platforms, we examined the menu structure (which affects transaction log file data), the log-file structure, and the metrics derived from log-file records. Results We found substantial differences between the generated metrics. Conclusions None of the metrics discussed can be regarded as an effective way of comparing the use of kiosks and Web sites. Two metrics stand out as potentially comparable and valuable: the number of user sessions per hour and user penetration of pages. PMID:11720960

  9. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular

    PubMed Central

    Okasaka, Shozo; Weiler, Richard J.; Keusgen, Wilhelm; Pudeyev, Andrey; Maltsev, Alexander; Karls, Ingolf; Sakaguchi, Kei

    2016-01-01

    The fifth-generation mobile networks (5G) will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave) spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet) architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP) and user plane (UP) will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC) was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access. PMID:27571074

  10. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular.

    PubMed

    Okasaka, Shozo; Weiler, Richard J; Keusgen, Wilhelm; Pudeyev, Andrey; Maltsev, Alexander; Karls, Ingolf; Sakaguchi, Kei

    2016-08-25

    The fifth-generation mobile networks (5G) will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave) spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet) architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP) and user plane (UP) will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC) was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.

  11. Wireless local area network in a prehospital environment

    PubMed Central

    Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F

    2004-01-01

    Background Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management. PMID:15339336

  12. Wireless local area network in a prehospital environment.

    PubMed

    Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F

    2004-08-31

    Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  13. Design and implementation of a wireless (Bluetooth) four channel bio-instrumentation amplifier and digital data acquisition device with user-selectable gain, frequency, and driven reference.

    PubMed

    Cosmanescu, Alin; Miller, Benjamin; Magno, Terence; Ahmed, Assad; Kremenic, Ian

    2006-01-01

    A portable, multi-purpose Bio-instrumentation Amplifier and Data AcQuisition device (BADAQ) capable of measuring and transmitting EMG and EKG signals wirelessly via Bluetooth is designed and implemented. Common topologies for instrumentation amplifiers and filters are used and realized with commercially available, low-voltage, high precision operational amplifiers. An 8-bit PIC microcontroller performs 10-bit analog-to-digital conversion of the amplified and filtered signals and controls a Bluetooth transceiver capable of wirelessly transmitting the data to any Bluetooth enabled device. Electrical isolation between patient/subject, circuitry, and ancillary equipment is achieved by optocoupling components. The design focuses on simplicity, portability, and affordability.

  14. Design of indoor temperature and humidity detection system based on single chip microcomputer

    NASA Astrophysics Data System (ADS)

    Fu, Xiuwei; Fu, Li; Ma, Tianhui

    2018-03-01

    The indoor temperature and humidity detection system based on STC15F2K60S2 is designed in this paper. The temperature and humidity sensor DHT22 to monitor the indoor temperature and humidity are used, and the temperature and humidity data to the user's handheld device are wirelessly transmitted, when the temperature reaches or exceeds the user set the temperature alarm value, and the system sound and light alarm, to remind the user.

  15. How Effective is Routing for Wireless Networking

    DTIC Science & Technology

    2016-03-05

    Routing (LAR) [31]. The basic mechanism of how link-based routing schemes operate is as follows: a user broadcasts a control message (called a “ hello ...to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between them. Routes are then be...description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is counted. A cost is then

  16. Wireless control of powered wheelchairs with tongue motion using tongue drive assistive technology.

    PubMed

    Huo, Xueliang; Wang, Jia; Ghovanloo, Maysam

    2008-01-01

    Tongue Drive system (TDS) is a tongue-operated unobtrusive wireless assistive technology, which can potentially provide people with severe disabilities with effective computer access and environment control. It translates users' intentions into control commands by detecting and classifying their voluntary tongue motion utilizing a small permanent magnet, secured on the tongue, and an array of magnetic sensors mounted on a headset outside the mouth or an orthodontic brace inside. We have developed customized interface circuitry and implemented four control strategies to drive a powered wheelchair (PWC) using an external TDS prototype. The system has been evaluated by five able-bodied human subjects. The results showed that all subjects could easily operate the PWC using their tongue movements, and different control strategies worked better depending on the users' familiarity with the TDS.

  17. Optimal Energy Efficiency Fairness of Nodes in Wireless Powered Communication Networks.

    PubMed

    Zhang, Jing; Zhou, Qingjie; Ng, Derrick Wing Kwan; Jo, Minho

    2017-09-15

    In wireless powered communication networks (WPCNs), it is essential to research energy efficiency fairness in order to evaluate the balance of nodes for receiving information and harvesting energy. In this paper, we propose an efficient iterative algorithm for optimal energy efficiency proportional fairness in WPCN. The main idea is to use stochastic geometry to derive the mean proportionally fairness utility function with respect to user association probability and receive threshold. Subsequently, we prove that the relaxed proportionally fairness utility function is a concave function for user association probability and receive threshold, respectively. At the same time, a sub-optimal algorithm by exploiting alternating optimization approach is proposed. Through numerical simulations, we demonstrate that our sub-optimal algorithm can obtain a result close to optimal energy efficiency proportional fairness with significant reduction of computational complexity.

  18. Optimal Energy Efficiency Fairness of Nodes in Wireless Powered Communication Networks

    PubMed Central

    Zhou, Qingjie; Ng, Derrick Wing Kwan; Jo, Minho

    2017-01-01

    In wireless powered communication networks (WPCNs), it is essential to research energy efficiency fairness in order to evaluate the balance of nodes for receiving information and harvesting energy. In this paper, we propose an efficient iterative algorithm for optimal energy efficiency proportional fairness in WPCN. The main idea is to use stochastic geometry to derive the mean proportionally fairness utility function with respect to user association probability and receive threshold. Subsequently, we prove that the relaxed proportionally fairness utility function is a concave function for user association probability and receive threshold, respectively. At the same time, a sub-optimal algorithm by exploiting alternating optimization approach is proposed. Through numerical simulations, we demonstrate that our sub-optimal algorithm can obtain a result close to optimal energy efficiency proportional fairness with significant reduction of computational complexity. PMID:28914818

  19. Development of an indoor location based service test bed and geographic information system with a wireless sensor network.

    PubMed

    Jan, Shau-Shiun; Hsu, Li-Ta; Tsai, Wen-Ming

    2010-01-01

    In order to provide the seamless navigation and positioning services for indoor environments, an indoor location based service (LBS) test bed is developed to integrate the indoor positioning system and the indoor three-dimensional (3D) geographic information system (GIS). A wireless sensor network (WSN) is used in the developed indoor positioning system. Considering the power consumption, in this paper the ZigBee radio is used as the wireless protocol, and the received signal strength (RSS) fingerprinting positioning method is applied as the primary indoor positioning algorithm. The matching processes of the user location include the nearest neighbor (NN) algorithm, the K-weighted nearest neighbors (KWNN) algorithm, and the probabilistic approach. To enhance the positioning accuracy for the dynamic user, the particle filter is used to improve the positioning performance. As part of this research, a 3D indoor GIS is developed to be used with the indoor positioning system. This involved using the computer-aided design (CAD) software and the virtual reality markup language (VRML) to implement a prototype indoor LBS test bed. Thus, a rapid and practical procedure for constructing a 3D indoor GIS is proposed, and this GIS is easy to update and maintenance for users. The building of the Department of Aeronautics and Astronautics at National Cheng Kung University in Taiwan is used as an example to assess the performance of various algorithms for the indoor positioning system.

  20. Development of an Indoor Location Based Service Test Bed and Geographic Information System with a Wireless Sensor Network

    PubMed Central

    Jan, Shau-Shiun; Hsu, Li-Ta; Tsai, Wen-Ming

    2010-01-01

    In order to provide the seamless navigation and positioning services for indoor environments, an indoor location based service (LBS) test bed is developed to integrate the indoor positioning system and the indoor three-dimensional (3D) geographic information system (GIS). A wireless sensor network (WSN) is used in the developed indoor positioning system. Considering the power consumption, in this paper the ZigBee radio is used as the wireless protocol, and the received signal strength (RSS) fingerprinting positioning method is applied as the primary indoor positioning algorithm. The matching processes of the user location include the nearest neighbor (NN) algorithm, the K-weighted nearest neighbors (KWNN) algorithm, and the probabilistic approach. To enhance the positioning accuracy for the dynamic user, the particle filter is used to improve the positioning performance. As part of this research, a 3D indoor GIS is developed to be used with the indoor positioning system. This involved using the computer-aided design (CAD) software and the virtual reality markup language (VRML) to implement a prototype indoor LBS test bed. Thus, a rapid and practical procedure for constructing a 3D indoor GIS is proposed, and this GIS is easy to update and maintenance for users. The building of the Department of Aeronautics and Astronautics at National Cheng Kung University in Taiwan is used as an example to assess the performance of various algorithms for the indoor positioning system. PMID:22319282

  1. Designing wireless sensor networks for hydrological and water resource applications: A purpose-oriented approach

    NASA Astrophysics Data System (ADS)

    Mao, F.; Hannah, D. M.; Krause, S.; Clark, J.; Buytaert, W.; Ochoa-Tocachi, B. F.

    2017-12-01

    There have been a growing number of studies using low-cost wireless sensor networks (LCWSNs) in hydrology and water resources fields. By reviewing the development of sensing and wireless communication technologies, as well as the recent relevant projects and applications, we observe that the challenges in applying LCWSNs have been moving beyond technical aspects. The large pool of available low-cost network modules, such as Arduino, Raspberry Pi, Xbee and inexpensive sensors, enable us to assemble networks rather than building them from scratch. With a wide variety of costs, functions and features, these modules support customisation of hydrological monitoring network for different user groups and purposes. Therefore, more attentions are needed to be placed on how to better design tailored LCWSNs with current technologies that create more added value for users. To address this challenge, this research proposes a tool-box for what we term `purpose-oriented' LCWSN. We identify the main LCWSN application scenarios from literature, and compare them from three perspectives including (1) the major stakeholders in each scenario, (2) the purposes for stakeholders, and (3) the network technologies and settings that meet the purposes. Notably, this innovative approach designs LCWSNs for different scenarios with considerations of not only technologies, but also stakeholders and purposes that are related to the usability, maintenance and social sustainability of networks. We conclude that this new, purpose-orientated approach can further release the potential of hydrological and water resources LCWSNs to maximise benefits for users and wider society.

  2. Game-theoretic approach to joint transmitter adaptation and power control in wireless systems.

    PubMed

    Popescu, Dimitrie C; Rawat, Danda B; Popescu, Otilia; Saquib, Mohamad

    2010-06-01

    Game theory has emerged as a new mathematical tool in the analysis and design of wireless communication systems, being particularly useful in studying the interactions among adaptive transmitters that attempt to achieve specific objectives without cooperation. In this paper, we present a game-theoretic approach to the problem of joint transmitter adaptation and power control in wireless systems, where users' transmissions are subject to quality-of-service requirements specified in terms of target signal-to-interference-plus-noise ratios (SINRs) and nonideal vector channels between transmitters and receivers are explicitly considered. Our approach is based on application of separable games, which are a specific class of noncooperative games where the players' cost is a separable function of their strategic choices. We formally state a joint codeword and power adaptation game, which is separable, and we study its properties in terms of its subgames, namely, the codeword adaptation subgame and the power adaptation subgame. We investigate the necessary conditions for an optimal Nash equilibrium and show that this corresponds to an ensemble of user codewords and powers, which maximizes the sum capacity of the corresponding multiaccess vector channel model, and for which the specified target SINRs are achieved with minimum transmitted power.

  3. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  4. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  5. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    PubMed Central

    Moon, Jaegeun; Jung, Im Y.; Yoo, Jaesoo

    2017-01-01

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users. PMID:28368341

  6. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    PubMed

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  7. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    PubMed

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  8. FBMC receiver for multi-user asynchronous transmission on fragmented spectrum

    NASA Astrophysics Data System (ADS)

    Doré, Jean-Baptiste; Berg, Vincent; Cassiau, Nicolas; Kténas, Dimitri

    2014-12-01

    Relaxed synchronization and access to fragmented spectrum are considered for future generations of wireless networks. Frequency division multiple access for filter bank multicarrier (FBMC) modulation provides promising performance without strict synchronization requirements contrary to conventional orthogonal frequency division multiplexing (OFDM). The architecture of a FBMC receiver suitable for this scenario is considered. Carrier frequency offset (CFO) compensation is combined with intercarrier interference (ICI) cancellation and performs well under very large frequency offsets. Channel estimation and interpolation had to be adapted and proved effective even for heavily fragmented spectrum usage. Channel equalization can sustain large delay spread. Because all the receiver baseband signal processing functionalities are proposed in the frequency domain, the overall architecture is suitable for multiuser asynchronous transmission on fragmented spectrum.

  9. Emerging Communication Technologies (ECT) Phase 2 Report. Volume 2; Appendices

    NASA Technical Reports Server (NTRS)

    Bastin, Gary L.; Harris, William G.; Chiodini, Robert; Nelson, Richard A.; Huang, PoTien; Kruhm, David A.

    2003-01-01

    The Emerging Communication Technology (ECT) project investigated three First Mile communication technologies in support of NASA s Second Generation Reusable Launch Vehicle (2nd Gen RLV), Orbital Space Plane, Advanced Range Technology Working Group (ARTWG) and the Advanced Spaceport Technology Working Group (ASTWG). These First Mile technologies have the purpose of interconnecting mobile users with existing Range Communication infrastructures. ECT was a continuation of the Range Information System Management (RISM) task started in 2002. RISM identified the three advance communication technologies investigated under ECT. These were Wireless Ethernet (Wi-Fi), Free Space Optics (FSO), and Ultra Wideband (UWB). Due to the report s size, it has been broken into three volumes: 1) Main Report 2) Appendices 3) UWB

  10. Emerging Communication Technologies (ECT) Phase 2 Report. Volume 3; Ultra Wideband (UWB) Technology

    NASA Technical Reports Server (NTRS)

    Bastin, Gary L.; Harris, William G.; Chiodini, Robert; Nelson, Richard A.; Huang, PoTien; Kruhm, David A.

    2003-01-01

    The Emerging Communication Technology (ECT) project investigated three First Mile communication technologies in support of NASA s Second Generation Reusable Launch Vehicle (2nd Gen RLV), Orbital Space Plane, Advanced Range Technology Working Group (ARTWG) and the Advanced Spaceport Technology Working Group (ASTWG). These First Mile technologies have the purpose of interconnecting mobile users with existing Range Communication infrastructures. ECT was a continuation of the Range Information System Management (RISM) task started in 2002. RISM identified the three advance communication technologies investigated under ECT. These were Wireless Ethernet (Wi-Fi), Free Space Optics (FSO), and Ultra Wideband (UWB). Due to the report s size, it has been broken into three volumes: 1) Main Report 2) Appendices 3) UWB

  11. Emerging Communication Technologies (ECT) Phase 2 Report. Volume 1; Main Report

    NASA Technical Reports Server (NTRS)

    Bastin, Gary L.; Harris, William G.; Chiodini, Robert; Nelson, Richard A.; Huang, PoTien; Kruhm, David A.

    2003-01-01

    The Emerging Communication Technology (ECT) project investigated three First Mile communication technologies in support of NASA s Second Generation Reusable Launch Vehicle (2nd Gen RLV), Orbital Space Plane, Advanced Range Technology Working Group (ARTWG) and the Advanced Spaceport Technology Working Group (ASTWG). These First Mile technologies have the purpose of interconnecting mobile users with existing Range Communication infrastructures. ECT was a continuation of the Range Information System Management (RISM) task started in 2002. RISM identified the three advance communication technologies investigated under ECT. These were Wireless Ethernet (Wi-Fi), Free Space Optics (FSO), and Ultra Wideband (UWB). Due to the report s size, it has been broken into three volumes: 1) Main Report 2) Appendices 3) UWB.

  12. Use of consumer wireless devices by South Africans with severe communication disability

    PubMed Central

    Bryen, Diane Nelson; Moolman, Enid; Morris, John

    2016-01-01

    Background Advancements in wireless technology (e.g. cell phones and tablets) have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. Objectives To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Method Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC) technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. Results All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3%) needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends), for leisure activities (e.g. listening to music, watching videos, playing games), and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance). Conclusion These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population. PMID:28730045

  13. Use of consumer wireless devices by South Africans with severe communication disability.

    PubMed

    Bornman, Juan; Bryen, Diane Nelson; Moolman, Enid; Morris, John

    2016-01-01

    Advancements in wireless technology (e.g. cell phones and tablets) have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC) technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3%) needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends), for leisure activities (e.g. listening to music, watching videos, playing games), and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance). These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  14. 3.5G based mobile remote monitoring system.

    PubMed

    Bajracharya, Aman; Gale, Timothy J; Stack, Clive R; Turner, Paul

    2008-01-01

    Low bandwidth has long been a reason for the unsuitability of wireless internet in telemedicine. However with the advent of extended third generation wireless as an economically accessible high speed network, more opportunities are being created in this area of telemedicine. This paper explores the opportunity created by the latest wireless broadband technology for remote monitoring of patients in the home.

  15. Mobile Applications and 4G Wireless Networks: A Framework for Analysis

    ERIC Educational Resources Information Center

    Yang, Samuel C.

    2012-01-01

    Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…

  16. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  17. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring.

    PubMed

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-09-20

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods.

  18. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring

    PubMed Central

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-01-01

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods. PMID:27657070

  19. Routing and Scheduling Algorithms for WirelessHART Networks: A Survey

    PubMed Central

    Nobre, Marcelo; Silva, Ivanovitch; Guedes, Luiz Affonso

    2015-01-01

    Wireless communication is a trend nowadays for the industrial environment. A number of different technologies have emerged as solutions satisfying strict industrial requirements (e.g., WirelessHART, ISA100.11a, WIA-PA). As the industrial environment presents a vast range of applications, adopting an adequate solution for each case is vital to obtain good performance of the system. In this context, the routing and scheduling schemes associated with these technologies have a direct impact on important features, like latency and energy consumption. This situation has led to the development of a vast number of routing and scheduling schemes. In the present paper, we focus on the WirelessHART technology, emphasizing its most important routing and scheduling aspects in order to guide both end users and the developers of new algorithms. Furthermore, we provide a detailed literature review of the newest routing and scheduling techniques for WirelessHART, discussing each of their features. These routing algorithms have been evaluated in terms of their objectives, metrics, the usage of the WirelessHART structures and validation method. In addition, the scheduling algorithms were also evaluated by metrics, validation, objectives and, in addition, by multiple superframe support, as well as by the redundancy method used. Moreover, this paper briefly presents some insights into the main WirelessHART simulation modules available, in order to provide viable test platforms for the routing and scheduling algorithms. Finally, some open issues in WirelessHART routing and scheduling algorithms are discussed. PMID:25919371

  20. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    NASA Astrophysics Data System (ADS)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing modalities and (iv) system solutions with high end-user added value and cost benefits. The common thread is deployment and deployment evaluation. In particular, satisfaction of application requirements, involvement of the end-user in the design and deployment process, satisfactory system performance and user acceptance are concerns addressed in many of the contributions. The contributions form a valuable set, which help to identify the priorities for research in this burgeoning area: Robust, reliable and efficient data collection in embedded wireless multi-hop networks are essential elements in creating a true deploy-and-forget user experience. Maintaining full connectivity within a WSN, in a real world environment populated by other WSNs, WiFi networks or Bluetooth devices that constitute sources of interference is a key element in any application, but more so for those that are safety-critical, such as disaster response. Awareness of the effects of wireless channel, physical position and line-of-sight on received signal strength in real-world, outdoor environments will shape the design of many outdoor applications. Thus, the quantification of such effects is valuable knowledge for designers. Sensors' failure detection, scalability and commercialization are common challenges in many long-term monitoring applications; transferable solutions are evidenced here in the context of pollutant detection and water quality. Innovative, alternative thinking is often needed to achieve the desired long-lived networks when power-hungry sensors are foreseen components; in some instances, the very problems of wireless technology, such as RF irregularity, can be transformed into advantages. The importance of an iterative design and evaluation methodology—from analysis to simulation to real-life deployment—should be well understood by all WSN developers. The value of this is highlighted in the context of a challenging WPAN video-surveillance application based on a novel Nomadic Access Mechanism. Cost benefits to be drawn from devising a WSN based solution to classic application areas such as surveillance are often a prime motivator for WSN designers; an example is offered here based on the use of intelligent agents for intrusion monitoring. Last but not least, the practicality and usability of the WSN solutions found for novel applications is key to their adoption. This is particularly true when the end-users of the developed technology are medical patients. The importance of feedback, elegant hardware encapsulation and extraction of meaning from data is presented in the context of novel orthopedic rehabilitation aids. Overall, this feature offers wide coverage of most issues encountered in the process of design, implementation and evaluation of deployable WSN systems. We trust that designers and developers of WSN systems will find much work of value, ranging from lessons learned, through solutions to known hurdles, to novel developments that enhance applications. Finally, we would like to thank all authors for their valuable contributions!

  1. Design architecture for multi-zone HVAC control systems from existing single-zone systems using wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Redfern, Andrew; Koplow, Michael; Wright, Paul

    2007-01-01

    Most residential heating, ventilating, and air-conditioning (HVAC) systems utilize a single zone for conditioning air throughout the entire house. While inexpensive, these systems lead to wide temperature distributions and inefficient cooling due to the difference in thermal loads in different rooms. The end result is additional cost to the end user because the house is over conditioned. To reduce the total amount of energy used in a home and to increase occupant comfort there is a need for a better control system using multiple temperature zones. Typical multi-zone systems are costly and require extensive infrastructure to function. Recent advances in wireless sensor networks (WSNs) have enabled a low cost drop-in wireless vent register control system. The register control system is controlled by a master controller unit, which collects sensor data from a distributed wireless sensor network. Each sensor node samples local settings (occupancy, light, humidity and temperature) and reports the data back to the master control unit. The master control unit compiles the incoming data and then actuates the vent resisters to control the airflow throughout the house. The control system also utilizes a smart thermostat with a movable set point to enable the user to define their given comfort levels. The new system can reduce the run time of the HVAC system and thus decreasing the amount of energy used and increasing the comfort of the home occupations.

  2. A mobile field-work data collection system for the wireless era of health surveillance.

    PubMed

    Forsell, Marianne; Sjögren, Petteri; Renard, Matthew; Johansson, Olle

    2011-03-01

    In many countries or regions the capacity of health care resources is below the needs of the population and new approaches for health surveillance are needed. Innovative projects, utilizing wireless communication technology, contribute to reliable methods for field-work data collection and reporting to databases. The objective was to describe a new version of a wireless IT-support system for field-work data collection and administration. The system requirements were drawn from the design objective and translated to system functions. The system architecture was based on fieldwork experiences and administrative requirements. The Smartphone devices were HTC Touch Diamond2s, while the system was based on a platform with Microsoft .NET components, and a SQL Server 2005 with Microsoft Windows Server 2003 operating system. The user interfaces were based on .NET programming, and Microsoft Windows Mobile operating system. A synchronization module enabled download of field data to the database, via a General Packet Radio Services (GPRS) to a Local Area Network (LAN) interface. The field-workers considered the here-described applications user-friendly and almost self-instructing. The office administrators considered that the back-office interface facilitated retrieval of health reports and invoice distribution. The current IT-support system facilitates short lead times from fieldwork data registration to analysis, and is suitable for various applications. The advantages of wireless technology, and paper-free data administration need to be increasingly emphasized in development programs, in order to facilitate reliable and transparent use of limited resources.

  3. Soft, smart contact lenses with integrations of wireless circuits, glucose sensors, and displays.

    PubMed

    Park, Jihun; Kim, Joohee; Kim, So-Yun; Cheong, Woon Hyung; Jang, Jiuk; Park, Young-Geun; Na, Kyungmin; Kim, Yun-Tae; Heo, Jun Hyuk; Lee, Chang Young; Lee, Jung Heon; Bien, Franklin; Park, Jang-Ung

    2018-01-01

    Recent advances in wearable electronics combined with wireless communications are essential to the realization of medical applications through health monitoring technologies. For example, a smart contact lens, which is capable of monitoring the physiological information of the eye and tear fluid, could provide real-time, noninvasive medical diagnostics. However, previous reports concerning the smart contact lens have indicated that opaque and brittle components have been used to enable the operation of the electronic device, and this could block the user's vision and potentially damage the eye. In addition, the use of expensive and bulky equipment to measure signals from the contact lens sensors could interfere with the user's external activities. Thus, we report an unconventional approach for the fabrication of a soft, smart contact lens in which glucose sensors, wireless power transfer circuits, and display pixels to visualize sensing signals in real time are fully integrated using transparent and stretchable nanostructures. The integration of this display into the smart lens eliminates the need for additional, bulky measurement equipment. This soft, smart contact lens can be transparent, providing a clear view by matching the refractive indices of its locally patterned areas. The resulting soft, smart contact lens provides real-time, wireless operation, and there are in vivo tests to monitor the glucose concentration in tears (suitable for determining the fasting glucose level in the tears of diabetic patients) and, simultaneously, to provide sensing results through the contact lens display.

  4. Next-generation optical wireless communications for data centers

    NASA Astrophysics Data System (ADS)

    Arnon, Shlomi

    2015-01-01

    Data centers collect and process information with a capacity that has been increasing from year to year at an almost exponential pace. Traditional fiber/cable data center network interconnections suffer from bandwidth overload, as well as flexibility and scalability issues. Therefore, a technology-shift from the fiber and cable to wireless has already been initiated in order to meet the required data-rate, flexibility and scalability demands for next-generation data center network interconnects. In addition, the shift to wireless reduces the volume allocated to the cabling/fiber and increases the cooling efficiency. Optical wireless communication (OWC), or free space optics (FSO), is one of the most effective wireless technologies that could be used in future data centers and could provide ultra-high capacity, very high cyber security and minimum latency, due to the low index of refraction of air in comparison to fiber technologies. In this paper we review the main concepts and configurations for next generation OWC for data centers. Two families of technologies are reviewed: the first technology regards interconnects between rack units in the same rack and the second technology regards the data center network that connects the server top of rack (TOR) to the switch. A comparison between different network technologies is presented.

  5. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A

    PubMed Central

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-01-01

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR. PMID:28489064

  6. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    PubMed

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  7. Fatal collision? Are wireless headsets a risk in treating patients?

    PubMed

    Sage, Cindy; Hardell, Lennart

    2018-02-05

    Wireless-enabled headsets that connect to the internet can provide remote transcribing of patient examination notes. Audio and video can be captured and transmitted by wireless signals sent from the computer screen in the frame of the glasses. But using wireless glass-type devices can expose the user to a specific absorption rates (SAR) of 1.11-1.46 W/kg of radiofrequency radiation. That RF intensity is as high as or higher than RF emissions of some cell phones. Prolonged use of cell phones used ipsilaterally at the head has been associated with statistically significant increased risk of glioma and acoustic neuroma. Using wireless glasses for extended periods to teach, to perform surgery, or conduct patient exams will expose the medical professional to similar RF exposures which may impair brain performance, cognition and judgment, concentration and attention and increase the risk for brain tumors. The quality of medical care may be compromised by extended use of wireless-embedded devices in health care settings. Both medical professionals and their patients should know the risks of such devices and have a choice about allowing their use during patient exams. Transmission of sensitive patient data over wireless networks may increase the risk of hacking and security breaches leading to losses of private patient medical and financial data that are strictly protected under HIPPA health information privacy laws.

  8. Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2001-03-01

    The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two agents on a host station sharing a common goal can be merged or married to compose a new agent. Application of the two-layer set of algorithms for mobile agent evolution, performed in a distributed processing environment, is made to the QoS management functions of the IP multimedia IM sub-network of the third generation 3G Wideband Code-division Multiple Access W-CDMA wireless network.

  9. Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings

    PubMed Central

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133

  10. Wireless technology infrastructures for authentication of patients: PKI that rings.

    PubMed

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

  11. Implementation of a piezoelectric energy harvester in railway health monitoring

    NASA Astrophysics Data System (ADS)

    Li, Jingcheng; Jang, Shinae; Tang, Jiong

    2014-03-01

    With development of wireless sensor technology, wireless sensor network has shown a great potential for railway health monitoring. However, how to supply continuous power to the wireless sensor nodes is one of the critical issues in long-term full-scale deployment of the wireless smart sensors. Some energy harvesting methodologies have been available including solar, vibration, wind, etc; among them, vibration-based energy harvester using piezoelectric material showed the potential for converting ambient vibration energy to electric energy in railway health monitoring even for underground subway systems. However, the piezoelectric energy harvester has two major problems including that it could only generate small amount of energy, and that it should match the exact narrow band natural frequency with the excitation frequency. To overcome these problems, a wide band piezoelectric energy harvester, which could generate more power on various frequencies regions, has been designed and validated with experimental test. Then it was applied to a full-scale field test using actual railway train. The power generation of the wide band piezoelectric array has been compared to a narrow-band, resonant-based, piezoelectric energy harvester.

  12. Wireless and acoustic hearing with bone-anchored hearing devices.

    PubMed

    Bosman, Arjan J; Mylanus, Emmanuel A M; Hol, Myrthe K S; Snik, Ad F M

    2015-07-01

    The efficacy of wireless connectivity in bone-anchored hearing was studied by comparing the wireless and acoustic performance of the Ponto Plus sound processor from Oticon Medical relative to the acoustic performance of its predecessor, the Ponto Pro. Nineteen subjects with more than two years' experience with a bone-anchored hearing device were included. Thirteen subjects were fitted unilaterally and six bilaterally. Subjects served as their own control. First, subjects were tested with the Ponto Pro processor. After a four-week acclimatization period performance the Ponto Plus processor was measured. In the laboratory wireless and acoustic input levels were made equal. In daily life equal settings of wireless and acoustic input were used when watching TV, however when using the telephone the acoustic input was reduced by 9 dB relative to the wireless input. Speech scores for microphone with Ponto Pro and for both input modes of the Ponto Plus processor were essentially equal when equal input levels of wireless and microphone inputs were used. Only the TV-condition showed a statistically significant (p <5%) lower speech reception threshold for wireless relative to microphone input. In real life, evaluation of speech quality, speech intelligibility in quiet and noise, and annoyance by ambient noise, when using landline phone, mobile telephone, and watching TV showed a clear preference (p <1%) for the Ponto Plus system with streamer over the microphone input. Due to the small number of respondents with landline phone (N = 7) the result for noise annoyance was only significant at the 5% level. Equal input levels for acoustic and wireless inputs results in equal speech scores, showing a (near) equivalence for acoustic and wireless sound transmission with Ponto Pro and Ponto Plus. The default 9-dB difference between microphone and wireless input when using the telephone results in a substantial wireless benefit when using the telephone. The preference of wirelessly transmitted audio when watching TV can be attributed to the relatively poor sound quality of backward facing loudspeakers in flat screen TVs. The ratio of wireless and acoustic input can be easily set to the user's preference with the streamer's volume control.

  13. Smart Grid Communications System Blueprint

    NASA Astrophysics Data System (ADS)

    Clark, Adrian; Pavlovski, Chris

    2010-10-01

    Telecommunications operators are well versed in deploying 2G and 3G wireless networks. These networks presently support the mobile business user and/or retail consumer wishing to place conventional voice calls and data connections. The electrical power industry has recently commenced transformation of its distribution networks by deploying smart monitoring and control devices throughout their networks. This evolution of the network into a `smart grid' has also motivated the need to deploy wireless technologies that bridge the communication gap between the smart devices and information technology systems. The requirements of these networks differ from traditional wireless networks that communications operators have deployed, which have thus far forced energy companies to consider deploying their own wireless networks. We present our experience in deploying wireless networks to support the smart grid and highlight the key properties of these networks. These characteristics include application awareness, support for large numbers of simultaneous cell connections, high service coverage and prioritized routing of data. We also outline our target blueprint architecture that may be useful to the industry in building wireless and fixed networks to support the smart grid. By observing our experiences, telecommunications operators and equipment manufacturers will be able to augment their current networks and products in a way that accommodates the needs of the emerging industry of smart grids and intelligent electrical networks.

  14. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks

    PubMed Central

    Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun

    2016-01-01

    In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550

  15. Adaptive threshold determination for efficient channel sensing in cognitive radio network using mobile sensors

    NASA Astrophysics Data System (ADS)

    Morshed, M. N.; Khatun, S.; Kamarudin, L. M.; Aljunid, S. A.; Ahmad, R. B.; Zakaria, A.; Fakir, M. M.

    2017-03-01

    Spectrum saturation problem is a major issue in wireless communication systems all over the world. Huge number of users is joining each day to the existing fixed band frequency but the bandwidth is not increasing. These requirements demand for efficient and intelligent use of spectrum. To solve this issue, the Cognitive Radio (CR) is the best choice. Spectrum sensing of a wireless heterogeneous network is a fundamental issue to detect the presence of primary users' signals in CR networks. In order to protect primary users (PUs) from harmful interference, the spectrum sensing scheme is required to perform well even in low signal-to-noise ratio (SNR) environments. Meanwhile, the sensing period is usually required to be short enough so that secondary (unlicensed) users (SUs) can fully utilize the available spectrum. CR networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary user's licensed frequency bands. In this paper, we have proposed an adaptive threshold detection method to detect presence of PU signal using free space path loss (FSPL) model in 2.4 GHz WLAN network. The model is designed for mobile sensors embedded in smartphones. The mobile sensors acts as SU while the existing WLAN network (channels) works as PU. The theoretical results show that the desired threshold range detection of mobile sensors mainly depends on the noise floor level of the location in consideration.

  16. Physiologically Modulating Videogames or Simulations which use Motion-Sensing Input Devices

    NASA Technical Reports Server (NTRS)

    Pope, Alan T. (Inventor); Stephens, Chad L. (Inventor); Blanson, Nina Marie (Inventor)

    2014-01-01

    New types of controllers allow players to make inputs to a video game or simulation by moving the entire controller itself. This capability is typically accomplished using a wireless input device having accelerometers, gyroscopes, and an infrared LED tracking camera. The present invention exploits these wireless motion-sensing technologies to modulate the player's movement inputs to the videogame based upon physiological signals. Such biofeedback-modulated video games train valuable mental skills beyond eye-hand coordination. These psychophysiological training technologies enhance personal improvement, not just the diversion, of the user.

  17. Ubiquitous Wireless Smart Sensing and Control

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  18. Ubiquitous Wireless Smart Sensing and Control. Pumps and Pipes JSC: Uniquely Houston

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools).Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  19. Bluetooth Low Energy: Wireless Connectivity for Medical Monitoring

    PubMed Central

    Omre, Alf Helge

    2010-01-01

    Electronic wireless sensors could cut medical costs by enabling physicians to remotely monitor vital signs such as blood pressure, blood glucose, and blood oxygenation while patients remain at home. According to the IDC report “Worldwide Bluetooth Semiconductor 2008-2012 Forecast,” published November 2008, a forthcoming radio frequency communication (“wireless connectivity”) standard, Bluetooth low energy, will link wireless sensors via radio signals to the 70% of cell phones and computers likely to be fitted with the next generation of Bluetooth wireless technology, leveraging a ready-built infrastructure for data transmission. Analysis of trends indicated by this data can help physicians better manage diseases such as diabetes. The technology also addresses the concerns of cost, compatibility, and interoperability that have previously stalled widespread adoption of wireless technology in medical applications. PMID:20307407

  20. Bluetooth low energy: wireless connectivity for medical monitoring.

    PubMed

    Omre, Alf Helge

    2010-03-01

    Electronic wireless sensors could cut medical costs by enabling physicians to remotely monitor vital signs such as blood pressure, blood glucose, and blood oxygenation while patients remain at home. According to the IDC report "Worldwide Bluetooth Semiconductor 2008-2012 Forecast," published November 2008, a forthcoming radio frequency communication ("wireless connectivity") standard, Bluetooth low energy, will link wireless sensors via radio signals to the 70% of cell phones and computers likely to be fitted with the next generation of Bluetooth wireless technology, leveraging a ready-built infrastructure for data transmission. Analysis of trends indicated by this data can help physicians better manage diseases such as diabetes. The technology also addresses the concerns of cost, compatibility, and interoperability that have previously stalled widespread adoption of wireless technology in medical applications. (c) 2010 Diabetes Technology Society.

  1. Power-Efficient Beacon Recognition Method Based on Periodic Wake-Up for Industrial Wireless Devices.

    PubMed

    Song, Soonyong; Lee, Donghun; Jang, Ingook; Choi, Jinchul; Son, Youngsung

    2018-04-17

    Energy harvester-integrated wireless devices are attractive for generating semi-permanent power from wasted energy in industrial environments. The energy-harvesting wireless devices may have difficulty in their communication with access points due to insufficient power supply for beacon recognition during network initialization. In this manuscript, we propose a novel method of beacon recognition based on wake-up control to reduce instantaneous power consumption in the initialization procedure. The proposed method applies a moving window for the periodic wake-up of the wireless devices. For unsynchronized wireless devices, beacons are always located in the same positions within each beacon interval even though the starting offsets are unknown. Using these characteristics, the moving window checks the existence of the beacon associated withspecified resources in a beacon interval, checks again for neighboring resources at the next beacon interval, and so on. This method can reduce instantaneous power and generates a surplus of charging time. Thus, the proposed method alleviates the problems of power insufficiency in the network initialization. The feasibility of the proposed method is evaluated using computer simulations of power shortage in various energy-harvesting conditions.

  2. A programmable closed-loop recording and stimulating wireless system for behaving small laboratory animals

    PubMed Central

    Angotzi, Gian Nicola; Boi, Fabio; Zordan, Stefano; Bonfanti, Andrea; Vato, Alessandro

    2014-01-01

    A portable 16-channels microcontroller-based wireless system for a bi-directional interaction with the central nervous system is presented in this work. The device is designed to be used with freely behaving small laboratory animals and allows recording of spontaneous and evoked neural activity wirelessly transmitted and stored on a personal computer. Biphasic current stimuli with programmable duration, frequency and amplitude may be triggered in real-time on the basis of the recorded neural activity as well as by the animal behavior within a specifically designed experimental setup. An intuitive graphical user interface was developed to configure and to monitor the whole system. The system was successfully tested through bench tests and in vivo measurements on behaving rats chronically implanted with multi-channels microwire arrays. PMID:25096831

  3. Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kaj, Ingemar

    Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information for the network users. Hundreds or thousands of small embedded units, which operate under low-energy supply and with limited access to central network control, rely on interconnecting protocols to coordinate data aggregation and transmission. Energy efficiency is crucial and it has been proposed that cluster based and distributed architectures such as LEACH are particularly suitable. We analyse the random cluster hierarchy in this protocol and provide a solution for low-energy and limited-loss optimization. Moreover, we extend these results to a multi-level version of LEACH, where clusters of nodes again self-organize to form clusters of clusters, and so on.

  4. Application of Wireless Sensor Networks to Automobiles

    NASA Astrophysics Data System (ADS)

    Tavares, Jorge; Velez, Fernando J.; Ferro, João M.

    2008-01-01

    Some applications of Wireless Sensor Networks (WSNs) to the automobile are identified, and the use of Crossbow MICAz motes operating at 2.4 GHz is considered together with TinyOS support. These WSNs are conceived in order to measure, process and supply to the user diverse types of information during an automobile journey. Examples are acceleration and fuel consumption, identification of incorrect tire pressure, verification of illumination, and evaluation of the vital signals of the driver. A brief survey on WSNs concepts is presented, as well as the way the wireless sensor network itself was developed. Calibration curves were produced which allowed for obtaining luminous intensity and temperature values in the appropriate units. Aspects of the definition of the architecture and the choice/implementation of the protocols are identified. Security aspects are also addressed.

  5. The pedagogy of Momus technologies: Facebook, privacy, and online intimacy.

    PubMed

    van Manen, Max

    2010-08-01

    Through cable and wireless connections at home and at work, through Wi-Fi networks and wireless spots in hotels, coffee shops, and town squares, we are indeed connected to each other. But what is the phenomenology of this connection? Technologies of expression such as Facebook, MySpace, Twitter, and other social networking technologies increasingly become like Momus windows of Greek mythology, revealing one's innermost thoughts for all to see. They give access to what used to be personal, secret, and hidden in the lives of its users, especially the young. In this article I explore the pedagogy of Momus effects of social networking technologies in the way they may alter young people's experience of privacy, secrecy, solitude, and intimacy. In addition, I examine the forms of contact afforded by instant messaging and texting on wireless mobile technologies such as the cell phone (and its wireless hybrids) for the way young people are and stay in touch with each other, and how intimacies and inner lives are attended to.

  6. Joint Resource Optimization for Cognitive Sensor Networks with SWIPT-Enabled Relay.

    PubMed

    Lu, Weidang; Lin, Yuanrong; Peng, Hong; Nan, Tian; Liu, Xin

    2017-09-13

    Energy-constrained wireless networks, such as wireless sensor networks (WSNs), are usually powered by fixed energy supplies (e.g., batteries), which limits the operation time of networks. Simultaneous wireless information and power transfer (SWIPT) is a promising technique to prolong the lifetime of energy-constrained wireless networks. This paper investigates the performance of an underlay cognitive sensor network (CSN) with SWIPT-enabled relay node. In the CSN, the amplify-and-forward (AF) relay sensor node harvests energy from the ambient radio-frequency (RF) signals using power splitting-based relaying (PSR) protocol. Then, it helps forward the signal of source sensor node (SSN) to the destination sensor node (DSN) by using the harvested energy. We study the joint resource optimization including the transmit power and power splitting ratio to maximize CSN's achievable rate with the constraint that the interference caused by the CSN to the primary users (PUs) is within the permissible threshold. Simulation results show that the performance of our proposed joint resource optimization can be significantly improved.

  7. Flexible Near-Field Wireless Optoelectronics as Subdermal Implants for Broad Applications in Optogenetics.

    PubMed

    Shin, Gunchul; Gomez, Adrian M; Al-Hasani, Ream; Jeong, Yu Ra; Kim, Jeonghyun; Xie, Zhaoqian; Banks, Anthony; Lee, Seung Min; Han, Sang Youn; Yoo, Chul Jong; Lee, Jong-Lam; Lee, Seung Hee; Kurniawan, Jonas; Tureb, Jacob; Guo, Zhongzhu; Yoon, Jangyeol; Park, Sung-Il; Bang, Sang Yun; Nam, Yoonho; Walicki, Marie C; Samineni, Vijay K; Mickle, Aaron D; Lee, Kunhyuk; Heo, Seung Yun; McCall, Jordan G; Pan, Taisong; Wang, Liang; Feng, Xue; Kim, Tae-Il; Kim, Jong Kyu; Li, Yuhang; Huang, Yonggang; Gereau, Robert W; Ha, Jeong Sook; Bruchas, Michael R; Rogers, John A

    2017-02-08

    In vivo optogenetics provides unique, powerful capabilities in the dissection of neural circuits implicated in neuropsychiatric disorders. Conventional hardware for such studies, however, physically tethers the experimental animal to an external light source, limiting the range of possible experiments. Emerging wireless options offer important capabilities that avoid some of these limitations, but the current size, bulk, weight, and wireless area of coverage is often disadvantageous. Here, we present a simple but powerful setup based on wireless, near-field power transfer and miniaturized, thin, flexible optoelectronic implants, for complete optical control in a variety of behavioral paradigms. The devices combine subdermal magnetic coil antennas connected to microscale, injectable light-emitting diodes (LEDs), with the ability to operate at wavelengths ranging from UV to blue, green-yellow, and red. An external loop antenna allows robust, straightforward application in a multitude of behavioral apparatuses. The result is a readily mass-producible, user-friendly technology with broad potential for optogenetics applications. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Flexible near field wireless optoelectronics as subdermal implants for broad applications in optogenetics

    PubMed Central

    Shin, Gunchul; Gomez, Adrian M.; Al-Hasani, Ream; Jeong, Yu Ra; Kim, Jeonghyun; Xie, Zhaoqian; Banks, Anthony; Lee, Seung Min; Han, Sang Youn; Yoo, Chul Jong; Lee, Jong-Lam; Lee, Seung Hee; Kurniawan, Jonas; Tureb, Jacob; Guo, Zhongzhu; Yoon, Jangyeol; Park, Sung-Il; Bang, Sang Yun; Nam, Yoonho; Walicki, Marie C.; Samineni, Vijay K.; Mickle, Aaron D.; Lee, Kunhyuk; Heo, Seung Yun; McCall, Jordan G.; Pan, Taisong; Wang, Liang; Feng, Xue; Kim, Taeil; Kim, Jong Kyu; Li, Yuhang; Huang, Yonggang; Gereau, Robert W.; Ha, Jeong Sook; Bruchas, Michael R.; Rogers, John A.

    2017-01-01

    Summary In vivo optogenetics provides unique, powerful capabilities in the dissection of neural circuits implicated in neuropsychiatric disorders. Conventional hardware for such studies, however, physically tethers the experimental animal to an external light source limiting the range of possible experiments. Emerging wireless options offer important capabilities that avoid some of these limitations, but the current size, bulk, weight, and wireless area of coverage is often disadvantageous. Here, we present a simple but powerful setup based on wireless, near-field power transfer and miniaturized, thin flexible optoelectronic implants, for complete optical control in a variety of behavioral paradigms. The devices combine subdermal magnetic coil antennas connected to microscale, injectable LEDs, with the ability to operate at wavelengths ranging from ultraviolet to blue, green/yellow, and red. An external loop antenna allows robust, straightforward application in a multitude of behavioral apparatuses. The result is a readily mass-producible, user-friendly technology with broad potential for optogenetics applications. PMID:28132830

  9. Navigation technique for MR-endoscope system using a wireless accelerometer-based remote control device.

    PubMed

    Kumamoto, Etsuko; Takahashi, Akihiro; Matsuoka, Yuichiro; Morita, Yoshinori; Kutsumi, Hiromu; Azuma, Takeshi; Kuroda, Kagayaki

    2013-01-01

    The MR-endoscope system can perform magnetic resonance (MR) imaging during endoscopy and show the images obtained by using endoscope and MR. The MR-endoscope system can acquire a high-spatial resolution MR image with an intraluminal radiofrequency (RF) coil, and the navigation system shows the scope's location and orientation inside the human body and indicates MR images with a scope view. In order to conveniently perform an endoscopy and MR procedure, the design of the user interface is very important because it provides useful information. In this study, we propose a navigation system using a wireless accelerometer-based controller with Bluetooth technology and a navigation technique to set the intraluminal RF coil using the navigation system. The feasibility of using this wireless controller in the MR shield room was validated via phantom examinations of the influence on MR procedures and navigation accuracy. In vitro examinations using an isolated porcine stomach demonstrated the effectiveness of the navigation technique using a wireless remote-control device.

  10. Wireless Electrical Device Using Open-Circuit Elements Having No Electrical Connections

    NASA Technical Reports Server (NTRS)

    Taylor, Bryant Douglas (Inventor); Woodard, Stanley E. (Inventor)

    2012-01-01

    A wireless electrical device includes an electrically unconnected electrical conductor and at least one electrically unconnected electrode spaced apart from the electrical conductor. The electrical conductor is shaped for storage of an electric field and a magnetic field. In the presence of a time-varying magnetic field, the electrical conductor so-shaped resonates to generate harmonic electric and magnetic field responses. Each electrode is at a location lying within the magnetic field response so-generated and is constructed such that a linear movement of electric charges is generated in each electrode due to the magnetic field response so-generated.

  11. Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burnette, John R.; Thibodeau, Christopher C.; Greitzer, Frank L.

    2002-02-28

    As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data betweenmore » the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.« less

  12. Motor Carrier Efficiency Study Phase I

    DOT National Transportation Integrated Search

    2009-02-01

    The Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Legacy for Users (SAFETEA-LU, Public Law 109-59), Section 5503, set aside funding to examine the application of wireless technology to improve the safety and efficiency of trucki...

  13. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    PubMed

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.

  14. A Novel Design of an Automatic Lighting Control System for a Wireless Sensor Network with Increased Sensor Lifetime and Reduced Sensor Numbers

    PubMed Central

    Mohamaddoust, Reza; Haghighat, Abolfazl Toroghi; Sharif, Mohamad Javad Motahari; Capanni, Niccolo

    2011-01-01

    Wireless sensor networks (WSN) are currently being applied to energy conservation applications such as light control. We propose a design for such a system called a Lighting Automatic Control System (LACS). The LACS system contains a centralized or distributed architecture determined by application requirements and space usage. The system optimizes the calculations and communications for lighting intensity, incorporates user illumination requirements according to their activities and performs adjustments based on external lighting effects in external sensor and external sensor-less architectures. Methods are proposed for reducing the number of sensors required and increasing the lifetime of those used, for considerably reduced energy consumption. Additionally we suggest methods for improving uniformity of illuminance distribution on a workplane’s surface, which improves user satisfaction. Finally simulation results are presented to verify the effectiveness of our design. PMID:22164114

  15. Threats and risks to information security: a practical analysis of free access wireless networks

    NASA Astrophysics Data System (ADS)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  16. Game theoretic wireless resource allocation for H.264 MGS video transmission over cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Fragkoulis, Alexandros; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2015-03-01

    We propose a method for the fair and efficient allocation of wireless resources over a cognitive radio system network to transmit multiple scalable video streams to multiple users. The method exploits the dynamic architecture of the Scalable Video Coding extension of the H.264 standard, along with the diversity that OFDMA networks provide. We use a game-theoretic Nash Bargaining Solution (NBS) framework to ensure that each user receives the minimum video quality requirements, while maintaining fairness over the cognitive radio system. An optimization problem is formulated, where the objective is the maximization of the Nash product while minimizing the waste of resources. The problem is solved by using a Swarm Intelligence optimizer, namely Particle Swarm Optimization. Due to the high dimensionality of the problem, we also introduce a dimension-reduction technique. Our experimental results demonstrate the fairness imposed by the employed NBS framework.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Madhu Sudhan; Campbell, Steven L; Tolbert, Leon M

    So far, vehicular power electronics integration is limited to the integration of on-board battery chargers (OBC) into the traction drive system and sometimes to the accessory dc/dc converters in plug-in electric vehicles (PEV). These integration approaches do not provide isolation from the grid although it is an important feature that is required for user interface systems that have grid connections. This is therefore a major limitation that needs to be addressed along with the integrated functionality. Furthermore, there is no previous study that proposes the integration of wireless charger with the other on-board components. This study features a unique waymore » of combining the wired and wireless charging functionalities with vehicle side boost converter integration and maintaining the isolation to provide the best solution to the plug-in electric vehicle users. The new topology is additionally compared with commercially available OBC systems from manufacturers.« less

  18. A novel design of an automatic lighting control system for a wireless sensor network with increased sensor lifetime and reduced sensor numbers.

    PubMed

    Mohamaddoust, Reza; Haghighat, Abolfazl Toroghi; Sharif, Mohamad Javad Motahari; Capanni, Niccolo

    2011-01-01

    Wireless sensor networks (WSN) are currently being applied to energy conservation applications such as light control. We propose a design for such a system called a lighting automatic control system (LACS). The LACS system contains a centralized or distributed architecture determined by application requirements and space usage. The system optimizes the calculations and communications for lighting intensity, incorporates user illumination requirements according to their activities and performs adjustments based on external lighting effects in external sensor and external sensor-less architectures. Methods are proposed for reducing the number of sensors required and increasing the lifetime of those used, for considerably reduced energy consumption. Additionally we suggest methods for improving uniformity of illuminance distribution on a workplane's surface, which improves user satisfaction. Finally simulation results are presented to verify the effectiveness of our design.

  19. Full duplex fiber link for alternative wired and wireless access based on SSB optical millimeter-wave with 4-PAM signal

    NASA Astrophysics Data System (ADS)

    Ma, Jianxin; Zhang, Junjie

    2015-03-01

    A novel full-duplex fiber-wireless link based on single sideband (SSB) optical millimeter (mm)-wave with 10 Gbit/s 4-pulse amplitude modulation (PAM) signal is proposed to provide alternative wired and 40 GHz wireless accesses for the user terminals. The SSB optical mm-wave with 4-PAM signal consists of two tones: one bears the 4-PAM signal and the other is unmodulated with high power. After transmission over the fiber to the hybrid optical network unit (HONU), the SSB optical mm-wave signal can be decomposed by fiber Bragg gratings (FBGs) as the SSB optical mm-wave signal with reduced carrier-to-sideband ratio (the baseband 4-PAM optical signal) and the uplink optical carrier for the wireless (wired) access. This makes the HONU free from the laser source. For the uplink, since the wireless access signal is converted to the baseband by power detection, both the transmitter in the HONU and the receiver in optical line terminal (OLT) are co-shared for both wireless and wired accesses, which makes the full duplex link much simpler. In our scheme, the optical electrical field of the square-root increment level 4-PAM signal assures an equal level spacing receiving for both the downlink wired and wireless accesses. Since the downlink wireless signal is down-converted to the baseband by power detection, RF local oscillator is unnecessary. To confirm the feasibility of our proposed scheme, a simulation full duplex link with 40 GHz SSB optical mm-wave with 10 Gbit/s 4-PAM signal is built. The simulation results show that both down- and up-links for either wired or wireless access can keep good performance even if the link length of the SSMF is extended to 40 km.

  20. Terahertz wireless communications based on photonics technologies.

    PubMed

    Nagatsuma, Tadao; Horiguchi, Shogo; Minamikata, Yusuke; Yoshimizu, Yasuyuki; Hisatake, Shintaro; Kuwano, Shigeru; Yoshimoto, Naoto; Terada, Jun; Takahashi, Hiroyuki

    2013-10-07

    There has been an increasing interest in the application of terahertz (THz) waves to broadband wireless communications. In particular, use of frequencies above 275 GHz is one of the strong concerns among radio scientists and engineers, because these frequency bands have not yet been allocated at specific active services, and there is a possibility to employ extremely large bandwidths for ultra-broadband wireless communications. Introduction of photonics technologies for signal generation, modulation and detection is effective not only to enhance the bandwidth and/or the data rate, but also to combine fiber-optic (wired) and wireless networks. This paper reviews recent progress in THz wireless communications using telecom-based photonics technologies towards 100 Gbit/s.

  1. Generation of THz Wave with Orbital Angular Momentum by Graphene Patch Reflectarray

    DTIC Science & Technology

    2015-07-01

    potential to significantly increase spectral efficiency and channel capacity for wireless communication [1]. A few techniques have been reported to...plane wave. The graphene-based OAM generation is very promising for future applications in THz wireless communication . ACKNOWLEDGEMENT This work is... Dyadic Green’s functions and guided surface waves for a surface conductivity model of graphene,” Journal of Applied Physics, vol. 103, no. 6, pp

  2. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup

    NASA Astrophysics Data System (ADS)

    Kuo, Cynthia; Walker, Jesse; Perrig, Adrian

    Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.

  3. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    PubMed

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  4. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    PubMed Central

    Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-01-01

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861

  5. Economic Feasibility of Wireless Sensor Network-Based Service Provision in a Duopoly Setting with a Monopolist Operator

    PubMed Central

    Romero, Julián; Sacoto-Cabrera, Erwin J.

    2017-01-01

    We analyze the feasibility of providing Wireless Sensor Network-data-based services in an Internet of Things scenario from an economical point of view. The scenario has two competing service providers with their own private sensor networks, a network operator and final users. The scenario is analyzed as two games using game theory. In the first game, sensors decide to subscribe or not to the network operator to upload the collected sensing-data, based on a utility function related to the mean service time and the price charged by the operator. In the second game, users decide to subscribe or not to the sensor-data-based service of the service providers based on a Logit discrete choice model related to the quality of the data collected and the subscription price. The sinks and users subscription stages are analyzed using population games and discrete choice models, while network operator and service providers pricing stages are analyzed using optimization and Nash equilibrium concepts respectively. The model is shown feasible from an economic point of view for all the actors if there are enough interested final users and opens the possibility of developing more efficient models with different types of services. PMID:29186847

  6. Admission Control Over Internet of Vehicles Attached With Medical Sensors for Ubiquitous Healthcare Applications.

    PubMed

    Lin, Di; Labeau, Fabrice; Yao, Yuanzhe; Vasilakos, Athanasios V; Tang, Yu

    2016-07-01

    Wireless technologies and vehicle-mounted or wearable medical sensors are pervasive to support ubiquitous healthcare applications. However, a critical issue of using wireless communications under a healthcare scenario rests at the electromagnetic interference (EMI) caused by radio frequency transmission. A high level of EMI may lead to a critical malfunction of medical sensors, and in such a scenario, a few users who are not transmitting emergency data could be required to reduce their transmit power or even temporarily disconnect from the network in order to guarantee the normal operation of medical sensors as well as the transmission of emergency data. In this paper, we propose a joint power and admission control algorithm to schedule the users' transmission of medical data. The objective of this algorithm is to minimize the number of users who are forced to disconnect from the network while keeping the EMI on medical sensors at an acceptable level. We show that a fixed point of proposed algorithm always exists, and at the fixed point, our proposed algorithm can minimize the number of low-priority users who are required to disconnect from the network. Numerical results illustrate that the proposed algorithm can achieve robust performance against the variations of mobile hospital environments.

  7. A Novel Complex-Coefficient In-Band Interference Suppression Algorithm for Cognitive Ultra-Wide Band Wireless Sensors Networks.

    PubMed

    Xiong, Hailiang; Zhang, Wensheng; Xu, Hongji; Du, Zhengfeng; Tang, Huaibin; Li, Jing

    2017-05-25

    With the rapid development of wireless communication systems and electronic techniques, the limited frequency spectrum resources are shared with various wireless devices, leading to a crowded and challenging coexistence circumstance. Cognitive radio (CR) and ultra-wide band (UWB), as sophisticated wireless techniques, have been considered as significant solutions to solve the harmonious coexistence issues. UWB wireless sensors can share the spectrum with primary user (PU) systems without harmful interference. The in-band interference of UWB systems should be considered because such interference can severely affect the transmissions of UWB wireless systems. In order to solve the in-band interference issues for UWB wireless sensor networks (WSN), a novel in-band narrow band interferences (NBIs) elimination scheme is proposed in this paper. The proposed narrow band interferences suppression scheme is based on a novel complex-coefficient adaptive notch filter unit with a single constrained zero-pole pair. Moreover, in order to reduce the computation complexity of the proposed scheme, an adaptive complex-coefficient iterative method based on two-order Taylor series is designed. To cope with multiple narrow band interferences, a linear cascaded high order adaptive filter and a cyclic cascaded high order matrix adaptive filter (CCHOMAF) interference suppression algorithm based on the basic adaptive notch filter unit are also presented. The theoretical analysis and numerical simulation results indicate that the proposed CCHOMAF algorithm can achieve better performance in terms of average bit error rate for UWB WSNs. The proposed in-band NBIs elimination scheme can significantly improve the reception performance of low-cost and low-power UWB wireless systems.

  8. A Novel Complex-Coefficient In-Band Interference Suppression Algorithm for Cognitive Ultra-Wide Band Wireless Sensors Networks

    PubMed Central

    Xiong, Hailiang; Zhang, Wensheng; Xu, Hongji; Du, Zhengfeng; Tang, Huaibin; Li, Jing

    2017-01-01

    With the rapid development of wireless communication systems and electronic techniques, the limited frequency spectrum resources are shared with various wireless devices, leading to a crowded and challenging coexistence circumstance. Cognitive radio (CR) and ultra-wide band (UWB), as sophisticated wireless techniques, have been considered as significant solutions to solve the harmonious coexistence issues. UWB wireless sensors can share the spectrum with primary user (PU) systems without harmful interference. The in-band interference of UWB systems should be considered because such interference can severely affect the transmissions of UWB wireless systems. In order to solve the in-band interference issues for UWB wireless sensor networks (WSN), a novel in-band narrow band interferences (NBIs) elimination scheme is proposed in this paper. The proposed narrow band interferences suppression scheme is based on a novel complex-coefficient adaptive notch filter unit with a single constrained zero-pole pair. Moreover, in order to reduce the computation complexity of the proposed scheme, an adaptive complex-coefficient iterative method based on two-order Taylor series is designed. To cope with multiple narrow band interferences, a linear cascaded high order adaptive filter and a cyclic cascaded high order matrix adaptive filter (CCHOMAF) interference suppression algorithm based on the basic adaptive notch filter unit are also presented. The theoretical analysis and numerical simulation results indicate that the proposed CCHOMAF algorithm can achieve better performance in terms of average bit error rate for UWB WSNs. The proposed in-band NBIs elimination scheme can significantly improve the reception performance of low-cost and low-power UWB wireless systems. PMID:28587085

  9. THz photonic wireless links with 16-QAM modulation in the 375-450 GHz band.

    PubMed

    Jia, Shi; Yu, Xianbin; Hu, Hao; Yu, Jinlong; Guan, Pengyu; Da Ros, Francesco; Galili, Michael; Morioka, Toshio; Oxenløwe, Leif K

    2016-10-17

    We propose and experimentally demonstrate THz photonic wireless communication systems with 16-QAM modulation in the 375-450 GHz band. The overall throughput reaches as high as 80 Gbit/s by exploiting four THz channels with 5 Gbaud 16-QAM baseband modulation per channel. We create a coherent optical frequency comb (OFC) for photonic generation of multiple THz carriers based on photo-mixing in a uni-travelling carrier photodiode (UTC-PD). The OFC configuration also allows us to generate reconfigurable THz carriers with low phase noise. The multiple-channel THz radiation is received by using a Schottky mixer based electrical receiver after 0.5 m free-space wireless propagation. 2-channel (40 Gbit/s) and 4-channel (80 Gbit/s) THz photonic wireless links with 16-QAM modulation are reported in this paper, and the bit error rate (BER) performance for all channels in both cases is below the hard decision forward error correction (HD-FEC) threshold of 3.8e-3 with 7% overhead. In addition, we also successfully demonstrate hybrid photonic wireless transmission of 40 Gbit/s 16-QAM signal at carrier frequencies of 400 GHz and 425 GHz over 30 km standard single mode fiber (SSMF) between the optical baseband signal transmitter and the THz wireless transmitter with negligible induced power penalty.

  10. Fully printed flexible and disposable wireless cyclic voltammetry tag.

    PubMed

    Jung, Younsu; Park, Hyejin; Park, Jin-Ah; Noh, Jinsoo; Choi, Yunchang; Jung, Minhoon; Jung, Kyunghwan; Pyo, Myungho; Chen, Kevin; Javey, Ali; Cho, Gyoujin

    2015-01-29

    A disposable cyclic voltammetry (CV) tag is printed on a plastic film by integrating wireless power transmitter, polarized triangle wave generator, electrochemical cell and signage through a scalable gravure printing method. By proximity of 13.56 MHz RF reader, the printed CV tag generates 320 mHz of triangular sweep wave from +500 mV to -500 mV which enable to scan a printed electrochemical cell in the CV tag. By simply dropping any specimen solution on the electrochemical cell in the CV tag, the presence of solutes in the solution can be detected and shown on the signage of the CV tag in five sec. 10 mM of N,N,N',N'-tetramethyl-p-phenylenediamine (TMPD) was used as a standard solute to prove the working concept of fully printed disposable wireless CV tag. Within five seconds, we can wirelessly diagnose the presence of TMPD in the solution using the CV tag in the proximity of the 13.56 MHz RF reader. This fully printed and wirelessly operated flexible CV tag is the first of its kind and marks the path for the utilization of inexpensive and disposable wireless electrochemical sensor systems for initial diagnose hazardous chemicals and biological molecules to improve public hygiene and health.

  11. Fully printed flexible and disposable wireless cyclic voltammetry tag

    PubMed Central

    Jung, Younsu; Park, Hyejin; Park, Jin-Ah; Noh, Jinsoo; Choi, Yunchang; Jung, Minhoon; Jung, Kyunghwan; Pyo, Myungho; Chen, Kevin; Javey, Ali; Cho, Gyoujin

    2015-01-01

    A disposable cyclic voltammetry (CV) tag is printed on a plastic film by integrating wireless power transmitter, polarized triangle wave generator, electrochemical cell and signage through a scalable gravure printing method. By proximity of 13.56 MHz RF reader, the printed CV tag generates 320 mHz of triangular sweep wave from +500 mV to −500 mV which enable to scan a printed electrochemical cell in the CV tag. By simply dropping any specimen solution on the electrochemical cell in the CV tag, the presence of solutes in the solution can be detected and shown on the signage of the CV tag in five sec. 10 mM of N,N,N′,N′-tetramethyl-p-phenylenediamine (TMPD) was used as a standard solute to prove the working concept of fully printed disposable wireless CV tag. Within five seconds, we can wirelessly diagnose the presence of TMPD in the solution using the CV tag in the proximity of the 13.56 MHz RF reader. This fully printed and wirelessly operated flexible CV tag is the first of its kind and marks the path for the utilization of inexpensive and disposable wireless electrochemical sensor systems for initial diagnose hazardous chemicals and biological molecules to improve public hygiene and health. PMID:25630250

  12. Fully printed flexible and disposable wireless cyclic voltammetry tag

    NASA Astrophysics Data System (ADS)

    Jung, Younsu; Park, Hyejin; Park, Jin-Ah; Noh, Jinsoo; Choi, Yunchang; Jung, Minhoon; Jung, Kyunghwan; Pyo, Myungho; Chen, Kevin; Javey, Ali; Cho, Gyoujin

    2015-01-01

    A disposable cyclic voltammetry (CV) tag is printed on a plastic film by integrating wireless power transmitter, polarized triangle wave generator, electrochemical cell and signage through a scalable gravure printing method. By proximity of 13.56 MHz RF reader, the printed CV tag generates 320 mHz of triangular sweep wave from +500 mV to -500 mV which enable to scan a printed electrochemical cell in the CV tag. By simply dropping any specimen solution on the electrochemical cell in the CV tag, the presence of solutes in the solution can be detected and shown on the signage of the CV tag in five sec. 10 mM of N,N,N',N'-tetramethyl-p-phenylenediamine (TMPD) was used as a standard solute to prove the working concept of fully printed disposable wireless CV tag. Within five seconds, we can wirelessly diagnose the presence of TMPD in the solution using the CV tag in the proximity of the 13.56 MHz RF reader. This fully printed and wirelessly operated flexible CV tag is the first of its kind and marks the path for the utilization of inexpensive and disposable wireless electrochemical sensor systems for initial diagnose hazardous chemicals and biological molecules to improve public hygiene and health.

  13. Utilization Possibilities of Area Definition in User Space for User-Centric Pervasive-Adaptive Systems

    NASA Astrophysics Data System (ADS)

    Krejcar, Ondrej

    The ability to let a mobile device determine its location in an indoor environment supports the creation of a new range of mobile information system applications. The goal of my project is to complement the data networking capabilities of RF wireless LANs with accurate user location and tracking capabilities for user needed data prebuffering. I created a location based system enhancement for locating and tracking users of indoor information system. User position is used for data prebuffering and pushing information from a server to his mobile client. All server data is saved as artifacts (together) with its indoor position information. The area definition for artifacts selecting is described for current and predicted user position along with valuating options for artifacts ranging. Future trends are also discussed.

  14. A Wireless Sensor System for Real-Time Monitoring and Fault Detection of Motor Arrays

    PubMed Central

    Medina-García, Jonathan; Sánchez-Rodríguez, Trinidad; Galán, Juan Antonio Gómez; Delgado, Aránzazu; Gómez-Bravo, Fernando; Jiménez, Raúl

    2017-01-01

    This paper presents a wireless fault detection system for industrial motors that combines vibration, motor current and temperature analysis, thus improving the detection of mechanical faults. The design also considers the time of detection and further possible actions, which are also important for the early detection of possible malfunctions, and thus for avoiding irreversible damage to the motor. The remote motor condition monitoring is implemented through a wireless sensor network (WSN) based on the IEEE 802.15.4 standard. The deployed network uses the beacon-enabled mode to synchronize several sensor nodes with the coordinator node, and the guaranteed time slot mechanism provides data monitoring with a predetermined latency. A graphic user interface offers remote access to motor conditions and real-time monitoring of several parameters. The developed wireless sensor node exhibits very low power consumption since it has been optimized both in terms of hardware and software. The result is a low cost, highly reliable and compact design, achieving a high degree of autonomy of more than two years with just one 3.3 V/2600 mAh battery. Laboratory and field tests confirm the feasibility of the wireless system. PMID:28245623

  15. A Wireless Sensor System for Real-Time Monitoring and Fault Detection of Motor Arrays.

    PubMed

    Medina-García, Jonathan; Sánchez-Rodríguez, Trinidad; Galán, Juan Antonio Gómez; Delgado, Aránzazu; Gómez-Bravo, Fernando; Jiménez, Raúl

    2017-02-25

    This paper presents a wireless fault detection system for industrial motors that combines vibration, motor current and temperature analysis, thus improving the detection of mechanical faults. The design also considers the time of detection and further possible actions, which are also important for the early detection of possible malfunctions, and thus for avoiding irreversible damage to the motor. The remote motor condition monitoring is implemented through a wireless sensor network (WSN) based on the IEEE 802.15.4 standard. The deployed network uses the beacon-enabled mode to synchronize several sensor nodes with the coordinator node, and the guaranteed time slot mechanism provides data monitoring with a predetermined latency. A graphic user interface offers remote access to motor conditions and real-time monitoring of several parameters. The developed wireless sensor node exhibits very low power consumption since it has been optimized both in terms of hardware and software. The result is a low cost, highly reliable and compact design, achieving a high degree of autonomy of more than two years with just one 3.3 V/2600 mAh battery. Laboratory and field tests confirm the feasibility of the wireless system.

  16. Wireless technologies and accessibility for people with disabilities: findings from a policy research instrument.

    PubMed

    Baker, Paul M A; Moon, Nathan W

    2008-01-01

    The near universal deployment in the United States of a wide variety of information and communications technologies, both wired and wireless, creates potential barriers to use for several key populations, including the poor, people with disabilities, and the aging. Equal access to wireless technologies and services can be achieved through a variety of mechanisms, including legislation and regulations, market-based solutions, and awareness and outreach-based approaches. This article discusses the results of policy research conducted by the Rehabilitation Engineering Research Center on Wireless Technologies (Wireless RERC) using policy Delphi polling methodology to probe stakeholders' opinions on key access barrier issues and to explore potential policy responses. Participants included disability advocates, disability/wireless technology policy makers, and product developers/manufacturers. Respondent input informed subsequent development of potential policy initiatives to increase access to these technologies. The findings from the Delphi suggest that awareness issues remain most important, especially manufacturer awareness of user needs and availability of consumer information for selecting the most appropriate wireless devices and services. Other key issues included the ability of people with disabilities to afford technologies and inadequacies in legislation and policy making for ensuring their general accessibility, as well as usefulness in emergencies. Technical issues, including interoperability, speech-to-text conversion, and hearing aid compatibility, were also identified by participating stakeholders as important. To address all these issues, Delphi respondents favored goals and options congruent with voluntary market-driven solutions where possible but also supported federal involvement, where necessary, to aid this process.

  17. Self-powered wireless sensor networks for telemedicine applications

    NASA Astrophysics Data System (ADS)

    Polk, Todd William

    Technology advances in wireless sensor networks have made it possible for these tiny systems to enter the realm of ubiquitous or pervasive computing which has been forecast for several years. These nodes, or motes as they are known, typically run off of battery power and when used sparingly can operate in excess of one year. When requirements necessitate higher usage, battery monitoring and replacement becomes a major issue. Large systems can quickly become cost prohibitive. To combat this issue, researchers have looked to energy harvesting to power these motes. However, this research has mainly centered on outdoor solar harvesting to take advantage of higher energy levels provided by the sun. Indoor harvesting has been presented in the past as not feasible. In this dissertation, we present a system that utilizes energy harvested from overhead fluorescent lights to power the infrastructure (routing) nodes of an indoor telemedicine based wireless network. The limitations of indoor harvesting are exploited and leveraged through creative hardware design. A unique message routing protocol has been developed to control these routing nodes and allow continual operation. Standard medical devices have been interfaced to the system to allow wireless transmission of patient data to a central collection point where the data is organized, stored and presented to the user via a graphical user interface (GUI). The range of the system has been extended by interfacing a cellular modem to the system to allow two-way communication between the GUI and a remote healthcare provider. Extensive physical testing has been done to determine the robustness of the system, and the boundary conditions for extremely large networks were tested via simulation.

  18. Configuring a Context-Aware Middleware for Wireless Sensor Networks

    PubMed Central

    Gámez, Nadia; Cubo, Javier; Fuentes, Lidia; Pimentel, Ernesto

    2012-01-01

    In the Future Internet, applications based on Wireless Sensor Networks will have to support reconfiguration with minimum human intervention, depending on dynamic context changes in their environment. These situations create a need for building these applications as adaptive software and including techniques that allow the context acquisition and decisions about adaptation. However, contexts use to be made up of complex information acquired from heterogeneous devices and user characteristics, making them difficult to manage. So, instead of building context-aware applications from scratch, we propose to use FamiWare, a family of middleware for Ambient Intelligence specifically designed to be aware of contexts in sensor and smartphone devices. It provides both, several monitoring services to acquire contexts from devices and users, and a context-awareness service to analyze and detect context changes. However, the current version of FamiWare does not allow the automatic incorporation related to the management of new contexts into the FamiWare family. To overcome this shortcoming, in this work, we first present how to model the context using a metamodel to define the contexts that must to be taken into account in an instantiation of FamiWare for a certain Ambient Intelligence system. Then, to configure a new context-aware version of FamiWare and to generate code ready-to-install within heterogeneous devices, we define a mapping that automatically transforms metamodel elements defining contexts into elements of the FamiWare family, and we also use the FamiWare configuration process to customize the new context-aware variant. Finally, we evaluate the benefits of our process, and we analyze both that the new version of the middleware works as expected and that it manages the contexts in an efficient way. PMID:23012505

  19. The security energy encryption in wireless power transfer

    NASA Astrophysics Data System (ADS)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  20. 4 Gbps impulse radio (IR) ultra-wideband (UWB) transmission over 100 meters multi mode fiber with 4 meters wireless transmission.

    PubMed

    Jensen, Jesper Bevensee; Rodes, Roberto; Caballero, Antonio; Yu, Xianbin; Gibbon, Timothy Braidwood; Monroy, Idelfonso Tafur

    2009-09-14

    We present experimental demonstrations of in-building impulse radio (IR) ultra-wideband (UWB) link consisting of 100 m multi mode fiber (MMF) and 4 m wireless transmission at a record 4 Gbps, and a record 8 m wireless transmission at 2.5 Gbps. A directly modulated vertical cavity surface emitting laser (VCSEL) was used for the generation of the optical signal. 8 m at 2.5 Gbps corresponds to a bit rate--distance product of 20; the highest yet reported for wireless IR-UWB transmission.

  1. Cooperative wireless network control based health and activity monitoring system.

    PubMed

    Prakash, R; Ganesh, A Balaji; Girish, Siva V

    2016-10-01

    A real-time cooperative communication based wireless network is presented for monitoring health and activity of an end-user in their environment. The cooperative communication offers better energy consumption and also an opportunity to aware the current location of a user non-intrusively. The link between mobile sensor node and relay node is dynamically established by using Received Signal Strength Indicator (RSSI) and Link Quality Indicator (LQI) based on adaptive relay selection scheme. The study proposes a Linear Acceleration based Transmission Power Decision Control (LA-TPDC) algorithm to further enhance the energy efficiency of cooperative communication. Further, the occurrences of false alarms are carefully prevented by introducing three stages of sequential warning system. The real-time experiments are carried-out by using the nodes, namely mobile sensor node, relay nodes and a destination node which are indigenously developed by using a CC430 microcontroller integrated with an in-built transceiver at 868 MHz. The wireless node performance characteristics, such as energy consumption, Signal-Noise ratio (SNR), Bit Error Rate (BER), Packet Delivery Ratio (PDR) and transmission offset are evaluated for all the participated nodes. The experimental results observed that the proposed linear acceleration based transmission power decision control algorithm almost doubles the battery life time than energy efficient conventional cooperative communication.

  2. Evaluation of a Smartphone Platform as a Wireless Interface Between Tongue Drive System and Electric-Powered Wheelchairs

    PubMed Central

    Kim, Jeonghee; Huo, Xueliang; Minocha, Julia; Holbrook, Jaimee; Laumann, Anne; Ghovanloo, Maysam

    2013-01-01

    Tongue drive system (TDS) is a new wireless assistive technology (AT) for the mobility impaired population. It provides users with the ability to drive powered wheelchairs (PWC) and access computers using their unconstrained tongue motion. Migration of the TDS processing unit and user interface platform from a bulky personal computer to a smartphone (iPhone) has significantly facilitated its usage by turning it into a true wireless and wearable AT. After implementation of the necessary interfacing hardware and software to allow the smartphone to act as a bridge between the TDS and PWC, the wheelchair navigation performance and associated learning was evaluated in nine able-bodied subjects in five sessions over a 5-week period. Subjects wore magnetic tongue studs over the duration of the study and drove the PWC in an obstacle course with their tongue using three different navigation strategies; namely unlatched, latched, and semiproportional. Qualitative aspects of using the TDS–iPhone–PWC interface were also evaluated via a five-point Likert scale questionnaire. Subjects showed more than 20% improvement in the overall completion time between the first and second sessions, and maintained a modest improvement of ~9% per session over the following three sessions. PMID:22531737

  3. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. Hard Fusion Based Spectrum Sensing over Mobile Fading Channels in Cognitive Vehicular Networks

    PubMed Central

    Hao, Li; Ni, Dadong; Tran, Quang Thanh

    2018-01-01

    An explosive growth in vehicular wireless applications gives rise to spectrum resource starvation. Cognitive radio has been used in vehicular networks to mitigate the impending spectrum starvation problem by allowing vehicles to fully exploit spectrum opportunities unoccupied by licensed users. Efficient and effective detection of licensed user is a critical issue to realize cognitive radio applications. However, spectrum sensing in vehicular environments is a very challenging task due to vehicle mobility. For instance, vehicle mobility has a large effect on the wireless channel, thereby impacting the detection performance of spectrum sensing. Thus, gargantuan efforts have been made in order to analyze the fading properties of mobile radio channel in vehicular environments. Indeed, numerous studies have demonstrated that the wireless channel in vehicular environments can be characterized by a temporally correlated Rayleigh fading. In this paper, we focus on energy detection for spectrum sensing and a counting rule for cooperative sensing based on Neyman-Pearson criteria. Further, we go into the effect of the sensing and reporting channel conditions on the sensing performance under the temporally correlated Rayleigh channel. For local and cooperative sensing, we derive some alternative expressions for the average probability of misdetection. The pertinent numerical and simulating results are provided to further validate our theoretical analyses under a variety of scenarios. PMID:29415452

  5. Wlan-Based Indoor Localization Using Neural Networks

    NASA Astrophysics Data System (ADS)

    Saleem, Fasiha; Wyne, Shurjeel

    2016-07-01

    Wireless indoor localization has generated recent research interest due to its numerous applications. This work investigates Wi-Fi based indoor localization using two variants of the fingerprinting approach. Specifically, we study the application of an artificial neural network (ANN) for implementing the fingerprinting approach and compare its localization performance with a probabilistic fingerprinting method that is based on maximum likelihood estimation (MLE) of the user location. We incorporate spatial correlation of fading into our investigations, which is often neglected in simulation studies and leads to erroneous location estimates. The localization performance is quantified in terms of accuracy, precision, robustness, and complexity. Multiple methods for handling the case of missing APs in online stage are investigated. Our results indicate that ANN-based fingerprinting outperforms the probabilistic approach for all performance metrics considered in this work.

  6. Flow-driven triboelectric generator for directly powering a wireless sensor node.

    PubMed

    Wang, Shuhua; Mu, Xiaojing; Yang, Ya; Sun, Chengliang; Gu, Alex Yuandong; Wang, Zhong Lin

    2015-01-14

    A triboelectric generator (TEG) for scavenging flow-driven mechanical -energy to directly power a wireless sensor node is demonstrated for the first time. The output performances of TEGs with different dimensions are systematically investigated, indicating that a largest output power of about 3.7 mW for one TEG can be achieved under an external load of 3 MΩ. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Multi-service small-cell cloud wired/wireless access network based on tunable optical frequency comb

    NASA Astrophysics Data System (ADS)

    Xiang, Yu; Zhou, Kun; Yang, Liu; Pan, Lei; Liao, Zhen-wan; Zhang, Qiang

    2015-11-01

    In this paper, we demonstrate a novel multi-service wired/wireless integrated access architecture of cloud radio access network (C-RAN) based on radio-over-fiber passive optical network (RoF-PON) system, which utilizes scalable multiple- frequency millimeter-wave (MF-MMW) generation based on tunable optical frequency comb (TOFC). In the baseband unit (BBU) pool, the generated optical comb lines are modulated into wired, RoF and WiFi/WiMAX signals, respectively. The multi-frequency RoF signals are generated by beating the optical comb line pairs in the small cell. The WiFi/WiMAX signals are demodulated after passing through the band pass filter (BPF) and band stop filter (BSF), respectively, whereas the wired signal can be received directly. The feasibility and scalability of the proposed multi-service wired/wireless integrated C-RAN are confirmed by the simulations.

  8. Transfer Error and Correction Approach in Mobile Network

    NASA Astrophysics Data System (ADS)

    Xiao-kai, Wu; Yong-jin, Shi; Da-jin, Chen; Bing-he, Ma; Qi-li, Zhou

    With the development of information technology and social progress, human demand for information has become increasingly diverse, wherever and whenever people want to be able to easily, quickly and flexibly via voice, data, images and video and other means to communicate. Visual information to the people direct and vivid image, image / video transmission also been widespread attention. Although the third generation mobile communication systems and the emergence and rapid development of IP networks, making video communications is becoming the main business of the wireless communications, however, the actual wireless and IP channel will lead to error generation, such as: wireless channel multi- fading channels generated error and blocking IP packet loss and so on. Due to channel bandwidth limitations, the video communication compression coding of data is often beyond the data, and compress data after the error is very sensitive to error conditions caused a serious decline in image quality.

  9. IoT Applications with 5G Connectivity in Medical Tourism Sector Management: Third-Party Service Scenarios.

    PubMed

    Psiha, Maria M; Vlamos, Panayiotis

    2017-01-01

    5G is the next generation of mobile communication technology. Current generation of wireless technologies is being evolved toward 5G for better serving end users and transforming our society. Supported by 5G cloud technology, personal devices will extend their capabilities to various applications, supporting smart life. They will have significant role in health, medical tourism, security, safety, and social life applications. The next wave of mobile communication is to mobilize and automate industries and industry processes via Machine-Type Communication (MTC) and Internet of Things (IoT). The current key performance indicators for the 5G infrastructure for the fully connected society are sufficient to satisfy most of the technical requirements in the healthcare sector. Thus, 5G can be considered as a door opener for new possibilities and use cases, many of which are as yet unknown. In this paper we present heterogeneous use cases in medical tourism sector, based on 5G infrastructure technologies and third-party cloud services.

  10. GSM Web-Based Centralized Remote Wireless Automatic Controlling and Monitoring of Aquafeeder

    NASA Astrophysics Data System (ADS)

    Wong, C. L.; Idris, A.; Hasan, Z.

    2016-03-01

    This project is about producing a prototype to feed fishes at fish ponds of remote location with the use of GSM mobile phone. An automatic fish feeder is an electric device that has been designed to give out the right amount of pellets at the designed time. In this project, the automatic feeder designed consists of photovoltaic solar cells that are used to generate electricity and storing it into batteries. Solar charge controllers can be used to determine the rate of which current is drawn and added from the batteries. GSM cellular communication is used to allow user to control from a distance. Commands or instructions are sent to the operating system which in return runs the servomotor and blower by blowing certain amount of fish pallets into the pond to feed the fishes. The duration of the feeding processes is fixed by the user, hence the amount of fish food pallets released are precisely the same for each time. This technology is especially useful for fish farmers where they can remotely feed their fishes.

  11. Wireless Damage Location Sensing System

    NASA Technical Reports Server (NTRS)

    Woodard, Stanley E. (Inventor); Taylor, Bryant Douglas (Inventor)

    2012-01-01

    A wireless damage location sensing system uses a geometric-patterned wireless sensor that resonates in the presence of a time-varying magnetic field to generate a harmonic response that will experience a change when the sensor experiences a change in its geometric pattern. The sensing system also includes a magnetic field response recorder for wirelessly transmitting the time-varying magnetic field and for wirelessly detecting the harmonic response. The sensing system compares the actual harmonic response to a plurality of predetermined harmonic responses. Each predetermined harmonic response is associated with a severing of the sensor at a corresponding known location thereof so that a match between the actual harmonic response and one of the predetermined harmonic responses defines the known location of the severing that is associated therewith.

  12. High-performance wireless powering for peripheral nerve neuromodulation systems.

    PubMed

    Tanabe, Yuji; Ho, John S; Liu, Jiayin; Liao, Song-Yan; Zhen, Zhe; Hsu, Stephanie; Shuto, Chika; Zhu, Zi-Yi; Ma, Andrew; Vassos, Christopher; Chen, Peter; Tse, Hung Fat; Poon, Ada S Y

    2017-01-01

    Neuromodulation of peripheral nerves with bioelectronic devices is a promising approach for treating a wide range of disorders. Wireless powering could enable long-term operation of these devices, but achieving high performance for miniaturized and deeply placed devices remains a technological challenge. We report the miniaturized integration of a wireless powering system in soft neuromodulation device (15 mm length, 2.7 mm diameter) and demonstrate high performance (about 10%) during in vivo wireless stimulation of the vagus nerve in a porcine animal model. The increased performance is enabled by the generation of a focused and circularly polarized field that enhances efficiency and provides immunity to polarization misalignment. These performance characteristics establish the clinical potential of wireless powering for emerging therapies based on neuromodulation.

  13. High-performance wireless powering for peripheral nerve neuromodulation systems

    PubMed Central

    Liu, Jiayin; Liao, Song-Yan; Zhen, Zhe; Hsu, Stephanie; Shuto, Chika; Zhu, Zi-Yi; Ma, Andrew; Vassos, Christopher; Chen, Peter; Tse, Hung Fat; Poon, Ada S. Y.

    2017-01-01

    Neuromodulation of peripheral nerves with bioelectronic devices is a promising approach for treating a wide range of disorders. Wireless powering could enable long-term operation of these devices, but achieving high performance for miniaturized and deeply placed devices remains a technological challenge. We report the miniaturized integration of a wireless powering system in soft neuromodulation device (15 mm length, 2.7 mm diameter) and demonstrate high performance (about 10%) during in vivo wireless stimulation of the vagus nerve in a porcine animal model. The increased performance is enabled by the generation of a focused and circularly polarized field that enhances efficiency and provides immunity to polarization misalignment. These performance characteristics establish the clinical potential of wireless powering for emerging therapies based on neuromodulation. PMID:29065141

  14. Wireless network system based multi-non-invasive sensors for smart home

    NASA Astrophysics Data System (ADS)

    Issa Ahmed, Rudhwan

    There are several techniques that have been implemented for smart homes usage; however, most of these techniques are limited to a few sensors. Many of these methods neither meet the needs of the user nor are cost-effective. This thesis discusses the design, development, and implementation of a wireless network system, based on multi-non-invasive sensors for smart home environments. This system has the potential to be used as a means to accurately, and remotely, determine the activities of daily living by continuously monitoring relatively simple parameters that measure the interaction between users and their surrounding environment. We designed and developed a prototype system to meet the specific needs of the elderly population. Unlike audio-video based health monitoring systems (which have associated problems such as the encroachment of privacy), the developed system's distinct features ensure privacy and are almost invisible to the occupants, thus increasing the acceptance levels of this system in household environments. The developed system not only achieved high levels of accuracy, but it is also portable, easy to use, cost-effective, and requires low data rates and less power compared to other wireless devices such as Wi-Fi, Bluetooth, wireless USB, Ultra wideband (UWB), or Infrared (IR) wireless. Field testing of the prototype system was conducted at different locations inside and outside of the Minto Building (Centre for Advanced Studies in Engineering at Carleton University) as well as other locations, such as the washroom, kitchen, and living room of a prototype apartment. The main goal of the testing was to determine the range of the prototype system and the functionality of each sensor in different environments. After it was verified that the system operated well in all of the tested environments, data were then collected at the different locations for analysis and interpretation in order to identify the activities of daily living of an occupant.

  15. A Framework to Improve Energy Efficient Behaviour at Home through Activity and Context Monitoring

    PubMed Central

    García, Óscar; Alonso, Ricardo S.; Corchado, Juan M.

    2017-01-01

    Real-time Localization Systems have been postulated as one of the most appropriated technologies for the development of applications that provide customized services. These systems provide us with the ability to locate and trace users and, among other features, they help identify behavioural patterns and habits. Moreover, the implementation of policies that will foster energy saving in homes is a complex task that involves the use of this type of systems. Although there are multiple proposals in this area, the implementation of frameworks that combine technologies and use Social Computing to influence user behaviour have not yet reached any significant savings in terms of energy. In this work, the CAFCLA framework (Context-Aware Framework for Collaborative Learning Applications) is used to develop a recommendation system for home users. The proposed system integrates a Real-Time Localization System and Wireless Sensor Networks, making it possible to develop applications that work under the umbrella of Social Computing. The implementation of an experimental use case aided efficient energy use, achieving savings of 17%. Moreover, the conducted case study pointed to the possibility of attaining good energy consumption habits in the long term. This can be done thanks to the system’s real time and historical localization, tracking and contextual data, based on which customized recommendations are generated. PMID:28758987

  16. An inter-networking mechanism with stepwise synchronization for wireless sensor networks.

    PubMed

    Yamamoto, Hiroshi; Wakamiya, Naoki; Murata, Masayuki

    2011-01-01

    To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  17. Wireless physiological monitoring system for psychiatric patients.

    PubMed

    Rademeyer, A J; Blanckenberg, M M; Scheffer, C

    2009-01-01

    Patients in psychiatric hospitals that are sedated or secluded are at risk of death or injury if they are not continuously monitored. Some psychiatric patients are restless and aggressive, and hence the monitoring device should be robust and must transmit the data wirelessly. Two devices, a glove that measures oxygen saturation and a dorsally-mounted device that measures heart rate, skin temperature and respiratory rate were designed and tested. Both devices connect to one central monitoring station using two separate Bluetooth connections, ensuring a completely wireless setup. A Matlab graphical user interface (GUI) was developed for signal processing and monitoring of the vital signs of the psychiatric patient. Detection algorithms were implemented to detect ECG arrhythmias such as premature ventricular contraction and atrial fibrillation. The prototypes were manufactured and tested in a laboratory setting on healthy volunteers.

  18. Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks

    PubMed Central

    Yeom, Jeong Seon; Jung, Bang Chul; Jin, Hu

    2018-01-01

    In this paper, we propose a novel low-complexity multi-user superposition transmission (MUST) technique for 5G downlink networks, which allows multiple cell-edge users to be multiplexed with a single cell-center user. We call the proposed technique diversity-controlled MUST technique since the cell-center user enjoys the frequency diversity effect via signal repetition over multiple orthogonal frequency division multiplexing (OFDM) sub-carriers. We assume that a base station is equipped with a single antenna but users are equipped with multiple antennas. In addition, we assume that the quadrature phase shift keying (QPSK) modulation is used for users. We mathematically analyze the bit error rate (BER) of both cell-edge users and cell-center users, which is the first theoretical result in the literature to the best of our knowledge. The mathematical analysis is validated through extensive link-level simulations. PMID:29439413

  19. Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks.

    PubMed

    Yeom, Jeong Seon; Chu, Eunmi; Jung, Bang Chul; Jin, Hu

    2018-02-10

    In this paper, we propose a novel low-complexity multi-user superposition transmission (MUST) technique for 5G downlink networks, which allows multiple cell-edge users to be multiplexed with a single cell-center user. We call the proposed technique diversity-controlled MUST technique since the cell-center user enjoys the frequency diversity effect via signal repetition over multiple orthogonal frequency division multiplexing (OFDM) sub-carriers. We assume that a base station is equipped with a single antenna but users are equipped with multiple antennas. In addition, we assume that the quadrature phase shift keying (QPSK) modulation is used for users. We mathematically analyze the bit error rate (BER) of both cell-edge users and cell-center users, which is the first theoretical result in the literature to the best of our knowledge. The mathematical analysis is validated through extensive link-level simulations.

  20. 47 CFR 64.3000 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS... calls. Any call initiated by an end user by dialing 911 for the purpose of accessing an emergency service provider. For wireless carriers, all 911 calls include those they are required to transmit...

  1. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  2. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    PubMed

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  3. A Multimodal Adaptive Wireless Control Interface for People With Upper-Body Disabilities.

    PubMed

    Fall, Cheikh Latyr; Quevillon, Francis; Blouin, Martine; Latour, Simon; Campeau-Lecours, Alexandre; Gosselin, Clement; Gosselin, Benoit

    2018-06-01

    This paper describes a multimodal body-machine interface (BoMI) to help individuals with upper-limb disabilities using advanced assistive technologies, such as robotic arms. The proposed system uses a wearable and wireless body sensor network (WBSN) supporting up to six sensor nodes to measure the natural upper-body gesture of the users and translate it into control commands. Natural gesture of the head and upper-body parts, as well as muscular activity, are measured using inertial measurement units (IMUs) and surface electromyography (sEMG) using custom-designed multimodal wireless sensor nodes. An IMU sensing node is attached to a headset worn by the user. It has a size of 2.9 cm 2.9 cm, a maximum power consumption of 31 mW, and provides angular precision of 1. Multimodal patch sensor nodes, including both IMU and sEMG sensing modalities are placed over the user able-body parts to measure the motion and muscular activity. These nodes have a size of 2.5 cm 4.0 cm and a maximum power consumption of 11 mW. The proposed BoMI runs on a Raspberry Pi. It can adapt to several types of users through different control scenarios using the head and shoulder motion, as well as muscular activity, and provides a power autonomy of up to 24 h. JACO, a 6-DoF assistive robotic arm, is used as a testbed to evaluate the performance of the proposed BoMI. Ten able-bodied subjects performed ADLs while operating the AT device, using the Test d'Évaluation des Membres Supérieurs de Personnes Âgées to evaluate and compare the proposed BoMI with the conventional joystick controller. It is shown that the users can perform all tasks with the proposed BoMI, almost as fast as with the joystick controller, with only 30% time overhead on average, while being potentially more accessible to the upper-body disabled who cannot use the conventional joystick controller. Tests show that control performance with the proposed BoMI improved by up to 17% on average, after three trials.

  4. Power-Efficient Beacon Recognition Method Based on Periodic Wake-Up for Industrial Wireless Devices

    PubMed Central

    Lee, Donghun; Jang, Ingook; Choi, Jinchul; Son, Youngsung

    2018-01-01

    Energy harvester-integrated wireless devices are attractive for generating semi-permanent power from wasted energy in industrial environments. The energy-harvesting wireless devices may have difficulty in their communication with access points due to insufficient power supply for beacon recognition during network initialization. In this manuscript, we propose a novel method of beacon recognition based on wake-up control to reduce instantaneous power consumption in the initialization procedure. The proposed method applies a moving window for the periodic wake-up of the wireless devices. For unsynchronized wireless devices, beacons are always located in the same positions within each beacon interval even though the starting offsets are unknown. Using these characteristics, the moving window checks the existence of the beacon associated withspecified resources in a beacon interval, checks again for neighboring resources at the next beacon interval, and so on. This method can reduce instantaneous power and generates a surplus of charging time. Thus, the proposed method alleviates the problems of power insufficiency in the network initialization. The feasibility of the proposed method is evaluated using computer simulations of power shortage in various energy-harvesting conditions. PMID:29673206

  5. Rotating-Disk-Based Hybridized Electromagnetic-Triboelectric Nanogenerator for Sustainably Powering Wireless Traffic Volume Sensors.

    PubMed

    Zhang, Binbin; Chen, Jun; Jin, Long; Deng, Weili; Zhang, Lei; Zhang, Haitao; Zhu, Minhao; Yang, Weiqing; Wang, Zhong Lin

    2016-06-28

    Wireless traffic volume detectors play a critical role for measuring the traffic-flow in a real-time for current Intelligent Traffic System. However, as a battery-operated electronic device, regularly replacing battery remains a great challenge, especially in the remote area and wide distribution. Here, we report a self-powered active wireless traffic volume sensor by using a rotating-disk-based hybridized nanogenerator of triboelectric nanogenerator and electromagnetic generator as the sustainable power source. Operated at a rotating rate of 1000 rpm, the device delivered an output power of 17.5 mW, corresponding to a volume power density of 55.7 W/m(3) (Pd = P/V, see Supporting Information for detailed calculation) at a loading resistance of 700 Ω. The hybridized nanogenerator was demonstrated to effectively harvest energy from wind generated by a moving vehicle through the tunnel. And the delivered power is capable of triggering a counter via a wireless transmitter for real-time monitoring the traffic volume in the tunnel. This study further expands the applications of triboelectric nanogenerators for high-performance ambient mechanical energy harvesting and as sustainable power sources for driving wireless traffic volume sensors.

  6. Wireless technology in the ICU: boon or ban?

    PubMed

    Gladman, Aviv S; Lapinsky, Stephen E

    2007-01-01

    Wireless communication and data transmission are playing an increasing role in the critical care environment. Early anecdotal reports of electromagnetic interference (EMI) with intensive care unit (ICU) equipment resulted in many institutions banning these devices. An increasing literature database has more clearly defined the risks of EMI. Restrictions to the use of mobile devices are being lifted, and it has been suggested that the benefits of improved communication may outweigh the small risks. However, increased use of cellular phones and ever changing communication technologies require ongoing vigilance by healthcare device manufacturers, hospitals and device users, to prevent potentially hazardous events due to EMI.

  7. Out Flying the Eagle: China’s Drive for Domestic Economic Innovation and Its Impact on U.S.-China Relations

    DTIC Science & Technology

    2014-03-01

    wind turbines from General Electric. China recognizes the issues with IPR but it is something that will take time to fix. It will be a significant...Large aircraft  Large-scale oil and gas exploration  Manned space, including lunar exploration  Next-generation broadband wireless ...circuits, and building an innovation system for China’s integrated circuit (IC) manufacturing industry. 3. New generation broadband wireless mobile

  8. Magnetically coupled resonance wireless charging technology principles and transfer mechanisms

    NASA Astrophysics Data System (ADS)

    Zhou, Jiehua; Wan, Jian; Ma, Yinping

    2017-05-01

    With the tenure of Electric-Vehicle rising around the world, the charging methods have been paid more and more attention, the current charging mode mainly has the charging posts and battery swapping station. The construction of the charging pile or battery swapping station not only require lots of manpower, material costs but the bare conductor is also easy to generate electric spark hidden safety problems, still occupies large space. Compared with the wired charging, wireless charging mode is flexible, unlimited space and location factors and charging for vehicle safety and quickly. It complements the traditional charging methods in adaptability and the independent charge deficiencies. So the researching the wireless charging system have an important practical significance and application value. In this paper, wireless charging system designed is divided into three parts: the primary side, secondary side and resonant coupling. The main function of the primary side is to generate high-frequency alternating current, so selecting CLASS-E amplifier inverter structure through the research on full bridge, half-bridge and power amplification circuit. Addition, the wireless charging system is susceptible to outside interference, frequency drift phenomenon. Combined with the wireless energy transmission characteristics, resonant parts adopt resonant coupling energy transmission scheme and the Series-Series coupling compensation structure. For the electric vehicle charging power and voltage requirements, the main circuit is a full bridge inverter and Boost circuit used as the secondary side.

  9. Optical wireless communications to OC-768 and beyond

    NASA Astrophysics Data System (ADS)

    Medved, David B.; Davidovich, Leonid

    2001-10-01

    Laser and LED-based wireless communication systems are currently providing license-free interconnection for broadband voice, data and video transport. These systems allow for the immediate, reliable and low-cost extension of copper and fiber-based networks to any end user, providing efficient First Mile bypass access to high data rate backbone networks at speeds ranging from T-1 voice to full throughput ATM at 155 Mbps and up to Gigabit Ethernet. These wireless optical beams constitute a Virtual Fiber in the air, providing the capabilities of fiber in situations where wired connectivity is unavailable, impractical, expensive or slow-to-implement, while achieving a combination of low cost, speed and reliability that cannot be matched by microwave, mm wave, spread spectrum or other competing (actually complementary) wireless technologies. The carrier frequency of the optical beam is about 10,000 times higher than the highest frequencies used by the millimeter wave technology. By means of Wavelength Division Multiplexing more than 1000 independent data channels can be projected into the air on a single beam thus providing a potential bandwidth ten million times that of any RF solution. The twin barriers of physics and regulatory bureaucracy to this essentially infinite wireless bandwidth are thus eliminated by this Virtual Fiber. As user density and individual bandwidth needs escalate, the optical wireless will be the preferred medium of choice in both network and cellular interconnection. A mesh topology which integrates our optical wireless systems with the latest Optical Access switches and routing equipment will be described using case study examples from Japan to South America. As the Bandwidth Blowout continues to push the limits of electronics and especially in the case of DWDM (Dense Wavelength Division Multiples), the conventional optical wireless solutions are no longer feasible. Instead of using f.o. transceivers to convert photons to electrons and thence back to photons we have designed a series of airlinks whose transmitters and receivers operate without electronics. At the PATX (Photonic Airlink Transmitter), instead of demodulating the fiber optic input signals from a Network Interface Unit (NIU) we project the light from the polished terminated fiber end into the air using appropriate optics. Any signal being carried by the fiber from the NIU is now airborne without any intermediate processing electronics thus realizing the full potential of the optical carrier. At the receiver end (PARX - Photonic Airlink Receiver), the weak optical signals are collected by the appropriate optics (including combiners using large area MMF) and guided to the NIU (switch, PABX, etc.) by compatible fiber. It is necessary to maintain a large field-of-view at the receiver to ensure reliability, stability and ease of alignment. This is achieved by use of high N.A. fiber. In this paper we discuss the design trade off's, construction and field test results of several systems implementing the all- photonic wireless concept including: Transmission of WDM signals through the air at distances up to 1 km. Results with wireless transmission of Gigabit Ethernet using the Optiswitch modules as the NIU. Providing high speed wireless (Fast Ethernet and beyond) to the home at a cost of less than $250 per node. The paper will conclude with a discussion on the role of the all-photonic wireless technology in the emerging field of Passive Optical Networking.

  10. A security mechanism based on evolutionary game in fog computing.

    PubMed

    Sun, Yan; Lin, Fuhong; Zhang, Nan

    2018-02-01

    Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

  11. Optical frequency upconversion technique for transmission of wireless MIMO-type signals over optical fiber.

    PubMed

    Shaddad, R Q; Mohammad, A B; Al-Gailani, S A; Al-Hetar, A M

    2014-01-01

    The optical fiber is well adapted to pass multiple wireless signals having different carrier frequencies by using radio-over-fiber (ROF) technique. However, multiple wireless signals which have the same carrier frequency cannot propagate over a single optical fiber, such as wireless multi-input multi-output (MIMO) signals feeding multiple antennas in the fiber wireless (FiWi) system. A novel optical frequency upconversion (OFU) technique is proposed to solve this problem. In this paper, the novel OFU approach is used to transmit three wireless MIMO signals over a 20 km standard single mode fiber (SMF). The OFU technique exploits one optical source to produce multiple wavelengths by delivering it to a LiNbO3 external optical modulator. The wireless MIMO signals are then modulated by LiNbO3 optical intensity modulators separately using the generated optical carriers from the OFU process. These modulators use the optical single-sideband with carrier (OSSB+C) modulation scheme to optimize the system performance against the fiber dispersion effect. Each wireless MIMO signal is with a 2.4 GHz or 5 GHz carrier frequency, 1 Gb/s data rate, and 16-quadrature amplitude modulation (QAM). The crosstalk between the wireless MIMO signals is highly suppressed, since each wireless MIMO signal is carried on a specific optical wavelength.

  12. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    NASA Astrophysics Data System (ADS)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  13. Wireless tamper detection sensor and sensing system

    NASA Technical Reports Server (NTRS)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2011-01-01

    A wireless tamper detection sensor is defined by a perforated electrical conductor. The conductor is shaped to form a geometric pattern between first and second ends thereof such that the conductor defines an open-circuit that can store and transfer electrical and magnetic energy. The conductor resonates in the presence of a time-varying magnetic field to generate a harmonic response. The harmonic response changes when the conductor experiences a change in its geometric pattern due to severing of the conductor along at least a portion of the perforations. A magnetic field response recorder is used to wirelessly transmit the time-varying magnetic field and wirelessly detecting the conductor's harmonic response.

  14. Next-generation wireless bridge weigh-in-motion (WIM) system integrated with nondestructive evaluation (NDE) capability for transportation infrastructure safety.

    DOT National Transportation Integrated Search

    2014-05-01

    This project seeks to develop a rapidly deployable, low-cost, and wireless system for bridge : weigh-in-motion (BWIM) and nondestructive evaluation (NDE). The system is proposed to : assist in monitoring transportation infrastructure safety, for the ...

  15. Wirelessly powering miniature implants for optogenetic stimulation

    NASA Astrophysics Data System (ADS)

    Yeh, Alexander J.; Ho, John S.; Tanabe, Yuji; Neofytou, Evgenios; Beygui, Ramin E.; Poon, Ada S. Y.

    2013-10-01

    Conventional methods for in vivo optogenetic stimulation require optical fibers or mounted prosthesis. We present an approach for wirelessly powering implantable stimulators using electromagnetic midfield. By exploiting the properties of the midfield, we demonstrate the ability to generate high intensity light pulses in a freely moving animal.

  16. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    PubMed

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  17. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  18. Challenges in Wireless System Integration as Enablers for Indoor Context Aware Environments

    PubMed Central

    Aguirre, Erik

    2017-01-01

    The advent of fully interactive environments within Smart Cities and Smart Regions requires the use of multiple wireless systems. In the case of user-device interaction, which finds multiple applications such as Ambient Assisted Living, Intelligent Transportation Systems or Smart Grids, among others, large amount of transceivers are employed in order to achieve anytime, anyplace and any device connectivity. The resulting combination of heterogeneous wireless network exhibits fundamental limitations derived from Coverage/Capacity relations, as a function of required Quality of Service parameters, required bit rate, energy restrictions and adaptive modulation and coding schemes. In this context, inherent transceiver density poses challenges in overall system operation, given by multiple node operation which increases overall interference levels. In this work, a deterministic based analysis applied to variable density wireless sensor network operation within complex indoor scenarios is presented, as a function of topological node distribution. The extensive analysis derives interference characterizations, both for conventional transceivers as well as wearables, which provide relevant information in terms of individual node configuration as well as complete network layout. PMID:28704963

  19. Team Oriented Robotic Exploration Task on Scorpion and K9 Platforms

    NASA Technical Reports Server (NTRS)

    Kirchner, Frank

    2003-01-01

    This final report describes the achievements that have been made in the project over the complete period of performance. The technical progress highlights the different areas of work in terms of Progress in Mechatronics, Sensor integration, Software Development. User Interfaces, Behavior Development and Experimental Results and System Testing. The different areas are: Mechatronics, Sensor integration, Software development, Experimental results and Basic System Testing, Behaviors Development and Advanced System Testing, User Interface and Wireless Communication.

  20. MIROS: A Hybrid Real-Time Energy-Efficient Operating System for the Resource-Constrained Wireless Sensor Nodes

    PubMed Central

    Liu, Xing; Hou, Kun Mean; de Vaulx, Christophe; Shi, Hongling; Gholami, Khalid El

    2014-01-01

    Operating system (OS) technology is significant for the proliferation of the wireless sensor network (WSN). With an outstanding OS; the constrained WSN resources (processor; memory and energy) can be utilized efficiently. Moreover; the user application development can be served soundly. In this article; a new hybrid; real-time; memory-efficient; energy-efficient; user-friendly and fault-tolerant WSN OS MIROS is designed and implemented. MIROS implements the hybrid scheduler and the dynamic memory allocator. Real-time scheduling can thus be achieved with low memory consumption. In addition; it implements a mid-layer software EMIDE (Efficient Mid-layer Software for User-Friendly Application Development Environment) to decouple the WSN application from the low-level system. The application programming process can consequently be simplified and the application reprogramming performance improved. Moreover; it combines both the software and the multi-core hardware techniques to conserve the energy resources; improve the node reliability; as well as achieve a new debugging method. To evaluate the performance of MIROS; it is compared with the other WSN OSes (TinyOS; Contiki; SOS; openWSN and mantisOS) from different OS concerns. The final evaluation results prove that MIROS is suitable to be used even on the tight resource-constrained WSN nodes. It can support the real-time WSN applications. Furthermore; it is energy efficient; user friendly and fault tolerant. PMID:25248069

  1. QOS-aware error recovery in wireless body sensor networks using adaptive network coding.

    PubMed

    Razzaque, Mohammad Abdur; Javadi, Saeideh S; Coulibaly, Yahaya; Hira, Muta Tah

    2014-12-29

    Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.

  2. MIROS: a hybrid real-time energy-efficient operating system for the resource-constrained wireless sensor nodes.

    PubMed

    Liu, Xing; Hou, Kun Mean; de Vaulx, Christophe; Shi, Hongling; El Gholami, Khalid

    2014-09-22

    Operating system (OS) technology is significant for the proliferation of the wireless sensor network (WSN). With an outstanding OS; the constrained WSN resources (processor; memory and energy) can be utilized efficiently. Moreover; the user application development can be served soundly. In this article; a new hybrid; real-time; memory-efficient; energy-efficient; user-friendly and fault-tolerant WSN OS MIROS is designed and implemented. MIROS implements the hybrid scheduler and the dynamic memory allocator. Real-time scheduling can thus be achieved with low memory consumption. In addition; it implements a mid-layer software EMIDE (Efficient Mid-layer Software for User-Friendly Application Development Environment) to decouple the WSN application from the low-level system. The application programming process can consequently be simplified and the application reprogramming performance improved. Moreover; it combines both the software and the multi-core hardware techniques to conserve the energy resources; improve the node reliability; as well as achieve a new debugging method. To evaluate the performance of MIROS; it is compared with the other WSN OSes (TinyOS; Contiki; SOS; openWSN and mantisOS) from different OS concerns. The final evaluation results prove that MIROS is suitable to be used even on the tight resource-constrained WSN nodes. It can support the real-time WSN applications. Furthermore; it is energy efficient; user friendly and fault tolerant.

  3. Dynamically allocated virtual clustering management system

    NASA Astrophysics Data System (ADS)

    Marcus, Kelvin; Cannata, Jess

    2013-05-01

    The U.S Army Research Laboratory (ARL) has built a "Wireless Emulation Lab" to support research in wireless mobile networks. In our current experimentation environment, our researchers need the capability to run clusters of heterogeneous nodes to model emulated wireless tactical networks where each node could contain a different operating system, application set, and physical hardware. To complicate matters, most experiments require the researcher to have root privileges. Our previous solution of using a single shared cluster of statically deployed virtual machines did not sufficiently separate each user's experiment due to undesirable network crosstalk, thus only one experiment could be run at a time. In addition, the cluster did not make efficient use of our servers and physical networks. To address these concerns, we created the Dynamically Allocated Virtual Clustering management system (DAVC). This system leverages existing open-source software to create private clusters of nodes that are either virtual or physical machines. These clusters can be utilized for software development, experimentation, and integration with existing hardware and software. The system uses the Grid Engine job scheduler to efficiently allocate virtual machines to idle systems and networks. The system deploys stateless nodes via network booting. The system uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex, private networks eliminating the need to map each virtual machine to a specific switch port. The system monitors the health of the clusters and the underlying physical servers and it maintains cluster usage statistics for historical trends. Users can start private clusters of heterogeneous nodes with root privileges for the duration of the experiment. Users also control when to shutdown their clusters.

  4. A low-cost test-bed for real-time landmark tracking

    NASA Astrophysics Data System (ADS)

    Csaszar, Ambrus; Hanan, Jay C.; Moreels, Pierre; Assad, Christopher

    2007-04-01

    A low-cost vehicle test-bed system was developed to iteratively test, refine and demonstrate navigation algorithms before attempting to transfer the algorithms to more advanced rover prototypes. The platform used here was a modified radio controlled (RC) car. A microcontroller board and onboard laptop computer allow for either autonomous or remote operation via a computer workstation. The sensors onboard the vehicle represent the types currently used on NASA-JPL rover prototypes. For dead-reckoning navigation, optical wheel encoders, a single axis gyroscope, and 2-axis accelerometer were used. An ultrasound ranger is available to calculate distance as a substitute for the stereo vision systems presently used on rovers. The prototype also carries a small laptop computer with a USB camera and wireless transmitter to send real time video to an off-board computer. A real-time user interface was implemented that combines an automatic image feature selector, tracking parameter controls, streaming video viewer, and user generated or autonomous driving commands. Using the test-bed, real-time landmark tracking was demonstrated by autonomously driving the vehicle through the JPL Mars yard. The algorithms tracked rocks as waypoints. This generated coordinates calculating relative motion and visually servoing to science targets. A limitation for the current system is serial computing-each additional landmark is tracked in order-but since each landmark is tracked independently, if transferred to appropriate parallel hardware, adding targets would not significantly diminish system speed.

  5. Proportional fair scheduling algorithm based on traffic in satellite communication system

    NASA Astrophysics Data System (ADS)

    Pan, Cheng-Sheng; Sui, Shi-Long; Liu, Chun-ling; Shi, Yu-Xin

    2018-02-01

    In the satellite communication network system, in order to solve the problem of low system capacity and user fairness in multi-user access to satellite communication network in the downlink, combined with the characteristics of user data service, an algorithm study on throughput capacity and user fairness scheduling is proposed - Proportional Fairness Algorithm Based on Traffic(B-PF). The algorithm is improved on the basis of the proportional fairness algorithm in the wireless communication system, taking into account the user channel condition and caching traffic information. The user outgoing traffic is considered as the adjustment factor of the scheduling priority and presents the concept of traffic satisfaction. Firstly,the algorithm calculates the priority of the user according to the scheduling algorithm and dispatches the users with the highest priority. Secondly, when a scheduled user is the business satisfied user, the system dispatches the next priority user. The simulation results show that compared with the PF algorithm, B-PF can improve the system throughput, the business satisfaction and fairness.

  6. A Seamless Handoff Scheme with Access Point Load Balance for Real-Time Services Support in 802.11 Wireless LANs

    NASA Astrophysics Data System (ADS)

    Manodham, Thavisak; Loyola, Luis; Miki, Tetsuya

    IEEE 802.11 wirelesses LANs (WLANs) have been rapidly deployed in enterprises, public areas, and households. Voice-over-IP (VoIP) and similar applications are now commonly used in mobile devices over wireless networks. Recent works have improved the quality of service (QoS) offering higher data rates to support various kinds of real-time applications. However, besides the need for higher data rates, seamless handoff and load balancing among APs are key issues that must be addressed in order to continue supporting real-time services across wireless LANs and providing fair services to all users. In this paper, we introduce a novel access point (AP) with two transceivers that improves network efficiency by supporting seamless handoff and traffic load balancing in a wireless network. In our proposed scheme, the novel AP uses the second transceiver to scan and find neighboring STAs in the transmission range and then sends the results to neighboring APs, which compare and analyze whether or not the STA should perform a handoff. The initial results from our simulations show that the novel AP module is more effective than the conventional scheme and a related work in terms of providing a handoff process with low latency and sharing traffic load with neighbor APs.

  7. Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services

    NASA Astrophysics Data System (ADS)

    Watanabe, Ryu; Tanaka, Toshiaki

    Recently, wireless LAN (WLAN) technology has become a major wireless communication method. The communication bandwidth is increasing and speeds have attained rates exceeding 100 Mbps. Therefore, WLAN technology is regarded as one of the promising communication methods for future networks. In addition, public WLAN connection services can be used in many locations. However, the number of the access points (AP) is insufficient for seamless communication and it cannot be said that users can use the service ubiquitously. An ad-hoc network style connection can be used to expand the coverage area of a public WLAN service. By relaying the user messages among the user nodes, a node can obtain an Internet connection via an AP, even though the node is located outside the AP's direct wireless connection area. Such a coverage area extending technology has many advantages thanks to the feature that no additional infrastructure is required. Therefore, there is a strong demand for this technology as it allows the cost-effective construction of future networks. When a secure ad-hoc routing protocol is used for message exchange in the WLAN service, the message routes are protected from malicious behavior such as route forging and can be maintained appropriately. To do this, however, a new node that wants to join the WLAN service has to obtain information such as the public key certificate and IP address in order to start secure ad-hoc routing. In other words, an initial setup is required for every network node to join the WLAN service properly. Ordinarily, such information should be assigned from the AP. However, new nodes cannot always contact an AP directly. Therefore, there are problems about information delivery in the initial setup of a network node. These problems originate in the multi hop connection based on the ad-hoc routing protocols. In order to realize an expanded area WLAN service, in this paper, the authors propose a secure public key certificate and address provision scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.

  8. Third Generation Wireless Phone Threat Assessment for Aircraft Communication and Navigation Radios

    NASA Technical Reports Server (NTRS)

    Nguyen, Truong X.; Koppen, Sandra V.; Smith, Laura J.; Williams, Reuben A.; Salud, Maria Theresa P.

    2005-01-01

    Radiated emissions in aircraft communication and navigation bands are measured from third generation (3G) wireless mobile phones. The two wireless technologies considered are the latest available to general consumers in the US. The measurements are conducted using reverberation chambers. The results are compared against baseline emissions from laptop computers and personal digital assistant devices that are currently allowed to operate on aircraft. Using existing interference path loss data and receivers interference threshold, a risk assessment is performed for several aircraft communication and navigation radio systems. In addition, cumulative interference effects of multiple similar devices are conservatively estimated or bounded. The effects are computed by summing the interference power from individual devices that is scaled according to the interference path loss at its location.

  9. Personal annunciation device

    DOEpatents

    Angelo, Peter [Oak Ridge, TN; Younkin, James [Oak Ridge, TN; DeMint, Paul [Kingston, TN

    2011-01-25

    A personal annunciation device (PAD) providing, in an area of interest, compensatory annunciation of the presence of an abnormal condition in a hazardous area and accountability of the user of the PAD. Compensatory annunciation supplements primary annunciation provided by an emergency notification system (ENS). A detection system detects an abnormal condition, and a wireless transmission system transmits a wireless transmission to the PAD. The PAD has a housing enclosing the components of the PAD including a communication module for receiving the wireless transmission, a power supply, processor, memory, annunciation system, and RFID module. The RFID module has an RFID receiver that listens for an RFID transmission from an RFID reader disposed in a portal of an area of interest. The PAD identifies the transmission and changes its operating state based on the transmission. The RFID readers recognize, record, and transmit the state of the PAD to a base station providing accountability of the wearer.

  10. Remote multi-function fire alarm system based on internet of things

    NASA Astrophysics Data System (ADS)

    Wang, Lihui; Zhao, Shuai; Huang, Jianqing; Ji, Jianyu

    2018-05-01

    This project uses MCU STC15W408AS (stable, energy saving, high speed), temperature sensor DS18B20 (cheap, high efficiency, stable), MQ2 resistance type semiconductor smog sensor (high stability, fast response and economy) and NRF24L01 wireless transmitting and receiving module (energy saving, small volume, reliable) as the main body to achieve concentration temperature data presentation, intelligent voice alarming and short distance wireless transmission. The whole system is safe, reliable, cheap, quick reaction and good performance. This project uses the MCU STM32F103RCT6 as the main control chip, and use WIFI module ESP8266, wireless module NRF24L01 to make the gateway. Users can remotely check and control the related devices in real-time on smartphones or computers. We can also realize the functions of intelligent fire monitoring, remote fire extinguishing, cloud data storage through the third party server Big IOT.

  11. An Inter-Networking Mechanism with Stepwise Synchronization for Wireless Sensor Networks

    PubMed Central

    Yamamoto, Hiroshi; Wakamiya, Naoki; Murata, Masayuki

    2011-01-01

    To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other. PMID:22164073

  12. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  13. Real-time long term measurement using integrated framework for ubiquitous smart monitoring

    NASA Astrophysics Data System (ADS)

    Heo, Gwanghee; Lee, Giu; Lee, Woosang; Jeon, Joonryong; Kim, Pil-Joong

    2007-04-01

    Ubiquitous monitoring combining internet technologies and wireless communication is one of the most promising technologies of infrastructure health monitoring against the natural of man-made hazards. In this paper, an integrated framework of the ubiquitous monitoring is developed for real-time long term measurement in internet environment. This framework develops a wireless sensor system based on Bluetooth technology and sends measured acceleration data to the host computer through TCP/IP protocol. And it is also designed to respond to the request of web user on real time basis. In order to verify this system, real time monitoring tests are carried out on a prototype self-anchored suspension bridge. Also, wireless measurement system is analyzed to estimate its sensing capacity and evaluate its performance for monitoring purpose. Based on the evaluation, this paper proposes the effective strategies for integrated framework in order to detect structural deficiencies and to design an early warning system.

  14. Wireless Control of Smartphones with Tongue Motion Using Tongue Drive Assistive Technology

    PubMed Central

    Kim, Jeonghee; Huo, Xueliang

    2010-01-01

    Tongue Drive System (TDS) is a noninvasive, wireless and wearable assistive technology that helps people with severe disabilities control their environments using their tongue motion. TDS translates specific tongue gestures to commands by detecting a small permanent magnetic tracer on the users’ tongue. We have linked the TDS to a smartphone (iPhone/iPod Touch) with a customized wireless module, added to the iPhone. We also migrated and ran the TDS sensor signal processing algorithm and graphical user interface on the iPhone in real time. The TDS-iPhone interface was evaluated by four able-bodied subjects for dialing 10-digit phone numbers using the standard telephone keypad and three methods of prompting the numbers: visual, auditory, and cognitive. Preliminary results showed that the interface worked quite reliably at a rate of 15.4 digits per minute, on average, with negligible errors. PMID:21096049

  15. Biomedical Wireless Ambulatory Crew Monitor

    NASA Technical Reports Server (NTRS)

    Chmiel, Alan; Humphreys, Brad

    2009-01-01

    A compact, ambulatory biometric data acquisition system has been developed for space and commercial terrestrial use. BioWATCH (Bio medical Wireless and Ambulatory Telemetry for Crew Health) acquires signals from biomedical sensors using acquisition modules attached to a common data and power bus. Several slots allow the user to configure the unit by inserting sensor-specific modules. The data are then sent real-time from the unit over any commercially implemented wireless network including 802.11b/g, WCDMA, 3G. This system has a distributed computing hierarchy and has a common data controller on each sensor module. This allows for the modularity of the device along with the tailored ability to control the cards using a relatively small master processor. The distributed nature of this system affords the modularity, size, and power consumption that betters the current state of the art in medical ambulatory data acquisition. A new company was created to market this technology.

  16. Business Applications of WAP.

    ERIC Educational Resources Information Center

    van Steenderen, Margaret

    2002-01-01

    Explains the development of WAP (wireless application protocol), how it works, and what the major advantages and disadvantages are, especially when applied to the use of information. Topics include standardization; mobile communications; the effect of WAP on business tools, electronic commerce, and information services; consumers; corporate users;…

  17. Improved Prediction Models For PCC Pavement Performance-Related Specifications, Volume II: PAVESPEC 3.0 User's Guide

    DOT National Transportation Integrated Search

    2014-01-01

    Connected vehicle wireless data communications can enable safety applications that may reduce injuries and fatalities suffered on our roads and highways, as well as enabling reductions in traffic congestion and impacts on the environment. As a critic...

  18. Wireless data collection system for travel time estimation and traffic performance evaluation.

    DOT National Transportation Integrated Search

    2010-09-01

    Having accurate and continually updated travel time and other performance data for the road and highway system has many benefits. From the perspective of the road users, having real-time updates on travel times will permit better travel and route pla...

  19. 47 CFR 95.1123 - Protection of medical equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Protection of medical equipment. 95.1123... SERVICES PERSONAL RADIO SERVICES Wireless Medical Telemetry Service (WMTS) General Provisions § 95.1123 Protection of medical equipment. The manufacturers, installers and users of WMTS equipment are cautioned that...

  20. Monitoring and Indentification Packet in Wireless With Deep Packet Inspection Method

    NASA Astrophysics Data System (ADS)

    Fali Oklilas, Ahmad; Tasmi

    2017-04-01

    Layer 2 and Layer 3 are used to make a process of network monitoring, but with the development of applications on the network such as the p2p file sharing, VoIP, encrypted, and many applications that already use the same port, it would require a system that can classify network traffics, not only based on port number classification. This paper reports the implementation of the deep packet inspection method to analyse data packets based on the packet header and payload to be used in packet data classification. If each application can be grouped based on the application layer, then we can determine the pattern of internet users and also to perform network management of computer science department. In this study, a prototype wireless network and applications SSO were developed to detect the active user. The focus is on the ability of open DPI and nDPI in detecting the payload of an application and the results are elaborated in this paper.

  1. Using Speech Recognition to Enhance the Tongue Drive System Functionality in Computer Access

    PubMed Central

    Huo, Xueliang; Ghovanloo, Maysam

    2013-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing. PMID:22255801

  2. Realtime Gas Emission Monitoring at Hazardous Sites Using a Distributed Point-Source Sensing Infrastructure.

    PubMed

    Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco

    2016-01-20

    This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant's critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events.

  3. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.

    PubMed

    Wang, Chunzhi; Zhang, Yanmei

    2015-11-01

    Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients' physiological values remotely. It is essential to ensure secure communication in WBANs because patients' physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao's scheme cannot provide real anonymity because the users' pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.

  4. Printable thermoelectric devices and conductive patterns for medical applications

    NASA Astrophysics Data System (ADS)

    Lee, Jungmin; Kim, Hyunjung; Chen, Linfeng; Choi, Sang H.; Varadan, Vijay K.

    2012-10-01

    Remote point-of-care is expected to revolutionize the modern medical practice, and many efforts have been made for the development of wireless health monitoring systems for continuously detecting the physiological signals of patients. To make the remote point-of-care generally accepted and widely used, it is necessary to develop cost-effective and durable wireless health monitoring systems. Printing technique will be helpful for the fabrication of high-quality and low-cost medical devices and systems because it allows high-resolution and high-speed fabrication, low material consumption and nano-sized patterning on both flexible and rigid substrates. Furthermore, application of thermoelectric generators can replace conventional batteries as the power sources for wireless health monitoring systems because thermoelectric generators can convert the wasted heat or the heat from nature into electricity which is required for the operation of the wireless health monitoring systems. In this research, we propose the concept of printable thermoelectric devices and conductive patterns for the realization of more portable and cost-effective medical devices. To print thermoelectric generators and conductive patterns on substrates, printing inks with special characteristics should be developed. For the development of thermoelectric inks, nano-structured thermoelectric materials are synthesized and characterized; and for the development of conductive inks, two kinds of surface treated carbon nanotubes are used as active materials.

  5. Mobile access to the Internet: from personal bubble to satellites

    NASA Astrophysics Data System (ADS)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  6. Wireless live streaming video of laparoscopic surgery: a bandwidth analysis for handheld computers.

    PubMed

    Gandsas, Alex; McIntire, Katherine; George, Ivan M; Witzke, Wayne; Hoskins, James D; Park, Adrian

    2002-01-01

    Over the last six years, streaming media has emerged as a powerful tool for delivering multimedia content over networks. Concurrently, wireless technology has evolved, freeing users from desktop boundaries and wired infrastructures. At the University of Kentucky Medical Center, we have integrated these technologies to develop a system that can wirelessly transmit live surgery from the operating room to a handheld computer. This study establishes the feasibility of using our system to view surgeries and describes the effect of bandwidth on image quality. A live laparoscopic ventral hernia repair was transmitted to a single handheld computer using five encoding speeds at a constant frame rate, and the quality of the resulting streaming images was evaluated. No video images were rendered when video data were encoded at 28.8 kilobytes per second (Kbps), the slowest encoding bitrate studied. The highest quality images were rendered at encoding speeds greater than or equal to 150 Kbps. Of note, a 15 second transmission delay was experienced using all four encoding schemes that rendered video images. We believe that the wireless transmission of streaming video to handheld computers has tremendous potential to enhance surgical education. For medical students and residents, the ability to view live surgeries, lectures, courses and seminars on handheld computers means a larger number of learning opportunities. In addition, we envision that wireless enabled devices may be used to telemonitor surgical procedures. However, bandwidth availability and streaming delay are major issues that must be addressed before wireless telementoring becomes a reality.

  7. Optical Frequency Upconversion Technique for Transmission of Wireless MIMO-Type Signals over Optical Fiber

    PubMed Central

    Shaddad, R. Q.; Mohammad, A. B.; Al-Gailani, S. A.; Al-Hetar, A. M.

    2014-01-01

    The optical fiber is well adapted to pass multiple wireless signals having different carrier frequencies by using radio-over-fiber (ROF) technique. However, multiple wireless signals which have the same carrier frequency cannot propagate over a single optical fiber, such as wireless multi-input multi-output (MIMO) signals feeding multiple antennas in the fiber wireless (FiWi) system. A novel optical frequency upconversion (OFU) technique is proposed to solve this problem. In this paper, the novel OFU approach is used to transmit three wireless MIMO signals over a 20 km standard single mode fiber (SMF). The OFU technique exploits one optical source to produce multiple wavelengths by delivering it to a LiNbO3 external optical modulator. The wireless MIMO signals are then modulated by LiNbO3 optical intensity modulators separately using the generated optical carriers from the OFU process. These modulators use the optical single-sideband with carrier (OSSB+C) modulation scheme to optimize the system performance against the fiber dispersion effect. Each wireless MIMO signal is with a 2.4 GHz or 5 GHz carrier frequency, 1 Gb/s data rate, and 16-quadrature amplitude modulation (QAM). The crosstalk between the wireless MIMO signals is highly suppressed, since each wireless MIMO signal is carried on a specific optical wavelength. PMID:24772009

  8. California DREAMing: The design of residential demand responsive technology with people in mind

    NASA Astrophysics Data System (ADS)

    Peffer, Therese Evelyn

    Electrical utilities worldwide are exploring "demand response" programs to reduce electricity consumption during peak periods. Californian electrical utilities would like to pass the higher cost of peak demand to customers to offset costs, increase reliability, and reduce peak consumption. Variable pricing strategies require technology to communicate a dynamic price to customers and respond to that price. However, evidence from thermostat and energy display studies as well as research regarding energy-saving behaviors suggests that devices cannot effect residential demand response without the sanction and participation of people. This study developed several technologies to promote or enable residential demand response. First, along with a team of students and professors, I designed and tested the Demand Response Electrical Appliance Manager (DREAM). This wireless network of sensors, actuators, and controller with a user interface provides information to intelligently control a residential heating and cooling system and to inform people of their energy usage. We tested the system with computer simulation and in the laboratory and field. Secondly, as part of my contribution to the team, I evaluated machine-learning to predict a person's seasonal temperature preferences by analyzing existing data from office workers. The third part of the research involved developing an algorithm that generated temperature setpoints based on outdoor temperature. My study compared the simulated energy use using these setpoints to that using the setpoints of a programmable thermostat. Finally, I developed and tested a user interface for a thermostat and in-home energy display. This research tested the effects of both energy versus price information and the context of sponsorship on the behavior of subjects. I also surveyed subjects on the usefulness of various displays. The wireless network succeeded in providing detailed data to enable an intelligent controller and provide feedback to the users. The learning algorithm showed mixed results. The adaptive temperature setpoints saved energy in both annual and summertime simulations. The context in which I introduced the DREAM interface affected behavior, but the type of information displayed did not. The subjects responded that appliance-level feedback and tools that provided choices would be useful in a dynamic tariff environment.

  9. Creating accessible science museums with user-activated environmental audio beacons (ping!).

    PubMed

    Landau, Steven; Wiener, William; Naghshineh, Koorosh; Giusti, Ellen

    2005-01-01

    In 2003, Touch Graphics Company carried out research on a new invention that promises to improve accessibility to science museums for visitors who are visually impaired. The system, nicknamed Ping!, allows users to navigate an exhibit area, listen to audio descriptions, and interact with exhibits using a cell phone-based interface. The system relies on computer telephony, and it incorporates a network of wireless environmental audio beacons that can be triggered by users wishing to travel to destinations they choose. User testing indicates that the system is effective, both as a way-finding tool and as a means of providing accessible information on museum content. Follow-up development projects will determine if this approach can be successfully implemented in other settings and for other user populations.

  10. A Survey of Mobile and Wireless Technologies for Augmented Reality Systems (Preprint)

    DTIC Science & Technology

    2008-02-01

    Windows XP. A number of researchers have started employing them in AR simulations such as Wagner et al [25], Newman et al [46] and specifically the Sony ...different music clubs and styles of music according to the selection and tastes of the listeners. In the intro sequence the user can select an animated...3-D character (avatar) as his or her virtual persona and visit the different music rooms in the virtual disco. Users can download or stream music in

  11. Challenge: How Effective is Routing for Wireless Networking

    DTIC Science & Technology

    2017-03-03

    sage (called a“ hello ”) to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between...these schemes. A brief description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is...counted. A cost is then assigned to the link based on how many hello messages were heard; a link that has fewer hellos successfully transmitted across

  12. Challenge: How Effective is Routing for Wireless Networking

    DTIC Science & Technology

    2015-09-07

    sage (called a“ hello ”) to all of its neighbors. If a series of hello messages are exchanged between two users, a link is considered to exist between...these schemes. A brief description of ETX is as follows. For a given window of time, the number of hello packets that a user receives from a neighbor is...counted. A cost is then assigned to the link based on how many hello messages were heard; a link that has fewer hellos successfully transmitted across

  13. Provision of Ubiquitous Tourist Information in Public Transport Networks

    PubMed Central

    García, Carmelo R.; Pérez, Ricardo; Alayón, Francisco; Quesada-Arencibia, Alexis; Padrón, Gabino

    2012-01-01

    This paper outlines an information system for tourists using collective public transport based on mobile devices with limited computation and wireless connection capacities. In this system, the mobile device collaborates with the vehicle infrastructure in order to provide the user with multimedia (visual and audio) information about his/her trip. The information delivered, adapted to the user preferences, is synchronized with the passage of vehicles through points of interest along the route, for example: bus stops, tourist sights, public service centres, etc.

  14. An Initial Look at Adjacent Band Interference Between Aeronautical Mobile Telemetry and Long-Term Evolution Wireless Service

    DTIC Science & Technology

    2016-07-04

    required analysis, and further testing. 15. SUBJECT TERMS Adjacent Channel Interference, ACI, LTE -A, LTE , PCM/FM, SOQPSK-TG, ARTM CPM, AWS-3, User...Interference, ACI, LTE -A, LTE , PCM/FM, SOQPSK-TG, ARTM CPM, AWS-3, User Equipment, UE, Evolved Node B, eNodeB, Resource Blocks INTRODUCTION “On...these questions make necessary an improved understanding of the interferers that can be obtained only by hands-on measurements . This work will

  15. Wireless technology in the ICU: boon or ban?

    PubMed Central

    Gladman, Aviv S; Lapinsky, Stephen E

    2007-01-01

    Wireless communication and data transmission are playing an increasing role in the critical care environment. Early anecdotal reports of electromagnetic interference (EMI) with intensive care unit (ICU) equipment resulted in many institutions banning these devices. An increasing literature database has more clearly defined the risks of EMI. Restrictions to the use of mobile devices are being lifted, and it has been suggested that the benefits of improved communication may outweigh the small risks. However, increased use of cellular phones and ever changing communication technologies require ongoing vigilance by healthcare device manufacturers, hospitals and device users, to prevent potentially hazardous events due to EMI. PMID:17875225

  16. Assistance System for Disabled People: A Robot Controlled by Blinking and Wireless Link

    NASA Astrophysics Data System (ADS)

    Del Val, Lara; Jiménez, María I.; Alonso, Alonso; de La Rosa, Ramón; Izquierdo, Alberto; Carrera, Albano

    Disabled people already profit from a lot of technical assistance that improves their quality of life. This article presents a system which will allow interaction between a physically disabled person and his environment. This system is controlled by voluntary muscular movements, particularly those of face muscles. These movements will be translated into machine-understandable instructions, and they will be sent by means of a wireless link to a mobile robot that will execute them. Robot includes a video camera, in order to show the user the environment of the route that the robot follows. This system gives a greater personal autonomy to people with reduced mobility.

  17. Physiologically Modulating Videogames or Simulations which Use Motion-Sensing Input Devices

    NASA Technical Reports Server (NTRS)

    Blanson, Nina Marie (Inventor); Stephens, Chad L. (Inventor); Pope, Alan T. (Inventor)

    2017-01-01

    New types of controllers allow a player to make inputs to a video game or simulation by moving the entire controller itself or by gesturing or by moving the player's body in whole or in part. This capability is typically accomplished using a wireless input device having accelerometers, gyroscopes, and a camera. The present invention exploits these wireless motion-sensing technologies to modulate the player's movement inputs to the videogame based upon physiological signals. Such biofeedback-modulated video games train valuable mental skills beyond eye-hand coordination. These psychophysiological training technologies enhance personal improvement, not just the diversion, of the user.

  18. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    DTIC Science & Technology

    2005-09-01

    consumption comparisons between 802.11 and 802.20 were conducted. The HP4700’s used a rechargeable 1800 mAh Lithium -ion internal battery and the expansion...jacket with 1840 mAh Lithium -ion internal rechargeable battery . The HP4700 has integrated WLAN 802.11b, Bluetooth®, Fast Infrared, IrDA, USB & Serial...weighs 1150 pounds and includes the weight of a 2 hour backup battery . [Ref 18] The power requirements for the RR are as follows: • +24VDC, -48VDC, 110

  19. Some dynamic resource allocation problems in wireless networks

    NASA Astrophysics Data System (ADS)

    Berry, Randall

    2001-07-01

    We consider dynamic resource allocation problems that arise in wireless networking. Specifically transmission scheduling problems are studied in cases where a user can dynamically allocate communication resources such as transmission rate and power based on current channel knowledge as well as traffic variations. We assume that arriving data is stored in a transmission buffer, and investigate the trade-off between average transmission power and average buffer delay. A general characterization of this trade-off is given and the behavior of this trade-off in the regime of asymptotically large buffer delays is explored. An extension to a more general utility based quality of service definition is also discussed.

  20. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    PubMed Central

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  1. Thermoelectric-Driven Autonomous Sensors for a Biomass Power Plant

    NASA Astrophysics Data System (ADS)

    Rodríguez, A.; Astrain, D.; Martínez, A.; Gubía, E.; Sorbet, F. J.

    2013-07-01

    This work presents the design and development of a thermoelectric generator intended to harness waste heat in a biomass power plant, and generate electric power to operate sensors and the required electronics for wireless communication. The first objective of the work is to design the optimum thermoelectric generator to harness heat from a hot surface, and generate electric power to operate a flowmeter and a wireless transmitter. The process is conducted by using a computational model, presented in previous papers, to determine the final design that meets the requirements of electric power consumption and number of transmissions per minute. Finally, the thermoelectric generator is simulated to evaluate its performance. The final device transmits information every 5 s. Moreover, it is completely autonomous and can be easily installed, since no electric wires are required.

  2. Going Digital in Rural America.

    ERIC Educational Resources Information Center

    Malecki, Edward J.

    This paper examines the extent to which rural America is digital--has access to the Internet and to newer technologies such as wireless broadband--and discusses rural supply and demand for "going digital." Supply aspects include issues of both infrastructure and public policy. Demand aspects include entrepreneurs (business users) and…

  3. A Multi-Temporal Context-Aware System for Competences Management

    ERIC Educational Resources Information Center

    Rosa, João H.; Barbosa, Jorge L.; Kich, Marcos; Brito, Lucas

    2015-01-01

    The evolution of computing technology and wireless networks has contributed to the miniaturization of mobile devices and their increase in power, providing services anywhere and anytime. In this scenario, applications have considered the user's contexts to make decisions (Context Awareness). Context-aware applications have enabled new…

  4. Measurement-Driven Characterization of the Mobile Environment

    ERIC Educational Resources Information Center

    Soroush, Hamed

    2013-01-01

    The concurrent deployment of high-quality wireless networks and large-scale cloud services offers the promise of secure ubiquitous access to seemingly limitless amount of content. However, as users' expectations have grown more demanding, the performance and connectivity failures endemic to the existing networking infrastructure have become more…

  5. Totally Implantable Wireless Ultrasonic Doppler Blood Flowmeters: Toward Accurate Miniaturized Chronic Monitors.

    PubMed

    Rothfuss, Michael A; Unadkat, Jignesh V; Gimbel, Michael L; Mickle, Marlin H; Sejdić, Ervin

    2017-03-01

    Totally implantable wireless ultrasonic blood flowmeters provide direct-access chronic vessel monitoring in hard-to-reach places without using wired bedside monitors or imaging equipment. Although wireless implantable Doppler devices are accurate for most applications, device size and implant lifetime remain vastly underdeveloped. We review past and current approaches to miniaturization and implant lifetime extension for wireless implantable Doppler devices and propose approaches to reduce device size and maximize implant lifetime for the next generation of devices. Additionally, we review current and past approaches to accurate blood flow measurements. This review points toward relying on increased levels of monolithic customization and integration to reduce size. Meanwhile, recommendations to maximize implant lifetime should include alternative sources of power, such as transcutaneous wireless power, that stand to extend lifetime indefinitely. Coupling together the results will pave the way for ultra-miniaturized totally implantable wireless blood flow monitors for truly chronic implantation. Copyright © 2016 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.

  6. An Introduction to Current Trends and Benefits of Mobile Wireless Technology Use in Higher Education

    ERIC Educational Resources Information Center

    Kim, Sang Hyun; Mims, Clif; Holmes, Kerry P.

    2006-01-01

    The development of mobile wireless technologies has generated a considerable amount of excitement among practitioners and academics because it results in shifting the academic environment from traditional settings to mobile learning (m-learning) settings. Increasing numbers of institutions of higher education offer courses using mobile wireless…

  7. Low-Complexity User Selection for Rate Maximization in MIMO Broadcast Channels with Downlink Beamforming

    PubMed Central

    Silva, Adão; Gameiro, Atílio

    2014-01-01

    We present in this work a low-complexity algorithm to solve the sum rate maximization problem in multiuser MIMO broadcast channels with downlink beamforming. Our approach decouples the user selection problem from the resource allocation problem and its main goal is to create a set of quasiorthogonal users. The proposed algorithm exploits physical metrics of the wireless channels that can be easily computed in such a way that a null space projection power can be approximated efficiently. Based on the derived metrics we present a mathematical model that describes the dynamics of the user selection process which renders the user selection problem into an integer linear program. Numerical results show that our approach is highly efficient to form groups of quasiorthogonal users when compared to previously proposed algorithms in the literature. Our user selection algorithm achieves a large portion of the optimum user selection sum rate (90%) for a moderate number of active users. PMID:24574928

  8. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios

    PubMed Central

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leyre; Astrain, José Javier; Villadangos, Jesús; Santesteban, Daniel; Falcone, Francisco

    2016-01-01

    The flexibility of new age wireless networks and the variety of sensors to measure a high number of variables, lead to new scenarios where anything can be monitored by small electronic devices, thereby implementing Wireless Sensor Networks (WSN). Thanks to ZigBee, RFID or WiFi networks the precise location of humans or animals as well as some biological parameters can be known in real-time. However, since wireless sensors must be attached to biological tissues and they are highly dispersive, propagation of electromagnetic waves must be studied to deploy an efficient and well-working network. The main goal of this work is to study the influence of wireless channel limitations in the operation of a specific pet monitoring system, validated at physical channel as well as at functional level. In this sense, radio wave propagation produced by ZigBee devices operating at the ISM 2.4 GHz band is studied through an in-house developed 3D Ray Launching simulation tool, in order to analyze coverage/capacity relations for the optimal system selection as well as deployment strategy in terms of number of transceivers and location. Furthermore, a simplified dog model is developed for simulation code, considering not only its morphology but also its dielectric properties. Relevant wireless channel information such as power distribution, power delay profile and delay spread graphs are obtained providing an extensive wireless channel analysis. A functional dog monitoring system is presented, operating over the implemented ZigBee network and providing real time information to Android based devices. The proposed system can be scaled in order to consider different types of domestic pets as well as new user based functionalities. PMID:27589751

  9. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios.

    PubMed

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leyre; Astrain, José Javier; Villadangos, Jesús; Santesteban, Daniel; Falcone, Francisco

    2016-08-30

    The flexibility of new age wireless networks and the variety of sensors to measure a high number of variables, lead to new scenarios where anything can be monitored by small electronic devices, thereby implementing Wireless Sensor Networks (WSN). Thanks to ZigBee, RFID or WiFi networks the precise location of humans or animals as well as some biological parameters can be known in real-time. However, since wireless sensors must be attached to biological tissues and they are highly dispersive, propagation of electromagnetic waves must be studied to deploy an efficient and well-working network. The main goal of this work is to study the influence of wireless channel limitations in the operation of a specific pet monitoring system, validated at physical channel as well as at functional level. In this sense, radio wave propagation produced by ZigBee devices operating at the ISM 2.4 GHz band is studied through an in-house developed 3D Ray Launching simulation tool, in order to analyze coverage/capacity relations for the optimal system selection as well as deployment strategy in terms of number of transceivers and location. Furthermore, a simplified dog model is developed for simulation code, considering not only its morphology but also its dielectric properties. Relevant wireless channel information such as power distribution, power delay profile and delay spread graphs are obtained providing an extensive wireless channel analysis. A functional dog monitoring system is presented, operating over the implemented ZigBee network and providing real time information to Android based devices. The proposed system can be scaled in order to consider different types of domestic pets as well as new user based functionalities.

  10. Wireless Phone Threat Assessment for Aircraft Communication and Navigation Radios

    NASA Technical Reports Server (NTRS)

    Nguyens, T. X.; Koppen, S. V.; Smith, L. J.; Williams, R. A.; Salud, M. T.

    2005-01-01

    Emissions in aircraft communication and navigation bands are measured for the latest generation of wireless phones. The two wireless technologies considered, GSM/GPRS and CDMA2000, are the latest available to general consumers in the U.S. A base-station simulator is used to control the phones. The measurements are conducted using reverberation chambers, and the results are compared against FCC and aircraft installed equipment emission limits. The results are also compared against baseline emissions from laptop computers and personal digital assistant devices that are currently allowed to operate on aircraft.

  11. Wireless Power Transmission to Organic Light Emitting Diode Lighting Panel with Magnetically Coupled Resonator

    NASA Astrophysics Data System (ADS)

    Kim, Yong-Hae; Han, Jun-Han; Kang, Seung-Youl; Cheon, Sanghoon; Lee, Myung-Lae; Ahn, Seong-Deok; Zyung, Taehyoung; Lee, Jeong-Ik; Moon, Jaehyun; Chu, Hye Yong

    2012-09-01

    We are successful to lit the organic light emitting diode (OLED) lighting panel through the magnetically coupled wireless power transmission technology. For the wireless power transmission, we used the operation frequency 932 kHz, specially designed double spiral type transmitter, small and thin receiver on the four layered printed circuit board, and schottky diodes for the full bridge rectifier. Our white OLED is a hybrid type, in which phosphorescent and fluorescent organics are used together to generate stable white color. The total efficiency of power transmission is around 72%.

  12. Wireless Chemical Sensor and Sensing Method for Use Therewith

    NASA Technical Reports Server (NTRS)

    Oglesby, Donald M. (Inventor); Taylor, Bryant D. (Inventor); Woodard, Stanley E. (Inventor)

    2016-01-01

    A wireless chemical sensor includes an electrical conductor and a material separated therefrom by an electric insulator. The electrical conductor is an unconnected open-circuit shaped for storage of an electric field and a magnetic field. In the presence of a time-varying magnetic field, the first electrical conductor resonates to generate harmonic electric and magnetic field responses. The material is positioned at a location lying within at least one of the electric and magnetic field responses so-generated. The material changes in electrical conductivity in the presence of a chemical-of-interest.

  13. Wireless Chemical Sensor and Sensing Method for Use Therewith

    NASA Technical Reports Server (NTRS)

    Woodard, Stanley E. (Inventor); Oglesby, Donald M. (Inventor); Taylor, Bryant Douglas (Inventor)

    2014-01-01

    A wireless chemical sensor includes an electrical conductor and a material separated therefrom by an electric insulator. The electrical conductor is an unconnected open-circuit shaped for storage of an electric field and a magnetic field. In the presence of a time-varying magnetic field, the first electrical conductor resonates to generate harmonic electric and magnetic field responses. The material is positioned at a location lying within at least one of the electric and magnetic field responses so-generated. The material changes in electrical conductivity in the presence of a chemical-of-interest.

  14. Wireless Chemical Sensing Method

    NASA Technical Reports Server (NTRS)

    Taylor, Bryant D. (Inventor); Woodard, Stanley E. (Inventor); Oglesby, Donald M. (Inventor)

    2017-01-01

    A wireless chemical sensor includes an electrical conductor and a material separated therefrom by an electric insulator. The electrical conductor is an unconnected open-circuit shaped for storage of an electric field and a magnetic field. In the presence of a time-varying magnetic field, the first electrical conductor resonates to generate harmonic electric and magnetic field responses. The material is positioned at a location lying within at least one of the electric and magnetic field responses so-generated. The material changes in electrical conductivity in the presence of a chemical-of-interest.

  15. On-line classification of pollutants in water using wireless portable electronic noses.

    PubMed

    Herrero, José Luis; Lozano, Jesús; Santos, José Pedro; Suárez, José Ignacio

    2016-06-01

    A portable electronic nose with database connection for on-line classification of pollutants in water is presented in this paper. It is a hand-held, lightweight and powered instrument with wireless communications capable of standalone operation. A network of similar devices can be configured for distributed measurements. It uses four resistive microsensors and headspace as sampling method for extracting the volatile compounds from glass vials. The measurement and control program has been developed in LabVIEW using the database connection toolkit to send the sensors data to a server for training and classification with Artificial Neural Networks (ANNs). The use of a server instead of the microprocessor of the e-nose increases the capacity of memory and the computing power of the classifier and allows external users to perform data classification. To address this challenge, this paper also proposes a web-based framework (based on RESTFul web services, Asynchronous JavaScript and XML and JavaScript Object Notation) that allows remote users to train ANNs and request classification values regardless user's location and the type of device used. Results show that the proposed prototype can discriminate the samples measured (Blank water, acetone, toluene, ammonia, formaldehyde, hydrogen peroxide, ethanol, benzene, dichloromethane, acetic acid, xylene and dimethylacetamide) with a 94% classification success rate. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Design of smart home gateway based on Wi-Fi and ZigBee

    NASA Astrophysics Data System (ADS)

    Li, Yang

    2018-04-01

    With the increasing demand for home lifestyle, the traditional smart home products have been unable to meet the needs of users. Aim at the complex wiring, high cost and difficult operation problems of traditional smart home system, this paper designs a home gateway for smart home system based on Wi-Fi and ZigBee. This paper first gives a smart home system architecture base on cloud server, Wi-Fi and ZigBee. This architecture enables users to access the smart home system remotely from Internet through the cloud server or through Wi-Fi at home. It also offers the flexibility and low cost of ZigBee wireless networking for home equipment. This paper analyzes the functional requirements of the home gateway, and designs a modular hardware architecture based on the RT5350 wireless gateway module and the CC2530 ZigBee coordinator module. Also designs the software of the home gateway, including the gateway master program and the ZigBee coordinator program. Finally, the smart home system and home gateway are tested in two kinds of network environments, internal network and external network. The test results show that the designed home gateway can meet the requirements, support remote and local access, support multi-user, support information security technology, and can timely report equipment status information.

  17. Imagining Tomorrow's Future Today

    ERIC Educational Resources Information Center

    St. George, Art

    2007-01-01

    Today, at the end of 2007, there are evident consolidations in wireless, storage, and virtualization and the path forward seems clearer now than previously. Trends from last year continue strongly, particularly Web 2.0 and the shift to user-driven environments and Internet sites where significant data and video processing is available to those…

  18. 76 FR 3892 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... potential for harmful interference to adjacent Wireless Communications Service (WCS) spectrum users by...) average equivalent isotropically radiated power (EIRP) to facilitate the flexible deployment of SDARS... qualifications of SDARS applicants or licensees to operate a station, transfer or assign a license, and to...

  19. Wireless Takes Over

    ERIC Educational Resources Information Center

    Korzeniowski, Paul

    2008-01-01

    After starting off as a simple way to provide users with access to internet resources, WiFi networks have evolved to become an important communications cornerstone for a growing number of academic institutions. Not only have colleges been working to make these networks available across their entire campuses (or at least pretty close to 100 percent…

  20. Autonomous Distributed Congestion Control Scheme in WCDMA Network

    NASA Astrophysics Data System (ADS)

    Ahmad, Hafiz Farooq; Suguri, Hiroki; Choudhary, Muhammad Qaisar; Hassan, Ammar; Liaqat, Ali; Khan, Muhammad Umer

    Wireless technology has become widely popular and an important means of communication. A key issue in delivering wireless services is the problem of congestion which has an adverse impact on the Quality of Service (QoS), especially timeliness. Although a lot of work has been done in the context of RRM (Radio Resource Management), the deliverance of quality service to the end user still remains a challenge. Therefore there is need for a system that provides real-time services to the users through high assurance. We propose an intelligent agent-based approach to guarantee a predefined Service Level Agreement (SLA) with heterogeneous user requirements for appropriate bandwidth allocation in QoS sensitive cellular networks. The proposed system architecture exploits Case Based Reasoning (CBR) technique to handle RRM process of congestion management. The system accomplishes predefined SLA through the use of Retrieval and Adaptation Algorithm based on CBR case library. The proposed intelligent agent architecture gives autonomy to Radio Network Controller (RNC) or Base Station (BS) in accepting, rejecting or buffering a connection request to manage system bandwidth. Instead of simply blocking the connection request as congestion hits the system, different buffering durations are allocated to diverse classes of users based on their SLA. This increases the opportunity of connection establishment and reduces the call blocking rate extensively in changing environment. We carry out simulation of the proposed system that verifies efficient performance for congestion handling. The results also show built-in dynamism of our system to cater for variety of SLA requirements.

Top