Performance of a mobile data communication system

1991 ◽  
Vol 40 (1) ◽  
pp. 161-169 ◽  
Author(s):  
C.M. Chang
2017 ◽  
Vol 27 (04) ◽  
pp. 1850057 ◽  
Author(s):  
Uğur Erkin Kocamaz ◽  
Serdar Çiçek ◽  
Yılmaz Uyaroğlu

This work deals with the passive control-based chaos synchronization with circuit design for secure communication. First, the numerical simulation and electronic circuit design of a simple five-term chaotic system are performed. The numerical simulation and electronic circuit design outputs have confirmed each other. Then, the passive control method is applied for synchronizing two identical five-term chaotic systems using only one state control signal. After the synchronization study, design and analysis for secure communication by chaotic masking method are conducted in Matlab–Simulink platform. Finally, an electronic circuit design is performed for the designed communication system. In the designed communication system with Matlab–Simulink platform and electronic circuit design, information signal which is sent from the transmitter unit is successfully retrieved at the receiver unit. As a result, the electronic circuit design has shown that a single state passivity-based synchronization signal can be effectively used for secure data communication applications for the real environment.


Author(s):  
V M. Chavan ◽  
M M. Kuber ◽  
R J. Mukhedkar

Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different queue size for voice calls with different arrival and service rate and its results are analyzed to study the impact of buffering of voice and data calls for the proposed integrated wired network using Queuing theory and Markov chain analysis. We also propose to optimize the system characteristics in an attempt to provide better Quality of Service (QoS) for systems with integrated voice and data calls. The proposed models have two traffic flow namely voice calls (real-time traffic like audio) and data calls (data traffic like FTP). A single channel is assigned for voice and data calls. The incoming voice and data calls are queued when the channel is busy. Voice calls are delay-sensitive therefore priority is assigned to Constant Bit Rate (CBR) traffic voice request. For such systems, it is important to analyze the impact of buffering the voice calls as well as data calls for various mean arrival rates and mean service times for voice and data call requests. The impact of buffering the voice calls with different queue size, mean arrival rates and service rate are analyzed. These results of dedicated integrated voice and data communication system can be used for simulating any type of wired network. The minimum buffer or jitter required for both the traffic is calculated using Packet Delivery Fraction (PDF).


2012 ◽  
Vol 6-7 ◽  
pp. 356-360
Author(s):  
Shao Yin Wang ◽  
Yi Yu ◽  
Guo Xin Zheng ◽  
Qing Feng Ding

We study the anti-interference performance of the 802.11 system when it works as Data Communication System (DCS) in Communication Based Train Control (CBTC). We first conduct extensive experiments on a 802.11b network to assess the ability on a lab test bed, then the outdoor experiments are also conducted. In the presence of jammer, we find that in each case of interference model, there exists a C/I threshold which determine the DCS-Access Point (DCS-AP) and DCS-Station Adapter (DCS-STA) communication performance. In the outdoor environment, different interference sources are adopted to investigate the data throughput value and other parameters of the DCS system under the critical state.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1674 ◽  
Author(s):  
Daisuke Mochizuki ◽  
Yu Abiko ◽  
Takato Saito ◽  
Daizo Ikeda ◽  
Hiroshi Mineno

The demand for mobile data communication has been increasing owing to the diversification of its purposes and the increase in the number of mobile devices accessing mobile networks. Users are experiencing a degradation in communication quality due to mobile network congestion. Therefore, improving the bandwidth utilization efficiency of cellular infrastructure is crucial. We previously proposed a mobile data offloading protocol (MDOP) for improving the bandwidth utilization efficiency. Although this method balances a load of evolved node B by taking into consideration the content delay tolerance, accurately balancing the load is challenging. In this paper, we apply deep reinforcement learning to MDOP to solve the temporal locality of a traffic. Moreover, we examine and evaluate the concrete processing while considering a delay tolerance. A comparison of the proposed method and bandwidth utilization efficiency of MDOP showed that the proposed method reduced the network traffic in excess of the control target value by 35% as compared with the MDOP. Furthermore, the proposed method improved the data transmission ratio by the delay tolerance range. Consequently, the proposed method improved the bandwidth utilization efficiency by learning how to provide the bandwidth to the user equipment when MDOP cannot be used to appropriately balance a load.


2011 ◽  
pp. 1930-1939
Author(s):  
Willy Susilo

Access to mobile data and messages is essential in healthcare environment as patients and healthcare providers are mobile. This is inline with the need of ubiquitous computing in everyday life. Mobile and wireless devices can assist in ensuring patient’s safety by providing easy availability of the data at the point of care. Portability and accessibility of these devices enhances use of them in healthcare environment. However, data integrity and confidentiality of information in them need to be ensured to provide safe, effective and efficient healthcare. Mobile healthcare involves conducting healthcare related activities through using mobile devices such as a smart phone, Personal digital assistant (PDA), wireless enabled computer, iPod and so on. Mobile computing is suitable for healthcare as healthcare providers are mobile. These would be suitable for conducting patient’s healthcare activities in emergencies, ward rounds, homecare, chronic disease management, conducting clinical trials, and so on. There are various projects using mobile devices to enhance patient’s care. With the advancement of medical informatics, telemedicine and information technology, mobile data devices play an enormous role in healthcare system. In this chapter, we outline the need of mobile devices in healthcare, usage of these devices, underlying technology and applications, importance of security of these devices, securing mobile data communication in healthcare through different security models and case examples of applications that we have developed, in particular (1) iPathology tool on iPod, (2) securing healthcare information using Pocket PC 2003, and (3) securing information on handheld devices. There were several incidents in the past due to the insecurity of mobile devices that can leak information to anyone who does not have access to the information. In this chapter, we will illustrate several techniques that we have developed to protect these malicious activities and how these are applicable for securing mobile data computing in healthcare.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2810 ◽  
Author(s):  
Amir Javan-Khoshkholgh ◽  
Aydin Farajidavar

High-resolution (HR) mapping of the gastrointestinal (GI) bioelectrical activity is an emerging method to define the GI dysrhythmias such as gastroparesis and functional dyspepsia. Currently, there is no solution available to conduct HR mapping in long-term studies. We have developed an implantable 64-channel closed-loop near-field communication system for real-time monitoring of gastric electrical activity. The system is composed of an implantable unit (IU), a wearable unit (WU), and a stationary unit (SU) connected to a computer. Simultaneous data telemetry and power transfer between the IU and WU is carried out through a radio-frequency identification (RFID) link operating at 13.56 MHz. Data at the IU are encoded according to a self-clocking differential pulse position algorithm, and load shift keying modulated with only 6.25% duty cycle to be back scattered to the WU over the inductive path. The retrieved data at the WU are then either transmitted to the SU for real-time monitoring through an ISM-band RF transceiver or stored locally on a micro SD memory card. The measurement results demonstrated successful data communication at the rate of 125 kb/s when the distance between the IU and WU is less than 5 cm. The signals recorded in vitro at IU and received by SU were verified by a graphical user interface.


Sign in / Sign up

Export Citation Format

Share Document