wireless architectures
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 0)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Rushdi Hamamreh

The most important issue in integrated next generation wireless systems (NGWS) by fourth generation networks which consists of various wireless architectures extending from cellular networks to satellite networks is to allow everyone around the world to connect seamlessly to applications anywhere at any time through the best network. Heterogeneous networks have created many challenges such as mobility management, handoff, resource management. For always best connectivity the selection of parameters plays an important role in the decision of vertical handoff, some of parameters are depend upon MT and some are depend upon the network conditions . In this paper we designed Intelligent Vertical Handoff based on Fuzzy Logic Decision model ( IVH-FL), IVH-FL model which has five parameters for vertical handoff decision : Received Signal Strength (RSS), Available bandwidth (B), Users Preference (UP), Mobile Speed (SM) and Power Consumption (PC), with the help of Fuzzy Logic tool box and concept of fuzzy linguistic variables. The results confirmed improvement performance , and reduced the number of unnecessary handover .


2018 ◽  
Vol 10 (465) ◽  
pp. eaat8437 ◽  
Author(s):  
Siddharth R. Krishnan ◽  
Tyler R. Ray ◽  
Amit B. Ayer ◽  
Yinji Ma ◽  
Philipp Gutruf ◽  
...  

Hydrocephalus is a common and costly neurological condition caused by the overproduction and/or impaired resorption of cerebrospinal fluid (CSF). The current standard of care, ventricular catheters (shunts), is prone to failure, which can result in nonspecific symptoms such as headaches, dizziness, and nausea. Current diagnostic tools for shunt failure such as computed tomography (CT), magnetic resonance imaging (MRI), radionuclide shunt patency studies (RSPSs), and ice pack–mediated thermodilution have disadvantages including high cost, poor accuracy, inconvenience, and safety concerns. Here, we developed and tested a noninvasive, skin-mounted, wearable measurement platform that incorporates arrays of thermal sensors and actuators for precise, continuous, or intermittent measurements of flow through subdermal shunts, without the drawbacks of other methods. Systematic theoretical and experimental benchtop studies demonstrate high performance across a range of practical operating conditions. Advanced electronics designs serve as the basis of a wireless embodiment for continuous monitoring based on rechargeable batteries and data transmission using Bluetooth protocols. Clinical studies involving five patients validate the sensor’s ability to detect the presence of CSF flow (P= 0.012) and further distinguish between baseline flow, diminished flow, and distal shunt failure. Last, we demonstrate processing algorithms to translate measured data into quantitative flow rate. The sensor designs, fabrication schemes, wireless architectures, and patient trials reported here represent an advance in hydrocephalus diagnostics with ability to visualize flow in a simple, user-friendly mode, accessible to the physician and patient alike.


Author(s):  
Prajnamaya Dass ◽  
Pranay Kumar Saha ◽  
Hari Om

Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a serious type of attack where the attacker can target a particular user/client. To ensure security, the authors propose an improved scheme which anonymously provides secure authentication satisfying synchronization, untraceability of user and resists common attacks in a wireless network. As most of the real time security protocols use bio-metric based authentication schemes, they also propose a smartcard based secure authentication scheme for wireless networks. Their proposed schemes are proved safe under the formal security analysis of BAN logic. Both of their protocols are simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA). The simulation of their protocols under On-the-Fly-Model-Checker (OFMC) and Constant Logic based Attack Searcher (CL-AtSe) models of AVISPA results in a SAFE state. The authors have compared their proposed schemes against some of the recently proposed wireless authentication schemes in terms of attack resistivity and operational cost. Experimental results elicit a significant improvement over the existing schemes with low cost. Proposed untraceable, synchronized schemes can be applied for authentication purposes in public wireless networks, client server authentication system etc. with effective cost.


2013 ◽  
Vol 101 (11) ◽  
pp. 2381-2396 ◽  
Author(s):  
Federico Viani ◽  
Fabrizio Robol ◽  
Alessandro Polo ◽  
Paolo Rocca ◽  
Giacomo Oliveri ◽  
...  

2012 ◽  
Vol 198-199 ◽  
pp. 1783-1788
Author(s):  
Jun Ting Lin ◽  
Jian Wu Dang

As a dedicated digital mobile communication system designed for railway application, GSM-R must provide reliable bidirectional channel for transmitting security data between trackside equipments and on-train computer on high-speed railways. To ensure the safety of running trains, redundant network architecture is commonly used to guarantee the reliability of GSM-R. Because of the rigid demands of railway security, it is important to build reliability mathematical models, predict the network reliability and select a suitable one. Two common GSM-R wireless architectures, co-sited double layers network and intercross single layer network, are modeled and contrasted in this paper. By calculating the reliabilities of each reliable model, it is clear that more redundant the architecture is, more reliable the system will be, the whole system will bear a less failure time per year as the benefit. Meanwhile, as the redundancy of GSM-R system raises, its equipment and maintenance will cost much, but the reliability raise gently. From the standpoint of transmission system interruption and network equipment failure, the reliability of co-sited double layer network architecture is higher than the intercross single layer one, while the viability and cost of the intercross redundant network is better than co-sited one in natural disasters such as flood and lightning. Taking fully into account reliability, viability and cost, we suggest that intercross redundant network should be chosen on high-speed railway.


Author(s):  
Pasquale Pace ◽  
Gianluca Aloi

Nowadays, due to the increasing demands of the fast-growing Consumer Electronics (CEs) market, more powerful mobile consumer devices are being introduced continuously; thanks to this evolution of CEs technologies, many sophisticated pervasive applications start to be developed and applied to context and location aware scenarios. This chapter explores applications and a real world case-study of pervasive computing by means of a flexible communication architecture well suited for the interactive enjoyment of historical and artistic contents and built on top of a wireless network infrastructure. The designed system and the implemented low cost testbed integrate different communication technologies such as Wi-Fi, Bluetooth, and GPS with the aim of offering, in a transparent and reliable way, a mixed set of different multimedia and Augmented Reality (AR) contents to mobile users equipped with handheld devices. This communication architecture represents a first solid step to provide network support to pervasive context-aware applications pushing the ubiquitous computing paradigm into reality.


Sign in / Sign up

Export Citation Format

Share Document