22 resultados para Direct access sensor
Resumo:
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major portion of a WSN node’s power consumption, researchers have proposed Energy-Efficient Medium Access (E2-MAC) protocols that switch the radio transceiver off for a major part of the time. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (throughput, latency, reliability). Today’s E2-MAC protocols are able to deliver little amounts of data with a low energy footprint, but introduce severe restrictions with respect to throughput and latency. Regrettably, they yet fail to adapt to varying traffic load at run-time. This paper presents MaxMAC, an E2-MAC protocol that targets at achieving maximal adaptivity with respect to throughput and latency. By adaptively tuning essential parameters at run-time, the protocol reaches the throughput and latency of energy-unconstrained CSMA in high-traffic phases, while still exhibiting a high energy-efficiency in periods of sparse traffic. The paper compares the protocol against a selection of today’s E2-MAC protocols and evaluates its advantages and drawbacks.
Resumo:
The paper presents a link layer stack for wireless sensor networks, which consists of the Burst-aware Energy-efficient Adaptive Medium access control (BEAM) and the Hop-to-Hop Reliability (H2HR) protocol. BEAM can operate with short beacons to announce data transmissions or include data within the beacons. Duty cycles can be adapted by a traffic prediction mechanism indicating pending packets destined for a node and by estimating its wake-up times. H2HR takes advantage of information provided by BEAM such as neighbour information and transmission information to perform per-hop congestion control. We justify the design decisions by measurements in a real-world wireless sensor network testbed and compare the performance with other link layer protocols.
Resumo:
The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP). Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.
Resumo:
RESTful services gained a lot of attention recently, even in the enterprise world, which is traditionally more web-service centric. Data centric RESfFul services, as previously mainly known in web environments, established themselves as a second paradigm complementing functional WSDL-based SOA. In the Internet of Things, and in particular when talking about sensor motes, the Constraint Application Protocol (CoAP) is currently in the focus of both research and industry. In the enterprise world a protocol called OData (Open Data Protocol) is becoming the future RESTful data access standard. To integrate sensor motes seamlessly into enterprise networks, an embedded OData implementation on top of CoAP is desirable, not requiring an intermediary gateway device. In this paper we introduce and evaluate an embedded OData implementation. We evaluate the OData protocol in terms of performance and energy consumption, considering different data encodings, and compare it to a pure CoAP implementation. We were able to demonstrate that the additional resources needed for an OData/JSON implementation are reasonable when aiming for enterprise interoperability, where OData is suggested to solve both the semantic and technical interoperability problems we have today when connecting systems
Resumo:
An odorant's code is represented by activity in a dispersed ensemble of olfactory sensory neurons in the nose, activation of a specific combination of groups of mitral cells in the olfactory bulb and is considered to be mapped at divergent locations in the olfactory cortex. We present here an in vitro model of the mammalian olfactory system developed to gain easy access to all stations of the olfactory pathway. Mouse olfactory epithelial explants are cocultured with a brain slice that includes the olfactory bulb and olfactory cortex areas and maintains the central olfactory pathway intact and functional. Organotypicity of bulb and cortex is preserved and mitral cell axons can be traced to their target areas. Calcium imaging shows propagation of mitral cell activity to the piriform cortex. Long term coculturing with postnatal olfactory epithelial explants restores the peripheral olfactory pathway. Olfactory receptor neurons renew and progressively acquire a mature phenotype. Axons of olfactory receptor neurons grow out of the explant and rewire into the olfactory bulb. The extent of reinnervation exhibits features of a postlesion recovery. Functional imaging confirms the recovery of part of the peripheral olfactory pathway and shows that activity elicited in olfactory receptor neurons or the olfactory nerves is synaptically propagated into olfactory cortex areas. This model is the first attempt to reassemble a sensory system in culture, from the peripheral sensor to the site of cortical representation. It will increase our knowledge on how neuronal circuits in the central olfactory areas integrate sensory input and counterbalance damage.
Resumo:
OBJECTIVES: To compare the practicability, visualization of structures, and iatrogenic damage of direct and transthecal approaches to the navicular bursa for diagnostic needle endoscopy. STUDY DESIGN: Descriptive study. SAMPLE POPULATION: Equine cadaver forelimbs (n = 30). METHODS: Direct and transthecal approaches for insertion of a needle endoscope into the navicular bursa were performed. Video recordings of endoscopic procedures were assessed to determine all structures visualized within the navicular bursa. Number of attempts to gain access to the navicular bursa and total time for insertion and examination were recorded. Distribution and severity of iatrogenic lesions were assessed and scored after dissection. RESULTS: There were no statistical differences for number of attempts or time needed for insertion and examination between direct and transthecal approaches. The direct approach offered significantly increased visibility of the ipsilateral abaxial and proximal margins of the navicular bone, and ipsilateral collateral sesamoidean ligament. Iatrogenic lesions were superficial and focal, regardless of approach taken, or whether a blunt or sharp trocar tip was used. CONCLUSIONS: The direct approach provided significantly better visualization of the ipsilateral structures within the navicular bursa compared to the transthecal approach. Needle endoscopy offers a reliable technique to evaluate the navicular bursa and may complement or replace other diagnostic modalities in horses with lameness localized to the navicular region.