25 resultados para Wireless data transfer


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A high resolution study of the H(e,e'K+)Λ,Σ 0 reaction was performed at Hall A, TJNAF as part of the hypernuclear experiment E94-107. One important ingredient to the measurement of the hypernuclear cross section is the elementary cross section for production of hyperons, Λ and Σ0. This reaction was studied using a hydrogen (i.e. a proton) target. Data were taken at very low Q2 (∼0.07 (GeV/c) 2) and W∼2.2 GeV. Kaons were detected along the direction of q, the momentum transferred by the incident electron (&thetas;CM∼6°). In addition, there are few data available regarding electroproduction of hyperons at low Q2 and &thetas;CM and the available theoretical models differ significantly in this kinematical region of W. The measurement of the elementary cross section was performed by scaling the Monte Carlo cross section (MCEEP) with the experimental-to-simulated yield ratio. The Monte Carlo cross section includes an experimental fit and extrapolation from the existing data for electroproduction of hyperons. Moreover, the estimated transverse component of the electroproduction cross section of H(e,e'K+)Λ was compared to the different predictions of the theoretical models and exisiting data curves for photoproductions of hyperons. None of the models fully describe the cross-section results over the entire angular range. Furthermore, measurements of the Σ 0/Λ production ratio were performed at &thetas; CM∼6°, where data are not available. Finally, data for the measurements of the differential cross sections and the Σ 0/Λ production were binned in Q2, W and &thetas;CM to understand the dependence on these variables. These results are not only a fundamental contribution to the hypernuclear spectroscopy studies but also an important experimental measurement to constrain existing theoretical models for the elementary reaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Various nondestructive testing (NDT) technologies for construction and performance monitoring have been studied for decades. Recently, the rapid evolution of wireless sensor network (WSN) technologies has enabled the development of sensors that can be embedded in concrete to monitor the structural health of infrastructure. Such sensors can be buried inside concrete and they can collect and report valuable volumetric data related to the health of a structure during and/or after construction. Wireless embedded sensors monitoring system is also a promising solution for decreasing the high installation and maintenance cost of the conventional wire based monitoring systems. Wireless monitoring sensors need to operate for long time. However, sensor batteries have finite life-time. Therefore, in order to enable long operational life of wireless sensors, novel wireless powering methods, which can charge the sensors’ rechargeable batteries wirelessly, need to be developed. The optimization of RF wireless powering of sensors embedded in concrete is studied here. First, our analytical results focus on calculating the transmission loss and propagation loss of electromagnetic waves penetrating into plain concrete at different humidity conditions for various frequencies. This analysis specifically leads to the identification of an optimum frequency range within 20–80 MHz that is validated through full-wave electromagnetic simulations. Second, the effects of various reinforced bar configurations on the efficiency of wireless powering are investigated. Specifically, effects of the following factors are studied: rebar types, rebar period, rebar radius, depth inside concrete, and offset placement. This analysis leads to the identification of the 902–928 MHz ISM band as the optimum power transmission frequency range for sensors embedded in reinforced concrete, since antennas working in this band are less sensitive to the effects of varying humidity as well as rebar configurations. Finally, optimized rectennas are designed for receiving and/or harvesting power in order to charge the rechargeable batteries of the embedded sensors. Such optimized wireless powering systems exhibit significantly larger efficiencies than the efficiencies of conventional RF wireless powering systems for sensors embedded in plain or reinforced concrete.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to examine the hypothesis that no differences existed in the upper division performance of academically excellent community college transfer students when compared to native university students. The relationship of enrollment patterns such as skipped terms, dropped terms, summer session utilization, college of major, credits attempted, credits received, test scores, and current status were also studied.^ The data were collected through a hand analysis of 673 student transcripts which provided the information for a database designed specifically for this study. The subjects were 229 transfers from Miami-Dade Community College and 444 natives from Florida International University. The students all began their studies in the lower division in the Fall term of 1982, 1983 or 1984 and eventually transferred to the upper division at FIU. This longitudinal study followed the upper division performance and enrollment patterns through the Spring term of 1991.^ Data analysis included chi-square for all categorical and numerical variables; t-tests were performed for the numerical variables. Correlation coefficients, Two-Way Analysis of Variance and Three-Way Crosstabulations were also used when indicated. There were significant differences among the upper division performance of community college transfer students and native university students for the graduation rate and the GPA range. A significant difference was also found between the math and essay CLAST scores, number of summer terms utilized, number of terms to graduation, current enrollment status, and credits attempted and received for the groups. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A high resolution study of the H(e,e'K+)Λ,Σ0 reaction was performed at Hall A, TJNAF as part of the hypernuclear experiment E94-107. One important ingredient to the measurement of the hypernuclear cross section is the elementary cross section for production of hyperons, Λ and Σ0. This reaction was studied using a hydrogen (i.e. a proton) target. Data were taken at very low Q2 (∼0.07 (GeV/c)2) and W∼2.2 GeV. Kaons were detected along the direction of q, the momentum transferred by the incident electron (θCM~6°). In addition, there are few data available regarding electroproduction of hyperons at low Q2 and θCM, and the available theoretical models differ significantly in this kinematical region of W. The measurement of the elementary cross section was performed by scaling the Monte Carlo cross section (MCEEP) with the experimental-to-simulated yield ratio. The Monte Carlo cross section includes an experimental fit and extrapolation from the existing data for electroproduction of hyperons. Moreover, the estimated transverse component of the electroproduction cross section of H(e,e'K+)Λ was compared to the different predictions of the theoretical models and exisiting data curves for photoproductions of hyperons. None of the models fully describe the cross-section results over the entire angular range. Furthermore, measurements of the Σ0/Λ production ratio were performed at θCM, where data are not available. Finally, data for the measurements of the differential cross sections and the Σ0/Λ production were binned in Q2, W and θCM to understand the dependence on these variables. These results are not only a fundamental contribution to the hypernuclear spectroscopy studies but also an important experimental measurement to constrain existing theoretical models for the elementary reaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Autism Spectrum Disorder () is defined as “the presence of severe and pervasive impairments in reciprocal social interaction and in verbal and nonverbal communication skills” (Diagnostic & Statistical Manual, 2000). It is estimated that 1 in 68 children across the United States are diagnosed with ASD. One of the most common delays that children diagnosed with ASD experience are language delays. Children with ASD that have a language delay will often develop maladaptive behaviors as a result of poor communication skills (Carr & Durand, 1985). The failure to develop mand acquisition in typical fashion results in behaviors ranging from social withdrawal to self-injurious behaviors (Cooper et. al, 2007). A lack of a strong tact repertoire can further impede and complicate the learning of other necessary components of language due to the inability to successfully label items and events in the physical environment of the child. The purpose of this study is to replicate with a reversal in verbal operant training of the procedures described in Wallace et al. (2006) in which two children with ASD underwent tact training to facilitate the formation of mands; essentially this study aims to accomplish mand training first to establish as tact. It is hypothesized that mand training will result in a greater repertoire of tacts due to strength of the relationship between mands and the control over the social environment (Cooper et al., 2007). The two children in the study will be taught to mand items that will be ranked in order of preference via stimulus preference assessment. This study is of great importance due to the indispensable value of effective social communication skills. Data gathered on improving communication skills is of great value to the ASD community as the implications for functional skills result in better communication with family and greater control of individual functioning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Autism Spectrum Disorder () is defined as “the presence of severe and pervasive impairments in reciprocal social interaction and in verbal and nonverbal communication skills” (Diagnostic & Statistical Manual, 2000). It is estimated that 1 in 68 children across the United States are diagnosed with ASD. One of the most common delays that children diagnosed with ASD experience are language delays. Children with ASD that have a language delay will often develop maladaptive behaviors as a result of poor communication skills (Carr & Durand, 1985). The failure to develop mand acquisition in typical fashion results in behaviors ranging from social withdrawal to self-injurious behaviors (Cooper et. al, 2007). A lack of a strong tact repertoire can further impede and complicate the learning of other necessary components of language due to the inability to successfully label items and events in the physical environment of the child. The purpose of this study is to replicate with a reversal in verbal operant training of the procedures described in Wallace et al. (2006) in which two children with ASD underwent tact training to facilitate the formation of mands; essentially this study aims to accomplish mand training first to establish as tact. It is hypothesized that mand training will result in a greater repertoire of tacts due to strength of the relationship between mands and the control over the social environment (Cooper et al., 2007). The two children in the study will be taught to mand items that will be ranked in order of preference via stimulus preference assessment. This study is of great importance due to the indispensable value of effective social communication skills. Data gathered on improving communication skills is of great value to the ASD community as the implications for functional skills result in better communication with family and greater control of individual functioning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The introduction of phase change material fluid and nanofluid in micro-channel heat sink design can significantly increase the cooling capacity of the heat sink because of the unique features of these two kinds of fluids. To better assist the design of a high performance micro-channel heat sink using phase change fluid and nanofluid, the heat transfer enhancement mechanism behind the flow with such fluids must be completely understood. A detailed parametric study is conducted to further investigate the heat transfer enhancement of the phase change material particle suspension flow, by using the two-phase non-thermal-equilibrium model developed by Hao and Tao (2004). The parametric study is conducted under normal conditions with Reynolds numbers of Re=600-900 and phase change material particle concentrations ¡Ü0.25 , as well as extreme conditions of very low Reynolds numbers (Re < 50) and high phase change material particle concentration (0.5-0.7) slurry flow. By using the two newly-defined parameters, named effectiveness factor and performance index, respectively, it is found that there exists an optimal relation between the channel design parameters, particle volume fraction, Reynolds number, and the wall heat flux. The influence of the particle volume fraction, particle size, and the particle viscosity, to the phase change material suspension flow, are investigated and discussed. The model was validated by available experimental data. The conclusions will assist designers in making their decisions that relate to the design or selection of a micro-pump suitable for micro or mini scale heat transfer devices. To understand the heat transfer enhancement mechanism of the nanofluid flow from the particle level, the lattice Boltzmann method is used because of its mesoscopic feature and its many numerical advantages. By using a two-component lattice Boltzmann model, the heat transfer enhancement of the nanofluid is analyzed, through incorporating the different forces acting on the nanoparticles to the two-component lattice Boltzmann model. It is found that the nanofluid has better heat transfer enhancement at low Reynolds numbers, and the Brownian motion effect of the nanoparticles will be weakened by the increase of flow speed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.