936 resultados para mandatory access control framework


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Given that the next and current generation networks will coexist for a considerable period of time, it is important to improve the performance of existing networks. One such improvement recently proposed is to enhance the throughput of ad hoc networks by using dual-hop relay-based transmission schemes. Since in ad hoc networks throughput is normally related to their energy consumption, it is important to examine the impact of using relay-based transmissions on energy consumption. In this paper, we present an analytical energy consumption model for dual-hop relay-based medium access control (MAC) protocols. Based on the recently reported relay-enabled Distributed Coordination Function (rDCF), we have shown the efficacy of the proposed analytical model. This is a generalized model and can be used to predict energy consumption in saturated relay-based ad hoc networks. This model can predict energy consumption in ideal environment and with transmission errors. It is shown that using a relay results in not only better throughput but also better energy efficiency. Copyright (C) 2009 Rizwan Ahmad et al.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Quadrature Phase Shift Keying (QPSK) and Dual Carrier Modulation (DCM) are currently used as the modulation schemes for Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) in the ECMA-368 defined Ultra-Wideband (UWB) radio platform. ECMA-368 has been chosen as the physical radio platform for many systems including Wireless USB (W-USB), Bluetooth 3.0 and Wireless HDMI; hence ECMA-368 is an important issue to consumer electronics and the users experience of these products. To enable the transport of high-rate USB, ECMA-368 offers up to 480 Mb/s instantaneous bit rate to the Medium Access Control (MAC) layer, but depending on radio channel conditions dropped packets unfortunately result in a lower throughput. This paper presents an alternative high data rate modulation scheme that fits within the configuration of the current standard increasing system throughput by achieving 600 Mb/s (reliable to 3.1 meters) thus maintaining the high rate USB throughput even with a moderate level of dropped packets. The modulation system is termed Dual Circular 32-QAM (DC 32-QAM). The system performance for DC 32-QAM modulation is presented and compared with 16-QAM and DCM1.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter considers the Multiband Orthogonal Frequency Division Multiplexing (MB- OFDM) modulation and demodulation with the intention to optimize the Ultra-Wideband (UWB) system performance. OFDM is a type of multicarrier modulation and becomes the most important aspect for the MB-OFDM system performance. It is also a low cost digital signal component efficiently using Fast Fourier Transform (FFT) algorithm to implement the multicarrier orthogonality. Within the MB-OFDM approach, the OFDM modulation is employed in each 528 MHz wide band to transmit the data across the different bands while also using the frequency hopping technique across different bands. Each parallel bit stream can be mapped onto one of the OFDM subcarriers. Quadrature Phase Shift Keying (QPSK) and Dual Carrier Modulation (DCM) are currently used as the modulation schemes for MB-OFDM in the ECMA-368 defined UWB radio platform. A dual QPSK soft-demapper is suitable for ECMA-368 that exploits the inherent Time-Domain Spreading (TDS) and guard symbol subcarrier diversity to improve the receiver performance, yet merges decoding operations together to minimize hardware and power requirements. There are several methods to demap the DCM, which are soft bit demapping, Maximum Likelihood (ML) soft bit demapping, and Log Likelihood Ratio (LLR) demapping. The Channel State Information (CSI) aided scheme coupled with the band hopping information is used as a further technique to improve the DCM demapping performance. ECMA-368 offers up to 480 Mb/s instantaneous bit rate to the Medium Access Control (MAC) layer, but depending on radio channel conditions dropped packets unfortunately result in a lower throughput. An alternative high data rate modulation scheme termed Dual Circular 32-QAM that fits within the configuration of the current standard increasing system throughput thus maintaining the high rate throughput even with a moderate level of dropped packets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless local area networks (WLANs) based on the IEEE 802.11 standard are now widespread. Most are used to provide access for mobile devices to a conventional wired infrastructure, and some are used where wires are not possible, forming an ad hoc network of their own. There are several varieties at the physical or radio layer (802.11, 802.11a, 802.11b, 802.11g), with each featuring different data rates, modulation schemes and transmission frequencies. However, all of them share a common medium access control (MAC) layer. As this is largely based on a contention approach, it does not allow prioritising of traffic or stations, so it cannot easily provide the quality of service (QoS) required by time-sensitive applications, such as voice or video transmission. In order to address this shortfall of the technology, the IEEE set up a task group that is aiming to enhance the MAC layer protocol so that it can provide QoS. The latest draft at the time of writing is Draft 11, dated October 2004. The article describes the yet-to-be-ratified 802.11e standard and is based on that draft.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless Body Area Networks (WBANs) consist of a number of miniaturized wearable or implanted sensor nodes that are employed to monitor vital parameters of a patient over long duration of time. These sensors capture physiological data and wirelessly transfer the collected data to a local base station in order to be further processed. Almost all of these body sensors are expected to have low data-rate and to run on a battery. Since recharging or replacing the battery is not a simple task specifically in the case of implanted devices such as pacemakers, extending the lifetime of sensor nodes in WBANs is one of the greatest challenges. To achieve this goal, WBAN systems employ low-power communication transceivers and low duty cycle Medium Access Control (MAC) protocols. Although, currently used MAC protocols are able to reduce the energy consumption of devices for transmission and reception, yet they are still unable to offer an ultimate energy self-sustaining solution for low-power MAC protocols. This paper proposes to utilize energy harvesting technologies in low-power MAC protocols. This novel approach can further reduce energy consumption of devices in WBAN systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we investigate the possibility to control a mobile robot via a sensory-motory coupling utilizing diffusion system. For this purpose, we implemented a simulation of the diffusion process of chemicals and the kinematics of the mobile robot. In comparison to the original Braitenberg vehicle in which sensorymotor coupling is tightly realised by hardwiring, our system employs the soft coupling. The mobile robot has two sets of independent sensory-motor unit, two sensors are implemented in front and two motors on each side of the robot. The framework used for the sensory-motor coupling was such that 1) Place two electrodes in the medium 2) Drop a certain amount of Chemical U and V related to the distance to the walls and the intensity of the light 3) Place other two electrodes in the medium 4) Measure the concentration of Chemical U and V to actuate the motors on both sides of the robot. The environment was constructed with four surrounding walls and a light source located at the center. Depending on the design parameters and initial conditions, the robot was able to successfully avoid the wall and light. More interestingly, the diffusion process in the sensory-motor coupling provided the robot with a simple form of memory which would not have been possible with a control framework based on a hard-wired electric circuit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient Medium Access Control (MAC) and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, the GinMAC protocol including a mobility module has been chosen, to provide the required performance such as reliability for data delivery and energy saving. Simulation results show that this modification to GinMAC can offer the required performance for the proposed healthcare application.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this thesis is to describe and analyze the geographical distribution of everyday criminality in the town of Borlänge during the year 2002 and to analyze which measures to be taken in the physical social planning to decrease this everyday criminality there. The term everyday criminality is here to be understood as those categories of crime that appear most frequently in the records of reports to the police every year. Here two kinds of crime have been in focus, thefts from cars and office burglary.In fulfilling this aim two main questions have been answered. The first one is how the everyday criminality was distributed geographically in the town of Borlänge during the year 2002. The second one is which measures to be taken in the physical social planning to decrease this everyday criminality in the town of Borlänge.In order to answer the first question a spatial autocorrelation analysis, Local Moran LISA has been used. This method is based on the measurement Moran´s I and shows the spatial autocorrelation for every single location. To answer the second question three different theories of crime prevention through environmental design have been studied and applied in the analysis. These are Jane Jacobs’ ideas about ”the living city”, Oscar Newman´s ideas about ”defensible space” and Ronald V. Clarke´s theories about crime prevention.The major conclusions that can be drawn from this thesis are that the risk of being exposed to thefts from cars, during the analyzed time period, was highest in Centrum and Hagalund and their surroundings. The lowest risk of being exposed to this type of crime was found in Domnarvet and Islingby, during the year 2002. The highest risk of being a victim of the crime office burglary was found in Hagalund and its surroundings and in the single area of Kvarnsveden. The corresponding lowest risk was found in Lergärdet and its surroundings and in Norra Backa and Kupolen. The measures that should be taken in order to decrease these types of criminality can be divided into overall changes and place-specific changes. When it comes to the crime thefts from cars a more attractive central business district, a better view of parking lots from nearby buildings, dividing of larger parking lot zones into smaller ones, migration of hidden parking lots and stronger access control to parking lots where problems with this kind of crime have occurred have been suggested as overall changes. The corresponding place-specific changes are to remove vegetation that is blocking the view, better lighting and to put up signs with information about increased risk of exposure to crime at parking lots with the most problems. To decrease the amount of office burglaries overall changes as to create a better view of the area from nearby surroundings, move bigger office compartments or divide them into smaller units, rebuild characteristic buildings and increase security by strengthening the access control to offices with these kinds of problems could be useful. Finally there are possibilities to decrease office burglary by using place-specific measures as surveillance cameras combined with signs containing information about these, high fences and better lighting around the buildings where a higher risk of being exposed to this kind of criminality is present.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to provide an overview of advances in pervasive computing.
Design/methodology/approach
– The paper provides a critical analysis of the literature.
Findings – Tools expected to support these advances are: resource location framework, data management (e.g. replica control) framework, communication paradigms, and smart interaction mechanisms. Also, infrastructures needed to support pervasive computing applications and an information appliance should be easy for anyone to use and the interaction with the device should be intuitive.
Originality/value – The paper shows how everyday devices with embedded processing and connectivity could interconnect as a pervasive network of intelligent devices that cooperatively and autonomously collect, process and transport information, in order to adapt to the associated context and activity

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research tested the effectiveness of a graphical approach to passwords. A field-experiment, in which graphical passwords were used by 185 subjects, helped to evaluate the approach. It was found that although graphical passwords were successfully used to authenticate useres, more work is required to ensure they are more usable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current parallel and distributed networks/systems are facing serious threats from network terrorism and crime, which cause huge financial loss and potential life hazard. As attacking tools are becoming more widely available, more easy-to-use, more sophisticated, and more powerful, more efforts have been made in building more effective, more intelligent, and more adaptive defense systems which are of distributed and networked nature. This special issue focuses on issues related to Network and System Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Even if the class label information is unknown, side information represents some equivalence constraints between pairs of patterns, indicating whether pairs originate from the same class. Exploiting side information, we develop algorithms to preserve both the intra-class and inter-class local structures. This new type of locality preserving projection (LPP), called LPP with side information (LPPSI), preserves the data's local structure in the sense that the close, similar training patterns will be kept close, whilst the close but dissimilar ones are separated. Our algorithms balance these conflicting requirements, and we further improve this technique using kernel methods. Experiments conducted on popular face databases demonstrate that the proposed algorithm significantly outperforms LPP. Further, we show that the performance of our algorithm with partial side information (that is, using only small amount of pair-wise similarity/dissimilarity information during training) is comparable with that when using full side information. We conclude that exploiting side information by preserving both similar and dissimilar local structures of the data significantly improves performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ability to uniquely identify individual objects is essential in many applications such as manufacturing, distribution logistics, access control, anti-counterfeiting and healthcare. Radio Frequency Identification (RFID) technology provides one solution for automatic identification of entities using radio waves. Although there is considerable potential in deploying RFID technology, reliability is a key challenge that requires careful attention for RFID to deliver its inherent benefits. In this paper, we highlight the reliability challenges in RFID technology and we analyze the reliability aspects of RFID technology and their major causes. We will also discuss techniques to improve the reliability of RFID systems.