856 resultados para Load Balancing in Wireless LAN
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Polymeric insulation is an increasing tendency in projects and maintenance of electrical networks for power distribution and transmission. Electrical power devices (e. g., insulators and surge arresters) developed by using polymeric insulation presents many advantages compared to the prior power components using ceramic insulation, such as: a better performance under high pollution environment; high hydrophobicity; high resistance to mechanical, electrical and chemical stresses. The practice with silicone insulators in polluted environments has shown that the ideal performance is directly related to insulator design and polymer formulation. One of the most common misunderstandings in the design of silicone compounds for insulators is the amount of inorganic load used in their formulation. This paper attempts to clarify how the variation of the inorganic load amount affects physicochemical characteristics of different silicone compounds. The physicochemical evaluation is performed from several measurements, such as: density, hardness, elongation, tensile strength. In addition, the evaluation of the physicochemical structure is carried out using infrared test and scanning electronic microscopy (SEM). The electrical analysis is performed from the electric tracking wheel and erosion test, in agreement with the recommendation of the International Electrotechnical Commission (IEC). (C) 2014 Elsevier Ltd. All rights reserved.
Resumo:
Cognitive radio is a growing zone in wireless communication which offers an opening in complete utilization of incompetently used frequency spectrum: deprived of crafting interference for the primary (authorized) user, the secondary user is indorsed to use the frequency band. Though, scheming a model with the least interference produced by the secondary user for primary user is a perplexing job. In this study we proposed a transmission model based on error correcting codes dealing with a countable number of pairs of primary and secondary users. However, we obtain an effective utilization of spectrum by the transmission of the pairs of primary and secondary users' data through the linear codes with different given lengths. Due to the techniques of error correcting codes we developed a number of schemes regarding an appropriate bandwidth distribution in cognitive radio.
Resumo:
Distributed Virtual Environments (DVE) allow multiple users interact with a virtual world by sharing, manipulating objects. Each user has his/her own vision of this world and every changes of state of the environment are distributed among other users. Due to technological constraints, most systems for distributed virtual environments support a limited number of users. The major limitation for development of DVE scale are imposed by the communication system. As the number of users grows, the amount of bandwidth required to exchange information in real time among stations to upgrade the environment and keep it in a consistent state for all connected users. Based on this situation is proposed a framework that uses the protocol anycast in the application layer that provides a load balancing among servers in the region and aims at reducing the latency of message delivery between participants selecting the DVE server best suited for the region participant to connect to the environment
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.
Resumo:
Most of the proposed key management protocols for wireless sensor networks (WSNs) in the literature assume that a single base station is used and that the base station is trustworthy. However, there are applications in which multiple base stations are used and the security of the base stations must be considered. This paper investigates a key management protocol in wireless sensor networks which include multiple base stations. We consider the situations in which both the base stations and the sensor nodes can be compromised. The proposed key management protocol, mKeying, includes two schemes, a key distribution scheme, mKeyDist, supporting multiple base stations in the network, and a key revocation scheme, mKeyRev, used to efficiently remove the compromised nodes from the network. Our analyses show that the proposed protocol is efficient and secure against the compromise of the base stations and the sensor nodes.
Resumo:
In this paper, a cross-layer solution for packet size optimization in wireless sensor networks (WSN) is introduced such that the effects of multi-hop routing, the broadcast nature of the physical wireless channel, and the effects of error control techniques are captured. A key result of this paper is that contrary to the conventional wireless networks, in wireless sensor networks, longer packets reduce the collision probability. Consequently, an optimization solution is formalized by using three different objective functions, i.e., packet throughput, energy consumption, and resource utilization. Furthermore, the effects of end-to-end latency and reliability constraints are investigated that may be required by a particular application. As a result, a generic, cross-layer optimization framework is developed to determine the optimal packet size in WSN. This framework is further extended to determine the optimal packet size in underwater and underground sensor networks. From this framework, the optimal packet sizes under various network parameters are determined.
Resumo:
Melatonin can contribute to glucose homeostasis either by decreasing gluconeogenesis or by counteracting insulin resistance in distinct models of obesity. However, the precise mechanism through which melatonin controls glucose homeostasis is not completely understood. Male Wistar rats were administered an intracerebroventricular (icv) injection of melatonin and one of following: an icv injection of a phosphatidylinositol 3-kinase (PI3K) inhibitor, an icv injection of a melatonin receptor (MT) antagonist, or an intraperitoneal (ip) injection of a muscarinic receptor antagonist. Anesthetized rats were subjected to pyruvate tolerance test to estimate in vivo glucose clearance after pyruvate load and in situ liver perfusion to assess hepatic gluconeogenesis. The hypothalamus was removed to determine Akt phosphorylation. Melatonin injections in the central nervous system suppressed hepatic gluconeogenesis and increased hypothalamic Akt phosphorylation. These effects of melatonin were suppressed either by icv injections of PI3K inhibitors and MT antagonists and by ip injection of a muscarinic receptor antagonist. We conclude that melatonin activates hypothalamus-liver communication that may contribute to circadian adjustments of gluconeogenesis. These data further suggest a physiopathological relationship between the circadian disruptions in metabolism and reduced levels of melatonin found in type 2 diabetes patients.
Resumo:
The general aim of this dissertation is to describe and analyse how public old-age care in Sweden has developed and changed during the last century. The study applies a provider perspective on how care has been planned and professionally carried out. A broader social policy perspective, studying old-age care at central/national as well as local/municipal level, is also developed. A special focus is directed at the large local variation in care and services for the elderly. The empirical base is comprised of official documents and other public sources, survey data from interviews with elderly recipients of public old-age care, and official statistics on publicly financed and controlled old-age care and services. Study I addresses the development of old-age care in Sweden during the twentieth century by studying an important occupation in this field – the supervisors and their professional roles, tasks and working conditions. Throughout, the roles of supervisors have followed the prevailing official policy on the proper way to provide care for elderly people in Sweden; from poor relief at the beginning of the 1900s, via a generous level of services in the 1960s and 1970s, to today’s restricted and economy-controlled mode of operation. Study II describes and compares two main forms of public old-age care in Sweden today, home help services and institutional care. The care-load found in home-based care was comparable to and sometimes even larger than in service-homes and other institutions, indicating that large care needs among elderly people in Sweden today can be met in their homes as well as in institutional settings. Studies III and IV analyse the local variation in public old-age care in Sweden. During the last decades there has been an overall decline in home help services. The coverage of home help for elderly people shows large differences between municipalities throughout this period, and the relative variation has increased. The local disparity seems to depend more on historical factors, e.g., previous coverage rates, than on the present municipal situation in levels of need or local economy and politics. In an introductory part the four papers are linked together by an outline of the demographic situation and the social policy model for old-age care in Sweden. Trends that have been apparent over time, e.g. professionalisation and market orientation, are traced and discussed. Conflicts between prevailing ideologies are analysed, in regards to for instance home-based and institution-based care, social and medical culture, and local and central levels of decision-making. ’Welfare municipality’, ‘path dependency’, and ‘decentralisation’ are suggested as a conceptual framework for describing the large and increasing local variations in old-age care. Finally, implications of the four studies with regard to old-age care policy and further research are discussed.