904 resultados para Wireless data transfer
Resumo:
The tragic events of September 11th ushered a new era of unprecedented challenges. Our nation has to be protected from the alarming threats of adversaries. These threats exploit the nation's critical infrastructures affecting all sectors of the economy. There is the need for pervasive monitoring and decentralized control of the nation's critical infrastructures. The communications needs of monitoring and control of critical infrastructures was traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used contention access protocols which results in high unsuccessful transmission and delay. An emerging class of wireless networks, named embedded wireless sensor and actuator networks has potential benefits for real-time monitoring and control of critical infrastructures. The use of embedded wireless networks for monitoring and control of critical infrastructures requires secure, reliable and timely exchange of information among controllers, distributed sensors and actuators. The exchange of information is over shared wireless media. However, wireless media is highly unpredictable due to path loss, shadow fading and ambient noise. Monitoring and control applications have stringent requirements on reliability, delay and security. The primary issue addressed in this dissertation is the impact of wireless media in harsh industrial environment on the reliable and timely delivery of critical data. In the first part of the dissertation, a combined networking and information theoretic approach was adopted to determine the transmit power required to maintain a minimum wireless channel capacity for reliable data transmission. The second part described a channel-aware scheduling scheme that ensured efficient utilization of the wireless link and guaranteed delay. Various analytical evaluations and simulations are used to evaluate and validate the feasibility of the methodologies and demonstrate that the protocols achieved reliable and real-time data delivery in wireless industrial networks.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
This dissertation established a software-hardware integrated design for a multisite data repository in pediatric epilepsy. A total of 16 institutions formed a consortium for this web-based application. This innovative fully operational web application allows users to upload and retrieve information through a unique human-computer graphical interface that is remotely accessible to all users of the consortium. A solution based on a Linux platform with My-SQL and Personal Home Page scripts (PHP) has been selected. Research was conducted to evaluate mechanisms to electronically transfer diverse datasets from different hospitals and collect the clinical data in concert with their related functional magnetic resonance imaging (fMRI). What was unique in the approach considered is that all pertinent clinical information about patients is synthesized with input from clinical experts into 4 different forms, which were: Clinical, fMRI scoring, Image information, and Neuropsychological data entry forms. A first contribution of this dissertation was in proposing an integrated processing platform that was site and scanner independent in order to uniformly process the varied fMRI datasets and to generate comparative brain activation patterns. The data collection from the consortium complied with the IRB requirements and provides all the safeguards for security and confidentiality requirements. An 1-MR1-based software library was used to perform data processing and statistical analysis to obtain the brain activation maps. Lateralization Index (LI) of healthy control (HC) subjects in contrast to localization-related epilepsy (LRE) subjects were evaluated. Over 110 activation maps were generated, and their respective LIs were computed yielding the following groups: (a) strong right lateralization: (HC=0%, LRE=18%), (b) right lateralization: (HC=2%, LRE=10%), (c) bilateral: (HC=20%, LRE=15%), (d) left lateralization: (HC=42%, LRE=26%), e) strong left lateralization: (HC=36%, LRE=31%). Moreover, nonlinear-multidimensional decision functions were used to seek an optimal separation between typical and atypical brain activations on the basis of the demographics as well as the extent and intensity of these brain activations. The intent was not to seek the highest output measures given the inherent overlap of the data, but rather to assess which of the many dimensions were critical in the overall assessment of typical and atypical language activations with the freedom to select any number of dimensions and impose any degree of complexity in the nonlinearity of the decision space.
Resumo:
Digital systems can generate left and right audio channels that create the effect of virtual sound source placement (spatialization) by processing an audio signal through pairs of Head-Related Transfer Functions (HRTFs) or, equivalently, Head-Related Impulse Responses (HRIRs). The spatialization effect is better when individually-measured HRTFs or HRIRs are used than when generic ones (e.g., from a mannequin) are used. However, the measurement process is not available to the majority of users. There is ongoing interest to find mechanisms to customize HRTFs or HRIRs to a specific user, in order to achieve an improved spatialization effect for that subject. Unfortunately, the current models used for HRTFs and HRIRs contain over a hundred parameters and none of those parameters can be easily related to the characteristics of the subject. This dissertation proposes an alternative model for the representation of HRTFs, which contains at most 30 parameters, all of which have a defined functional significance. It also presents methods to obtain the value of parameters in the model to make it approximately equivalent to an individually-measured HRTF. This conversion is achieved by the systematic deconstruction of HRIR sequences through an augmented version of the Hankel Total Least Squares (HTLS) decomposition approach. An average 95% match (fit) was observed between the original HRIRs and those re-constructed from the Damped and Delayed Sinusoids (DDSs) found by the decomposition process, for ipsilateral source locations. The dissertation also introduces and evaluates an HRIR customization procedure, based on a multilinear model implemented through a 3-mode tensor, for mapping of anatomical data from the subjects to the HRIR sequences at different sound source locations. This model uses the Higher-Order Singular Value Decomposition (HOSVD) method to represent the HRIRs and is capable of generating customized HRIRs from easily attainable anatomical measurements of a new intended user of the system. Listening tests were performed to compare the spatialization performance of customized, generic and individually-measured HRIRs when they are used for synthesized spatial audio. Statistical analysis of the results confirms that the type of HRIRs used for spatialization is a significant factor in the spatialization success, with the customized HRIRs yielding better results than generic HRIRs.
Resumo:
This dissertation presents a system-wide approach, based on genetic algorithms, for the optimization of transfer times for an entire bus transit system. Optimization of transfer times in a transit system is a complicated problem because of the large set of binary and discrete values involved. The combinatorial nature of the problem imposes a computational burden and makes it difficult to solve by classical mathematical programming methods. ^ The genetic algorithm proposed in this research attempts to find an optimal solution for the transfer time optimization problem by searching for a combination of adjustments to the timetable for all the routes in the system. It makes use of existing scheduled timetables, ridership demand at all transfer locations, and takes into consideration the randomness of bus arrivals. ^ Data from Broward County Transit are used to compute total transfer times. The proposed genetic algorithm-based approach proves to be capable of producing substantial time savings compared to the existing transfer times in a reasonable amount of time. ^ The dissertation also addresses the issues related to spatial and temporal modeling, variability in bus arrival and departure times, walking time, as well as the integration of scheduling and ridership data. ^
Resumo:
A high resolution study of the H(e,e'K+)Λ,Σ 0 reaction was performed at Hall A, TJNAF as part of the hypernuclear experiment E94-107. One important ingredient to the measurement of the hypernuclear cross section is the elementary cross section for production of hyperons, Λ and Σ0. This reaction was studied using a hydrogen (i.e. a proton) target. Data were taken at very low Q2 (∼0.07 (GeV/c) 2) and W∼2.2 GeV. Kaons were detected along the direction of q, the momentum transferred by the incident electron (&thetas;CM∼6°). In addition, there are few data available regarding electroproduction of hyperons at low Q2 and &thetas;CM and the available theoretical models differ significantly in this kinematical region of W. The measurement of the elementary cross section was performed by scaling the Monte Carlo cross section (MCEEP) with the experimental-to-simulated yield ratio. The Monte Carlo cross section includes an experimental fit and extrapolation from the existing data for electroproduction of hyperons. Moreover, the estimated transverse component of the electroproduction cross section of H(e,e'K+)Λ was compared to the different predictions of the theoretical models and exisiting data curves for photoproductions of hyperons. None of the models fully describe the cross-section results over the entire angular range. Furthermore, measurements of the Σ 0/Λ production ratio were performed at &thetas; CM∼6°, where data are not available. Finally, data for the measurements of the differential cross sections and the Σ 0/Λ production were binned in Q2, W and &thetas;CM to understand the dependence on these variables. These results are not only a fundamental contribution to the hypernuclear spectroscopy studies but also an important experimental measurement to constrain existing theoretical models for the elementary reaction.
Resumo:
Various nondestructive testing (NDT) technologies for construction and performance monitoring have been studied for decades. Recently, the rapid evolution of wireless sensor network (WSN) technologies has enabled the development of sensors that can be embedded in concrete to monitor the structural health of infrastructure. Such sensors can be buried inside concrete and they can collect and report valuable volumetric data related to the health of a structure during and/or after construction. Wireless embedded sensors monitoring system is also a promising solution for decreasing the high installation and maintenance cost of the conventional wire based monitoring systems. Wireless monitoring sensors need to operate for long time. However, sensor batteries have finite life-time. Therefore, in order to enable long operational life of wireless sensors, novel wireless powering methods, which can charge the sensors’ rechargeable batteries wirelessly, need to be developed. The optimization of RF wireless powering of sensors embedded in concrete is studied here. First, our analytical results focus on calculating the transmission loss and propagation loss of electromagnetic waves penetrating into plain concrete at different humidity conditions for various frequencies. This analysis specifically leads to the identification of an optimum frequency range within 20–80 MHz that is validated through full-wave electromagnetic simulations. Second, the effects of various reinforced bar configurations on the efficiency of wireless powering are investigated. Specifically, effects of the following factors are studied: rebar types, rebar period, rebar radius, depth inside concrete, and offset placement. This analysis leads to the identification of the 902–928 MHz ISM band as the optimum power transmission frequency range for sensors embedded in reinforced concrete, since antennas working in this band are less sensitive to the effects of varying humidity as well as rebar configurations. Finally, optimized rectennas are designed for receiving and/or harvesting power in order to charge the rechargeable batteries of the embedded sensors. Such optimized wireless powering systems exhibit significantly larger efficiencies than the efficiencies of conventional RF wireless powering systems for sensors embedded in plain or reinforced concrete.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
The purpose of this study was to examine the hypothesis that no differences existed in the upper division performance of academically excellent community college transfer students when compared to native university students. The relationship of enrollment patterns such as skipped terms, dropped terms, summer session utilization, college of major, credits attempted, credits received, test scores, and current status were also studied.^ The data were collected through a hand analysis of 673 student transcripts which provided the information for a database designed specifically for this study. The subjects were 229 transfers from Miami-Dade Community College and 444 natives from Florida International University. The students all began their studies in the lower division in the Fall term of 1982, 1983 or 1984 and eventually transferred to the upper division at FIU. This longitudinal study followed the upper division performance and enrollment patterns through the Spring term of 1991.^ Data analysis included chi-square for all categorical and numerical variables; t-tests were performed for the numerical variables. Correlation coefficients, Two-Way Analysis of Variance and Three-Way Crosstabulations were also used when indicated. There were significant differences among the upper division performance of community college transfer students and native university students for the graduation rate and the GPA range. A significant difference was also found between the math and essay CLAST scores, number of summer terms utilized, number of terms to graduation, current enrollment status, and credits attempted and received for the groups. ^
Resumo:
A high resolution study of the H(e,e'K+)Λ,Σ0 reaction was performed at Hall A, TJNAF as part of the hypernuclear experiment E94-107. One important ingredient to the measurement of the hypernuclear cross section is the elementary cross section for production of hyperons, Λ and Σ0. This reaction was studied using a hydrogen (i.e. a proton) target. Data were taken at very low Q2 (∼0.07 (GeV/c)2) and W∼2.2 GeV. Kaons were detected along the direction of q, the momentum transferred by the incident electron (θCM~6°). In addition, there are few data available regarding electroproduction of hyperons at low Q2 and θCM, and the available theoretical models differ significantly in this kinematical region of W. The measurement of the elementary cross section was performed by scaling the Monte Carlo cross section (MCEEP) with the experimental-to-simulated yield ratio. The Monte Carlo cross section includes an experimental fit and extrapolation from the existing data for electroproduction of hyperons. Moreover, the estimated transverse component of the electroproduction cross section of H(e,e'K+)Λ was compared to the different predictions of the theoretical models and exisiting data curves for photoproductions of hyperons. None of the models fully describe the cross-section results over the entire angular range. Furthermore, measurements of the Σ0/Λ production ratio were performed at θCM, where data are not available. Finally, data for the measurements of the differential cross sections and the Σ0/Λ production were binned in Q2, W and θCM to understand the dependence on these variables. These results are not only a fundamental contribution to the hypernuclear spectroscopy studies but also an important experimental measurement to constrain existing theoretical models for the elementary reaction.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Autism Spectrum Disorder () is defined as “the presence of severe and pervasive impairments in reciprocal social interaction and in verbal and nonverbal communication skills” (Diagnostic & Statistical Manual, 2000). It is estimated that 1 in 68 children across the United States are diagnosed with ASD. One of the most common delays that children diagnosed with ASD experience are language delays. Children with ASD that have a language delay will often develop maladaptive behaviors as a result of poor communication skills (Carr & Durand, 1985). The failure to develop mand acquisition in typical fashion results in behaviors ranging from social withdrawal to self-injurious behaviors (Cooper et. al, 2007). A lack of a strong tact repertoire can further impede and complicate the learning of other necessary components of language due to the inability to successfully label items and events in the physical environment of the child. The purpose of this study is to replicate with a reversal in verbal operant training of the procedures described in Wallace et al. (2006) in which two children with ASD underwent tact training to facilitate the formation of mands; essentially this study aims to accomplish mand training first to establish as tact. It is hypothesized that mand training will result in a greater repertoire of tacts due to strength of the relationship between mands and the control over the social environment (Cooper et al., 2007). The two children in the study will be taught to mand items that will be ranked in order of preference via stimulus preference assessment. This study is of great importance due to the indispensable value of effective social communication skills. Data gathered on improving communication skills is of great value to the ASD community as the implications for functional skills result in better communication with family and greater control of individual functioning.
Resumo:
Autism Spectrum Disorder () is defined as “the presence of severe and pervasive impairments in reciprocal social interaction and in verbal and nonverbal communication skills” (Diagnostic & Statistical Manual, 2000). It is estimated that 1 in 68 children across the United States are diagnosed with ASD. One of the most common delays that children diagnosed with ASD experience are language delays. Children with ASD that have a language delay will often develop maladaptive behaviors as a result of poor communication skills (Carr & Durand, 1985). The failure to develop mand acquisition in typical fashion results in behaviors ranging from social withdrawal to self-injurious behaviors (Cooper et. al, 2007). A lack of a strong tact repertoire can further impede and complicate the learning of other necessary components of language due to the inability to successfully label items and events in the physical environment of the child. The purpose of this study is to replicate with a reversal in verbal operant training of the procedures described in Wallace et al. (2006) in which two children with ASD underwent tact training to facilitate the formation of mands; essentially this study aims to accomplish mand training first to establish as tact. It is hypothesized that mand training will result in a greater repertoire of tacts due to strength of the relationship between mands and the control over the social environment (Cooper et al., 2007). The two children in the study will be taught to mand items that will be ranked in order of preference via stimulus preference assessment. This study is of great importance due to the indispensable value of effective social communication skills. Data gathered on improving communication skills is of great value to the ASD community as the implications for functional skills result in better communication with family and greater control of individual functioning.
Resumo:
In this study we present a global distribution pattern and budget of the minimum flux of particulate organic carbon to the sea floor (J POC alpha). The estimations are based on regionally specific correlations between the diffusive oxygen flux across the sediment-water interface, the total organic carbon content in surface sediments, and the oxygen concentration in bottom waters. For this, we modified the principal equation of Cai and Reimers [1995] as a basic monod reaction rate, applied within 11 regions where in situ measurements of diffusive oxygen uptake exist. By application of the resulting transfer functions to other regions with similar sedimentary conditions and areal interpolation, we calculated a minimum global budget of particulate organic carbon that actually reaches the sea floor of ~0.5 GtC yr**-1 (>1000 m water depth (wd)), whereas approximately 0.002-0.12 GtC yr**-1 is buried in the sediments (0.01-0.4% of surface primary production). Despite the fact that our global budget is in good agreement with previous studies, we found conspicuous differences among the distribution patterns of primary production, calculations based on particle trap collections of the POC flux, and J POC alpha of this study. These deviations, especially located at the southeastern and southwestern Atlantic Ocean, the Greenland and Norwegian Sea and the entire equatorial Pacific Ocean, strongly indicate a considerable influence of lateral particle transport on the vertical link between surface waters and underlying sediments. This observation is supported by sediment trap data. Furthermore, local differences in the availability and quality of the organic matter as well as different transport mechanisms through the water column are discussed.
Resumo:
A RET network consists of a network of photo-active molecules called chromophores that can participate in inter-molecular energy transfer called resonance energy transfer (RET). RET networks are used in a variety of applications including cryptographic devices, storage systems, light harvesting complexes, biological sensors, and molecular rulers. In this dissertation, we focus on creating a RET device called closed-diffusive exciton valve (C-DEV) in which the input to output transfer function is controlled by an external energy source, similar to a semiconductor transistor like the MOSFET. Due to their biocompatibility, molecular devices like the C-DEVs can be used to introduce computing power in biological, organic, and aqueous environments such as living cells. Furthermore, the underlying physics in RET devices are stochastic in nature, making them suitable for stochastic computing in which true random distribution generation is critical.
In order to determine a valid configuration of chromophores for the C-DEV, we developed a systematic process based on user-guided design space pruning techniques and built-in simulation tools. We show that our C-DEV is 15x better than C-DEVs designed using ad hoc methods that rely on limited data from prior experiments. We also show ways in which the C-DEV can be improved further and how different varieties of C-DEVs can be combined to form more complex logic circuits. Moreover, the systematic design process can be used to search for valid chromophore network configurations for a variety of RET applications.
We also describe a feasibility study for a technique used to control the orientation of chromophores attached to DNA. Being able to control the orientation can expand the design space for RET networks because it provides another parameter to tune their collective behavior. While results showed limited control over orientation, the analysis required the development of a mathematical model that can be used to determine the distribution of dipoles in a given sample of chromophore constructs. The model can be used to evaluate the feasibility of other potential orientation control techniques.