960 resultados para Free space communication
Resumo:
Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.
Resumo:
Securing group communication in wireless sensor networks has recently been extensively investigated. Many works have addressed this issue, and they have considered the grouping concept differently. In this paper, we consider a group as being a set of nodes sensing the same data type, and we alternatively propose an efficient secure group communication scheme guaranteeing secure group management and secure group key distribution. The proposed scheme (RiSeG) is based on a logical ring architecture, which permits to alleviate the group controller’s task in updating the group key. The proposed scheme also provides backward and forward secrecy, addresses the node compromise attack, and gives a solution to detect and eliminate the compromised nodes. The security analysis and performance evaluation show that the proposed scheme is secure, highly efficient, and lightweight. A comparison with the logical key hierarchy is preformed to prove the rekeying process efficiency of RiSeG. Finally, we present the implementation details of RiSeG on top of TelosB sensor nodes to demonstrate its feasibility.
Resumo:
Consider a single processor and a software system. The software system comprises components and interfaces where each component has an associated interface and each component comprises a set of constrained-deadline sporadic tasks. A scheduling algorithm (called global scheduler) determines at each instant which component is active. The active component uses another scheduling algorithm (called local scheduler) to determine which task is selected for execution on the processor. The interface of a component makes certain information about a component visible to other components; the interfaces of all components are used for schedulability analysis. We address the problem of generating an interface for a component based on the tasks inside the component. We desire to (i) incur only a small loss in schedulability analysis due to the interface and (ii) ensure that the amount of space (counted in bits) of the interface is small; this is because such an interface hides as much details of the component as possible. We present an algorithm for generating such an interface.
Resumo:
It is widely assumed that scheduling real-time tasks becomes more difficult as their deadlines get shorter. With deadlines shorter, however, tasks potentially compete less with each other for processors, and this could produce more contention-free slots at which the number of competing tasks is smaller than or equal to the number of available processors. This paper presents a policy (called CF policy) that utilizes such contention-free slots effectively. This policy can be employed by any work-conserving, preemptive scheduling algorithm, and we show that any algorithm extended with this policy dominates the original algorithm in terms of schedulability. We also present improved schedulability tests for algorithms that employ this policy, based on the observation that interference from tasks is reduced when their executions are postponed to contention-free slots. Finally, using the properties of the CF policy, we derive a counter-intuitive claim that shortening of task deadlines can help improve schedulability of task systems. We present heuristics that effectively reduce task deadlines for better scheduability without performing any exhaustive search.
Resumo:
"Many-core” systems based on the Network-on- Chip (NoC) architecture have brought into the fore-front various opportunities and challenges for the deployment of real-time systems. Such real-time systems need timing guarantees to be fulfilled. Therefore, calculating upper-bounds on the end-to-end communication delay between system components is of primary interest. In this work, we identify the limitations of an existing approach proposed by [1] and propose different techniques to overcome these limitations.
Resumo:
Quando um líquido evita a cristalização durante o arrefecimento, diz-se que entra no estado sobrearrefecido. Se a temperatura continuar a diminuir, o consequente aumento da viscosidade reflecte-se na mobilidade molecular de tal maneira que os tempos característicos se tornam da mesma ordem de grandeza que os tempos acessíveis experimentalmente. Se o arrefecimento continuar, o líquido altamente viscoso acaba por vitrificar, i.e. entra no estado vítreo onde apenas os movimentos locais são permitidos. Os monómeros da família n -etileno glicol dimetacrilato ( n -EGDMA, para n = 1 até 4, que constituem o objecto deste estudo, facilmente evitam a cristalização, sendo pois bons candidatos para estudar a mobilidade molecular nos estados sobrearrefecido e vítreo. A Espectroscopia de Relaxação Dieléctrica (DRS) foi a técnica escolhida para obter informação detalhada sobre a sua dinâmica molecular (Capítulos 1 e 2). A primeira parte deste trabalho consistiu na caracterização dieléctrica dos processos de relaxação existentes acima e abaixo da temperatura de transição vítrea (g T ), a qual aumenta com o aumento do peso molecular (w M ), sendo este resultado confirmado por Calorimetria Diferencial de Varrimento (DSC). No que respeita ao processo cooperativo a , associado à transição vítrea, e ao processo secundário b, observa-se uma dependência com w M , enquanto que o outro processo secundário, g , aparenta ser independente deste factor (Capítulo 3). Nos capítulos seguintes, foram levadas a cabo diferentes estratégias com o objectivo de clarificar os mecanismos que estão na origem destas duas relaxações secundárias (b e g ), assim como conhecer a sua respectiva relação com a relaxação principal (a ). Do estudo, em tempo real, da polimerização isotérmica via radicais livres do TrEGDMA por Calorimetria de Varrimento Diferencial com Modulação de Temperatura (TMDSC), levado a cabo a temperaturas abaixo da g T do polímero final, concluem-se entre outros, dois importantes aspectos: i) que a vitrificação do polímero em formação conduz a graus de conversão relativamente baixos, e ii) que o monómero que está por reagir é expulso da rede polimérica que se forma, dando lugar a uma clara separação de fases (Capítulo 4). Com base nesta informação, o passo seguinte foi estudar separadamente a polimerização isotérmica do di-, tri- e tetra-EGDMA, dando especial atenção às alterações de mobilidade do monómero ainda por reagir. Com as restrições impostas pela formação de ligações químicas, as relaxações a e b detectadas no monómero tendem a desaparecer no novo polímero formado, enquanto que a relaxação g se mantém quase inalterada. Os diferentes comportamentos que aparecem durante a polimerização permitiram a atribuição da origem molecular dos processos secundários: o processo g foi associado ao movimento twisting das unidades etileno glicol, enquanto que a rotação dos grupos carboxilo foi relacionada com a relaxação b (Capítulo 5). No que respeita ao próprio polímero, um processo de relaxação adicional foi detectado, pol b , no poly-DEGDMA, poly-TrEGDMA e poly-TeEGDMA, com características similares ao encontrado nos poli(metacrilato de n -alquilo). Este processo foi confirmado e bem caracterizado aquando do estudo da copolimerização do TrEGDMA com acrilato de metilo (MA) para diferentes composições (Capítulo 6). Para finalizar, o EGDMA, o elemento mais pequeno da família de monómeros estudada, além de vitrificar apresenta uma marcada tendência para cristalizar quer a partir do estado líquido ou do estado vítreo. Durante a cristalização, a formação de uma fase rígida afecta principalmente o processo a , cuja intensidade diminui sem no entanto se observarem modificações significativas na dependência do tempo de relaxação característico com a temperatura. Por outro lado, o processo secundário b torna-se melhor definido e mais estreito, o que pode ser interpretado em termos de uma maior homogeneidade dos micro-ambientes associados aos movimentos locais(Capítulo 7).
Resumo:
The recently standardized IEEE 802.15.4/Zigbee protocol stack offers great potentials for ubiquitous and pervasive computing, namely for Wireless Sensor Networks (WSNs). However, there are still some open and ambiguous issues that turn its practical use a challenging task. One of those issues is how to build a synchronized multi-hop cluster-tree network, which is quite suitable for QoS support in WSNs. In fact, the current IEEE 802.15.4/Zigbee specifications restrict the synchronization in the beacon-enabled mode (by the generation of periodic beacon frames) to star-based networks, while it supports multi-hop networking using the peer-to-peer mesh topology, but with no synchronization. Even though both specifications mention the possible use of cluster-tree topologies, which combine multi-hop and synchronization features, the description on how to effectively construct such a network topology is missing. This paper tackles this problem, unveils the ambiguities regarding the use of the cluster-tree topology and proposes two collision-free beacon frame scheduling schemes. We strongly believe that the results provided in this paper trigger a significant step towards the practical and efficient use of IEEE 802.15.4/Zigbee cluster-tree networks.
Resumo:
In this paper, we focus on large-scale and dense Cyber- Physical Systems, and discuss methods that tightly integrate communication and computing with the underlying physical environment. We present Physical Dynamic Priority Dominance ((PD)2) protocol that exemplifies a key mechanism to devise low time-complexity communication protocols for large-scale networked sensor systems. We show that using this mechanism, one can compute aggregate quantities such as the maximum or minimum of sensor readings in a time-complexity that is equivalent to essentially one message exchange. We also illustrate the use of this mechanism in a more complex task of computing the interpolation of smooth as well as non-smooth sensor data in very low timecomplexity.
Resumo:
Dissertação apresentada na Universidade do Minho com vista à obtenção do grau de Doutor em Tecnologias e Sistemas de Informação (Engenharia e Gestão de Sistemas de Informação)
Resumo:
Wireless Sensor Networks (WSNs) have been attracting increasing interests for developing a new generation of embedded systems with great potential for many applications such as surveillance, environment monitoring, emergency medical response and home automation. However, the communication paradigms in WSNs differ from the ones attributed to traditional wireless networks, triggering the need for new communication protocols. In this context, the recently standardised IEEE 802.15.4 protocol presents some potentially interesting features for deployment in wireless sensor network applications, such as power-efficiency, timeliness guarantees and scalability. Nevertheless, when addressing WSN applications with (soft/hard) timing requirements some inherent paradoxes emerge, such as power-efficiency versus timeliness, triggering the need of engineering solutions for an efficient deployment of IEEE 802.15.4 in WSNs. In this technical report, we will explore the most relevant characteristics of the IEEE 802.15.4 protocol for wireless sensor networks and present the most important challenges regarding time-sensitive WSN applications. We also provide some timing performance and analysis of the IEEE 802.15.4 that unveil some directions for resolving the previously mentioned paradoxes.
Resumo:
The aim of this essay is to discuss the thesis of the German Sociologist Günter Burkhart that in modern societies a phenomenon appeared which he calls “handymania”, an excessive and nearly addictive use of the mobile phones especially from adolescents. After a short overview about the history of the cell phone, I will relate this development to Jürgen Habermas “theory of communicative action”, more precisely to his diagnosis of a pathological society (“lifeworld”) to find out if the “handymania” could be one expression of it. Adjacent I will present social-psychological theories from E.H.Erikson and Tilmann Habermas to ascertain whether juveniles could really be a high-risk group for this kind of addiction. I will focus on the ability to communicate in an Habermasian way that could be seriously harmed by the unregulated usage of cell phones.
Resumo:
Consider the problem of sharing a wireless channel between a set of computer nodes. Hidden nodes exist and there is no base station. Each computer node hosts a set of sporadic message streams where a message stream releases messages with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements staticpriority scheduling. The MAC protocol allows multiple masters and is fully distributed. It neither relies on synchronized clocks nor out-of-band signaling; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. Our protocol has the key feature of not only being prioritized and collision-free but also dealing successfully with hidden nodes. This key feature enables schedulability analysis of sporadic message streams in multihop networks.
Resumo:
Penalty and Barrier methods are normally used to solve Nonlinear Optimization Problems constrained problems. The problems appear in areas such as engineering and are often characterised by the fact that involved functions (objective and constraints) are non-smooth and/or their derivatives are not know. This means that optimization methods based on derivatives cannot net used. A Java based API was implemented, including only derivative-free optimizationmethods, to solve both constrained and unconstrained problems, which includes Penalty and Barriers methods. In this work a new penalty function, based on Fuzzy Logic, is presented. This function imposes a progressive penalization to solutions that violate the constraints. This means that the function imposes a low penalization when the violation of the constraints is low and a heavy penalisation when the violation is high. The value of the penalization is not known in beforehand, it is the outcome of a fuzzy inference engine. Numerical results comparing the proposed function with two of the classic penalty/barrier functions are presented. Regarding the presented results one can conclude that the prosed penalty function besides being very robust also exhibits a very good performance.
Resumo:
Constraints nonlinear optimization problems can be solved using penalty or barrier functions. This strategy, based on solving the problems without constraints obtained from the original problem, have shown to be e ective, particularly when used with direct search methods. An alternative to solve the previous problems is the lters method. The lters method introduced by Fletcher and Ley er in 2002, , has been widely used to solve problems of the type mentioned above. These methods use a strategy di erent from the barrier or penalty functions. The previous functions de ne a new one that combine the objective function and the constraints, while the lters method treat optimization problems as a bi-objective problems that minimize the objective function and a function that aggregates the constraints. Motivated by the work of Audet and Dennis in 2004, using lters method with derivative-free algorithms, the authors developed works where other direct search meth- ods were used, combining their potential with the lters method. More recently. In a new variant of these methods was presented, where it some alternative aggregation restrictions for the construction of lters were proposed. This paper presents a variant of the lters method, more robust than the previous ones, that has been implemented with a safeguard procedure where values of the function and constraints are interlinked and not treated completely independently.
Resumo:
In research on Silent Speech Interfaces (SSI), different sources of information (modalities) have been combined, aiming at obtaining better performance than the individual modalities. However, when combining these modalities, the dimensionality of the feature space rapidly increases, yielding the well-known "curse of dimensionality". As a consequence, in order to extract useful information from this data, one has to resort to feature selection (FS) techniques to lower the dimensionality of the learning space. In this paper, we assess the impact of FS techniques for silent speech data, in a dataset with 4 non-invasive and promising modalities, namely: video, depth, ultrasonic Doppler sensing, and surface electromyography. We consider two supervised (mutual information and Fisher's ratio) and two unsupervised (meanmedian and arithmetic mean geometric mean) FS filters. The evaluation was made by assessing the classification accuracy (word recognition error) of three well-known classifiers (knearest neighbors, support vector machines, and dynamic time warping). The key results of this study show that both unsupervised and supervised FS techniques improve on the classification accuracy on both individual and combined modalities. For instance, on the video component, we attain relative performance gains of 36.2% in error rates. FS is also useful as pre-processing for feature fusion. Copyright © 2014 ISCA.