Search results for "Wire"
showing 10 items of 1383 documents
Autonomy, Heterogeneity and Trust in Mobile P2P environments
2007
Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…
Energy Efficient Optimization for Solar-Powered UAV Communications System
2021
In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…
Learning from Errors: Detecting ZigBee Interference in WiFi Networks
2014
In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…
Analysis of the Effect of Human Presence on a Wireless Sensor Network
2011
Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…
Interference Estimation in IEEE 802.11 Networks
2010
This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…
A wireless battery charger architecture for consumer electronics
2012
In this paper, an innovative design of a wireless battery charger for portable electronic devices is proposed. The wireless power transfer is implemented through the magnetic coupling between a power transmitter, which is connected to the grid, and a power receiver, which is integrated inside the load device. An innovative receiver architecture which heavily improves the power conversion efficiency is presented. The proposed solution is standard compliant and suitable for IC implementation. A comparison between a conventional and the proposed receiver architectures is carried out by SPICE simulations. As shown by simulation results, a power efficiency increase by 40% is provided by the prop…
WiseNET - smart camera network interacting with a semantic model
2016
This paper presents an innovative concept for a distributed system that combines a smart camera network with semantic reasoning. The proposed system is context sensitive and combines the information extracted by the smart camera with logic rules and knowledge of what the camera observes, building information and events that may occurred. The proposed system is a justification for the use of smart cameras, and it can improve the classical visual sensor networks (VSN) and enhance the standard computer vision approach. The main application of our system is smart building management, where we specifically focus on increasing the services of the building users.
Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case
2009
Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…
On the Benefits of Random Linear Coding for Unicast Applications in Disruption Tolerant Networks
2006
In this paper, we investigate the benefits of using a form of network coding known as Random Linear Coding (RLC) for unicast communications in a mobile Disruption Tolerant Network (DTN) under epidemic routing. Under RLC, DTN nodes store and then forward random linear combinations of packets as they encounter other DTN nodes. We first consider the case where there is a single block of packets propagating in the network and then consider the case where blocks of K packets arrive according to a Poisson arrival process. Our performance metric of interest is the delay until the last packet in a block is delivered. We show that for the single block case, when bandwidth is constrained, applying RL…
An optimal energy efficient cooperative retransmission MAC scheme in wireless networks
2011
While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet retransmission. However, this relay selection scheme does not work efficiently in a dense network scenario, due to possible high collision probability among different contending relays. In this paper, we propose an optimized relay selection scheme to maximize system energy efficiency by reducing collision probability. The energy efficiency performance…