Search results for "Wire"

showing 10 items of 1383 documents

Performance analysis of selfish access strategies on WiFi infrastructure networks

2009

In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectDistributed computingNode (networking)Physical layerThroughputGame theory distributed wifi networksGame theory; distributed; wifi networksSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkdistributedFunction (engineering)businessGame theoryGame theorywifi networksmedia_commonComputer network
researchProduct

Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory

2020

Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringTestbed02 engineering and technologyRadio propagation0202 electrical engineering electronic engineering information engineeringSystems engineeringKey (cryptography)Factory (object-oriented programming)RobotWireless020201 artificial intelligence & image processingWorkcellbusinessRobotic arm
researchProduct

MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks

2009

In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…

Computer sciencebusiness.industryDistributed computingDistributed data storeOverhead (computing)Fault toleranceAdversarybusinessResilience (network)Wireless sensor networkSecret sharingComputer networkTerm (time)2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
researchProduct

On the Impact of Wireless Communications on Controlling a Two-Dimensional Gantry System

2019

Abstract Industrial wireless is essential to achieve the vision of future manufacturing systems which are highly dynamic and reconfigurable, and communicate large amounts of data. Main challenges of wireless deployment include the stochastic nature of the wireless channels and the harsh industrial transmission environment. In this work, a typical two-dimensional gantry system is controlled by a local controller which receives G-code commands wirelessly over a Wi-Fi network. The industrial wireless channel is replicated using a radio frequency (RF) channel emulator where various scenarios are considered and various wireless channel parameters are studied. The movement of the gantry system to…

Computer sciencebusiness.industryElectrical engineeringWirelessControl equipmentManufacturing systemsbusinessVolume 1: Additive Manufacturing; Manufacturing Equipment and Systems; Bio and Sustainable Manufacturing
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

Estimation of the Velocity of a Walking Person in Indoor Environments from mmWave Signals

2018

The present work is motivated by the growing interest in using millimeter-wave (mmWave) bands in future wireless indoor communications. For a variety of wireless indoor applications, such as remote medical care, healthcare services, and human-machine interaction, it is of crucial importance to estimate the velocity of walking persons in indoor environments with high precision. In this paper, we present a novel procedure for estimating the velocity of a walking person in indoor environments by using mmWave signals. The indoor environment is considered to be equipped with a distributed $2\times 2$ multiple-input multiple-output (MIMO) system operating in the 60 GHz band. The proposed approach…

Computer sciencebusiness.industryMIMOReal-time computing020207 software engineering02 engineering and technologyTime–frequency analysissymbols.namesake0202 electrical engineering electronic engineering information engineeringsymbolsWirelessSpectrogram020201 artificial intelligence & image processingbusinessDoppler effect2018 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Reliable Underlay Device-to-Device Communications on Multiple Channels

2019

Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…

Computer sciencebusiness.industryNetwork packetComputationReliability (computer networking)05 social sciences050801 communication & media studies020302 automobile design & engineeringThroughput02 engineering and technologyBase station0508 media and communications0203 mechanical engineeringComputer Science::Networking and Internet ArchitectureWirelessUnderlaybusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information TheoryCommunication channelComputer network2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
researchProduct

Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach

2017

Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol, in which the receiving node makes the decision on initiating CT or not based on a tradeoff between performing CT and non-CT. In this way, nodes can avoid idle listening and achieve an extended lifetime. A discrete-time Markov chain (DTMC) model is developed to analyze the performance of CT associat…

Computer sciencebusiness.industryNode (networking)05 social sciencesReal-time computing050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSynchronizationlaw.invention0508 media and communicationsTransmission (telecommunications)RelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkEnergy (signal processing)Computer networkEfficient energy use2017 IEEE International Conference on Communications (ICC)
researchProduct

Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem

2018

In the gossip problem each node of the graph G possesses a unique piece of information - the gossip message. A sequence of one-way or two-way communications between pair of nodes is made to spread the messages so that any node of the graph knows all the gossips. The question is, what is the minimum number of calls between pairs of nodes needed to exchange all gossip messages? The solution to the two-way communication gossip problem is that \(2N-4\) calls (\(N\ge 4\)) suffice if and only if the graph contains a four cycle subgraph. For one-way communication problem the classical results states that in a strongly connected graph \(2N-2\) calls (\(N\ge 4\)) suffice. In this paper we consider t…

Computer sciencebusiness.industryNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy management020206 networking & telecommunicationsContext (language use)02 engineering and technologyLoad balancing (computing)Transmission (telecommunications)Gossip0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Sensor network lifetime020201 artificial intelligence & image processingGossipingbusinessWireless sensor networkConnectivityComputer network
researchProduct

Editorial Article for Open Journal of Antennas and Propagation

2013

Antennas help communicate the World. Antennas make possible that millions of people can watch the Champions League. Antennas allow the positioning of billions of vehicles around our planet. And they also allow handling vehicles through our neighbor planets. By propagating waves through antennas you can send huge amounts of data in milliseconds. Besides, you can also tell somebody that you love him or her. Antennas have allowed communicate the people in these places where cables cannot. But antennas are not only used for communication. Antennas can be used for heating food, for detecting people, for guiding vessels, for founding treasures, for monitoring breath, for harvesting energy and so …

Computer sciencebusiness.industryProcess (engineering)media_common.quotation_subjectField (computer science)Order (exchange)Modelling methodsWirelessQuality (business)Antenna (radio)TelecommunicationsbusinessBeam controlmedia_commonOpen Journal of Antennas and Propagation
researchProduct