Search results for "military communication"
showing 10 items of 50 documents
A MANET Autoconfiguration System based on Bluetooth Technology
2006
The availability of both Wi-Fi and Bluetooth technologies on currently available devices offers the possibility to combine both in order to make the most out of their capabilities. In this paper we propose using Bluetooth technology to solve the configuration problem of the terminals conforming an IEEE 802.11-based ad-hoc network. The main objective of mobile ad- hoc networks (MANETs) is to extend the connectivity range of nodes through packet forwarding, thereby avoiding the use of a fixed infrastructure. However, since configuration of nodes is a complex issue, we provide a fast and reliable solution to auto-configure MANET terminals. Our solution is adequate for the quick setup and deplo…
Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative Analysis
2007
Within the context of tele-laboratories for education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple and reliable manner. Moreover, this situation introduces many interesting issues like network protocols for Internet robots, the effects of variable bandwidth and time-delays on telerobotics, etc. In this paper we present a comparative analysis of using several Internet transport protocols when performing a remote experiment within the UJI Industrial Telelaboratory. TCP, UDP, Trinomial and TEAR protocols are analyzed using the NS2 simulator. Conclusions show a set of characteristics the authors of this paper consider ve…
VII: Diagnosestudien: Einfache Maße für Validität und Reliabilität
2003
The evaluation of a new diagnostic or imaging device has to focus both on its diagnostic validity and reliability. Cohen's kappa coefficient can be used to assess the agreement of the new device's findings with those of an established diagnostic reference, it therefore presents a surrogate measure of validity. Additional measures of validity are sensitivity and specificity, which assess the order of agreement with the reference for positive and negative reference findings, respectively. The latter, however, can only be applied for binary reference findings. If discordant findings are observed, the McNemar test can be used to detect a diagnostic shift between diagnostic novum and reference. …
Passive UHF RFID antennas for sensing applications: Principles, methods, and classifcations
2013
UHF passive radio-frequency identification technology is rapidly evolving from simple labeling of things to wireless pervasive sensing. A remarkable number of scientific papers demonstrate that objects in principle can have their physical properties be remotely tracked and monitored all along their life cycle. The key background is a new paradigm of antenna design that merges together the conventional communication issues with more-specific requirements about sensitivity to time-varying boundary conditions. This paper presents a unified review of the state of the art of the tag-as-sensor problem. Particular care is taken to formalize the measurement indicators and the communication and sens…
Guaranteed access mode for downlink traffic over IEEE 802.11 WLANs
2011
IEEE 802.11 networks present an unfairness problem between the downlink and uplink traffic, using the default settings of the Enhanced Distributed Channel Access (EDCA). In order to reduce this unfairness, the Access Point (AP) can adapt the standard parameters, but this is not enough. In this paper, we propose simple and efficient solutions, which are implemented at the AP, thus they are standard compatible and no modifications to the current hardware and protocol stacks are needed. These solutions aim at providing guaranteed access to the downlink traffic when the AP perceives the unfairness problem. Our simulation results show a reduction in the unfairness and an enhancement in network p…
Reliable Coverage with Circumferential WMSNs
2021
This work tackles the closed peripheral coverage issue. Such circumferential surveillance is essential in numerous realistic applications where the goal is to ensure rapid detection of any unauthorized entry/exit of the monitored area. To respond to these requirements, peripheral WMSNs can be rapidly deployed around areas of interest (e.g., temporary military camps, natural or nuclear disasters, etc.). While it seems simple, this solution raises two major challenging issues. First, checking whether the deployed peripheral WMSN forms a closed shape around the monitored region. That is, any object trying to leave or access this area must be instantaneously detected by at least one multimedia …
Simple and convenient remote photoplethysmography system for monitoring regional anesthesia effectiveness
2017
Simple and inexpensive remote photoplethysmography system for monitoring the effectiveness of regional anesthesia was developed and tested. The system involves surgical lamp as light source, compact video camera and computer with custom developed software. Data from eight patients were processed and the effectiveness of regional anesthesia was calculated. The results showed that the standard surgical lamp can be used as a light source together with camera for remote monitoring of regional anesthesia effectiveness.
Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method
2019
Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…
SITA/G - Description and simulation tools for public utility systems on IBM PC
1991
Abstract Simulation is a powerful and universal systems research tool for the analysis of discrete event model's functional quality. The simulation is used very widely in different areas of our everyday life. Simulation system SITA/G is produced in the Latvia University Research Institute of Mathematics and Computer Science. SITA/G softwares is proposed for using on IBM PC. SITA/G offers the facilities to describe, build and edit graphic programs by means of specification language SITA. Also the proposed system allows: 1) the visual demonstration of the simulation process of the graphic simulation programs; 2) obtaining of the probability characteristics of the systems under research. SITA/…
An ontology-based metamodel for multiagent-based simulations
2014
Multiagent-based simulations enable us to validate dierent use-case scenarios in a lot of application domains. The idea is to develop a realistic virtual environment to test particular domain-specic procedures. This paper presents our general framework for interactive multiagent-based simulations in virtual environments. The major contribution of this paper is the integration of the notion of ontology as a core element to the design process of a behavioral simulation. The proposed metamodel describes the concepts of a multiagent simulation using situated agents moving in a semantically enriched 3D environment. The agents perceive the geometric and semantic data in the surrounding environmen…