Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Wireless

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

User Identification For Opportunistic Ofdm-Based Multiuser Wireless Communications, Hang Li, Qinghua Guo, Defeng (David) Huang, Yingjun (Angela) Zhang Dec 2012

User Identification For Opportunistic Ofdm-Based Multiuser Wireless Communications, Hang Li, Qinghua Guo, Defeng (David) Huang, Yingjun (Angela) Zhang

Dr Qinghua Guo

Multiuser diversity can be employed in wireless communications to significantly improve system performance by scheduling the channel to the user with the best instantaneous channel-state information (CSI). Conventionally, all users’ CSI must be available at the base station (BS) to achieve the benefit of multiuser diversity, thereby inducing enormous system overhead. To solve the overhead issue, we propose a user identification approach (UIDA) in a generic wireless network and demonstrate its application in the orthogonal frequency-division multiplexing (OFDM) system and the multiple-input multiple-output OFDM (MIMO-OFDM) system. In the UIDA, to find the user with the best CSI, all active users …


Challenges To The Adoption Of Mobile And Wireless Technology In Australian Aged Care, Ping Yu, Hui Yu Dec 2012

Challenges To The Adoption Of Mobile And Wireless Technology In Australian Aged Care, Ping Yu, Hui Yu

Dr Ping Yu

The Australian aged-care industry, which is still in the early stages of adopting information technology (IT), is seeking methods for improving efficiency. New mobile and wireless technology may be relevant. As nurses are always moving around beds, wards and community care centres, a mobile solution might suit their documentation needs. To date, however, no convincing mobile and wireless technology has been implemented in health-care. In order to provide IT solutions that satisfy the business needs and work practices of aged-care nurses, a study on the barriers to the adoption of mobile and wireless solutions for aged care has been undertaken. …


Evaluating The Impact Of Implementing Of A New Wireless Telemonitoring System For Urinary Continence Management For Older People Living In Nursing Homes, Ping Yu, D Hailey, V Traynor, Z Zhang Dec 2012

Evaluating The Impact Of Implementing Of A New Wireless Telemonitoring System For Urinary Continence Management For Older People Living In Nursing Homes, Ping Yu, D Hailey, V Traynor, Z Zhang

Dr Ping Yu

No abstract provided.


An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu Dec 2012

An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu

Dr Yanguang Yu

Clustering sensors nodes as the basic of routing is an efficient mechanism for prolonging the lifetime of wireless sensor networks. In this paper, the high-efficient multilevel clustering is abstracted as a root tree which has the performances of the minimal relay set and the maximal weight according to graph theory. A mathematical model for the clustering virtual backbone is built. Based on the model, an algorithm called energy-aware multilevel clustering (EAMC) is proposed. The EAMC can reduce the number of relays used for data transmission by minimizing the amount of the nodes in the root tree (that is cluster-head). Furthermore, …


An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

As security enhanced systems for standard e-mail, certified e-mail schemes guarantee the fair exchange of a digital message with the corresponding receipt between two mistrusted parties. That is, the intended receiver gets the e-mail content if and only if the e-mail sender obtains an irrefutable receipt issued by the receiver, which could be used to prove that the message has been delivered to the receiver. A number of such protocols have been proposed in recent years. However, most of them are not suitable for mobile networks, since many intricate cryptographic primitives are involved so that considerable overheads are introduced. In …


A Pairing-Free Id-Based One-Pass Authenticated Key Establishment Protocol For Wireless Sensor Networks, Rehana Yasmin, Eike Ritter, Guilin Wang Dec 2012

A Pairing-Free Id-Based One-Pass Authenticated Key Establishment Protocol For Wireless Sensor Networks, Rehana Yasmin, Eike Ritter, Guilin Wang

Dr Guilin Wang

Due to resource constraints and unique features of wireless sensor networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, we propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user and a sensor node. The proposed protocol does not require sensor nodes to compute any expensive pairing function. Moreover, it imposes very light computational and communication overheads and also provides scalability. We analyze security and efficiency of the proposed protocol by comparing firstly the session key establishment protocols for WSNs and …


Design And Simulation Of A Ds-Th-Uwb System Using Simulink/Matlab For First Arriving Rays In A Non Line Of Sight Wireless Scenario, Peter Vial Dec 2012

Design And Simulation Of A Ds-Th-Uwb System Using Simulink/Matlab For First Arriving Rays In A Non Line Of Sight Wireless Scenario, Peter Vial

Dr Peter Vial

An Ultra Wideband system was developed using Simulink in previous work. Using this developed model for Ultra Wideband (UWB) Pulse Position Modulation (PPM) within Simulink, we apply Direct Sequence Walsh codes across Time Hopping Patterns to smooth out the spectral characteristics with Pulse Position Modulation. A non-line of sight Saleh-Valenzuela (SV) model is used to characterize the wireless channel. The system is described and results are presented for the scenario where the first arriving rays are used to detect the transmitted message. For this non-optimum technique (in that for non line of sight the strongest signal rays are available after …


Space-Time-Frequency Trellis Coding For Multiband Ofdm Ultra Wideband Wireless Systems, Phuc Ngoc Le, Le Chung Tran, Farzad Safaei Dec 2012

Space-Time-Frequency Trellis Coding For Multiband Ofdm Ultra Wideband Wireless Systems, Phuc Ngoc Le, Le Chung Tran, Farzad Safaei

Dr Le Chung Tran

In this paper, the application of space time trellis codes to multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) systems is investigated. We propose a coding scheme that could fully exploit all the available channel diversity, including space diversity, frequency diversity and inter-subband diversity. Performance of the proposed system is compared with that of the conventional MB-OFDM UWB system in terms of frame error rate (FER). Simulation results show that this system outperforms the conventional one. As an example, an improvement of at least 5 dB at FER=1E-2 could be achieved over the IEEE 802.15.3a channel modes of CM1 and …


Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme Dec 2012

Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme

Australian Digital Forensics Conference

An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware and software and that configuration issues further compounded these vulnerabilities. The cyber threat against critical infrastructure has been public knowledge for several years, and with increasing awareness, attention and resource being devoted to protecting critical in the structure, it is …


Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet Dec 2012

Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet

Australian Digital Forensics Conference

Secure Key Deployment and Exchange Protocol (SKYE) is an innovative encryption Key Management Scheme (KMS) based on a combination of features from recent protocols combined with new features for Mobile Ad Hoc Networks (MANETs). The design focuses on a truly ad hoc networking environment where geographical size of the network, numbers of network members and mobility of the members is all unknown before deployment. This paper describes the process of development of the protocol and the application to system design to assure information security and potential evidential retention for forensic purposes. Threshold encryption key management is utilized and simulation results …


A Wireless Sensor Node Architecture Using Remote Power Charging, For Interaction Applications, Matthew D'Souza, Konstanty Bialkowski, Adam Postula, Montserrat Ros Dec 2012

A Wireless Sensor Node Architecture Using Remote Power Charging, For Interaction Applications, Matthew D'Souza, Konstanty Bialkowski, Adam Postula, Montserrat Ros

Dr Montserrat Ros

The wireless sensor node architecture proposed inthis paper is optimized for use in a wireless interactivepoint, listen and see system. In particular, we focus ondeveloping a wireless sensor node that can beremotely charged by harvesting microwave energy.The current system implementation allows a user toaccess information from a remote sensor via theirmobile computing device. These sensors are limited incomplexity due to the limited power available, and arecumbersome since manual intervention is required toreplace its batteries. We propose a system wherebattery powered wireless sensor nodes can berecharged by harvesting energy from a microwaveRadio Frequency (RF) signal source. The remotepower charging module of …


Biometric Monitoring Of Footstep And Heart Rate Using Wireless Inertial Sensors, Montserrat Ros, Matthew D'Souza, Matthew Wallace Dec 2012

Biometric Monitoring Of Footstep And Heart Rate Using Wireless Inertial Sensors, Montserrat Ros, Matthew D'Souza, Matthew Wallace

Dr Montserrat Ros

Inertial sensors are widely used for a variety of biomedicalapplications, such as human activity monitoring. We present awireless biomedical monitoring network used for measuringfootstep parameters and the heart rate of a person. The wirelessbiomedical monitoring network uses inertial sensors to recordand monitor heart rate and consists of multiple monitoringnodes placed on a person, that communicate with a base node.The monitoring nodes placed on a person&¿s ankle measure theacceleration generated during a footstep. By analysing thisdata, we are able to determine the average footstep length andwalking velocity to be 80cm and the average walking speed tobe 1m/s which corresponds to results …


Coordination In Wireless Sensor-Actuator Networks: A Survey, Hamidreza Salarian, Kwan-Wu Chin, Fazel Naghdy Nov 2012

Coordination In Wireless Sensor-Actuator Networks: A Survey, Hamidreza Salarian, Kwan-Wu Chin, Fazel Naghdy

Associate Professor Kwan-Wu Chin

"Wireless Sensor-Actuator Networks (WSANs) have a myriad of applications, ranging from pacifying bulls to controlling light intensity in homes automatically. An important aspect of WSANs is coordination. Unlike conventional Wireless Sensor Networks (WSNs), sensor and actuator nodes must work hand-in-hand to collect and forward data, and act on any sensed data collaboratively, promptly and reliably. To this end, this paper reviews current state-of-the-art techniques that address this fundamental problem: More specifically, we review techniques in the following areas: (i) sensor-actuator coordination, (ii) routing protocols, (iii) transport protocols, and (iv) actuator-to-actuator coordination protocols. We provide an extensive qualitative comparison of their …


A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng Nov 2012

A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Associate Professor Kwan-Wu Chin

This paper considers the NP-hard problem of scheduling weighted links in concurrent transmit/receive wireless mesh networks. The problem generalizes existing works to links with weight wij ≥ 1. We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.


An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu Nov 2012

An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu

Professor Joe F. Chicharo

Clustering sensors nodes as the basic of routing is an efficient mechanism for prolonging the lifetime of wireless sensor networks. In this paper, the high-efficient multilevel clustering is abstracted as a root tree which has the performances of the minimal relay set and the maximal weight according to graph theory. A mathematical model for the clustering virtual backbone is built. Based on the model, an algorithm called energy-aware multilevel clustering (EAMC) is proposed. The EAMC can reduce the number of relays used for data transmission by minimizing the amount of the nodes in the root tree (that is cluster-head). Furthermore, …


Resource-Aware Video Multicasting Via Access Gateways In Wireless Mesh Networks, Wanqing Tu, Cormac Sreenan, Chun Tung Chou, Archan Misra, Sanjay Jha Jun 2012

Resource-Aware Video Multicasting Via Access Gateways In Wireless Mesh Networks, Wanqing Tu, Cormac Sreenan, Chun Tung Chou, Archan Misra, Sanjay Jha

Research Collection School Of Computing and Information Systems

This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative routes to avoid potentially lengthy and low capacity multi-hop wireless paths. A set of heuristic-based algorithms are described that together aim to maximize network capacity: the two-tier integrated architecture algorithm, the weighted gateway uploading algorithm, the link controlled routing tree algorithm, and the dynamic group management algorithm. These algorithms use different approaches to arrange nodes involved in video multicasting into a clustered and two-tier integrated architecture in which network protocols can …


Development And Experimental Analysis Of Wireless High Accuracy Ultra-Wideband Localization Systems For Indoor Medical Applications, Michael Joseph Kuhn May 2012

Development And Experimental Analysis Of Wireless High Accuracy Ultra-Wideband Localization Systems For Indoor Medical Applications, Michael Joseph Kuhn

Doctoral Dissertations

This dissertation addresses several interesting and relevant problems in the field of wireless technologies applied to medical applications and specifically problems related to ultra-wideband high accuracy localization for use in the operating room. This research is cross disciplinary in nature and fundamentally builds upon microwave engineering, software engineering, systems engineering, and biomedical engineering. A good portion of this work has been published in peer reviewed microwave engineering and biomedical engineering conferences and journals. Wireless technologies in medicine are discussed with focus on ultra-wideband positioning in orthopedic surgical navigation. Characterization of the operating room as a medium for ultra-wideband signal transmission …


Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson Feb 2012

Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson

Research Collection School Of Computing and Information Systems

Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet …


Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore, Brian Alfred Tortorelli Jan 2012

Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore, Brian Alfred Tortorelli

Electronic Theses and Dissertations

This project expands the outreach of the Canaveral National Seashore to its visitors, potential visitors, and virtual visitors through its goals in conservancy and preservation of its natural resources. This paper is involved with the current iteration of a series of digital media projects, the Sea Turtle Nest Camera, also known as, Turtle Cam. It details how and why this project was designed to be an ongoing initiative to assist in those goals.


Effects Of Network Trace Sampling Methods On Privacy And Utility Metrics, Phillip A. Fazio, Keren Tan, David Kotz Jan 2012

Effects Of Network Trace Sampling Methods On Privacy And Utility Metrics, Phillip A. Fazio, Keren Tan, David Kotz

Dartmouth Scholarship

Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of identity protection and the preservation of useful data within the trace. While several metrics exist to quantify this privacy-utility tradeoff, they are often computationally expensive. Computing these metrics using a \emphsample\/ of the trace could potentially save precious time. In this paper, we examine several sampling methods to discover their effects on measurement of the privacy-utility tradeoff when anonymizing network traces. We tested the relative accuracy of several packet and flow-sampling methods on existing privacy and utility …


A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2012

A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

This paper considers the NP-hard problem of scheduling weighted links in concurrent transmit/receive wireless mesh networks. The problem generalizes existing works to links with weight wij ≥ 1. We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.