384 research outputs found
Monitoring of atopic dermatitis using leaky coaxial cable
In our daily life, inadvertent scratching may increase the severity of skin diseases (such as atopic dermatitis, etc.). However, people
rarely pay attention to this matter, so the known measurement behavior of the movement is also very little. Nevertheless, the behavior and
frequency of scratching represent the degree of itching, and the analysis of scratching frequency is helpful to the doctor's clinical dosage. In this
paper, a novel system is proposed to monitor the scratching motion of a sleeping human body at night. The core device of the system are just a
Leaky coaxial cable (LCX) and a router. Commonly, LCX is used in the blind field or semi blind field in wireless communication. The new idea is
that the leaky cable is placed on the bed, then the state information of physical layer of wireless communication channels is acquired to identify the
scratching motion and other small body movements in the human sleep process. The results show that it can be used to detect the movement and its
duration. Channel state information (CSI) packet is collected by card installed in the computer based on the 802.11n protocol. The characterization
of the scratch motion in the collected channel state information is unique, so it can be distinguished from the wireless channel amplitude variation
trend
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting. Our fine-grained access control aware multi-user secure keyword search approach interdependently harmonizes these two security notions, access control and encrypted keyword search. Owing to the shrinkage of the cloud server\u27s search space to the user\u27s decryptable subset, the proposed scheme both decreases information leakage and is shown to be efficient by the results of our contrastive performance simulation
Antenna and Propagation Considerations for Amateur UAV Monitoring
The broad application spectrum of unmanned aerial vehicles is making them one of the most promising technologies of Internet of Things era. Proactive prevention for public safety threats is one of the key areas with vast potential of surveillance and monitoring drones. Antennas play a vital role in such applications to establish reliable communication in these scenarios. This paper considers line-of-sight and non-line-of-sight threat scenarios with the perspective of antennas and electromagnetic wave propagation
Investment momentum:A two-dimensional behavioural strategy
We propose an investment-momentum strategy of buying past winners with low investment and selling past losers with high investment, which simultaneously exploits two dimensions of market inefficiencies. The new strategy generates twice the monthly returns earned by either the price momentum or investment strategy (1.44% vs. 0.75% or 0.61%). Despite the diminishing anomalies in recent decades, the investment-momentum stays persistent. The mispricing-based strategy performs better in periods of high investor sentiment or for stocks with high limits-to-arbitrage, which is consistent with our expectations. Overall, we show that one can simultaneously use multiple dimensions of market inefficiency to attain superior performance
Characteristics of Synthesized Antibacterial Peptide W3-2 from Lactiplantibacillus plantarum and Its Inhibitory Effect on Staphylococcus aureus
A synthesized antimicrobial peptide (W3-2) from Lactiplantibacillus plantarum was found to have temperature, pH, proteases (papain, proteinase K, pepsin, trypsin, cellulase, and pectinase), and several chemical reagents (thylenediaminetetraacetic acid, urea, Tween, methanol, and ethanol). Its inhibitory effect against Staphylococcus aureus was investigated by determining the minimum inhibitory concentration (MIC) and bactericidal kinetics. The underlying mechanism was explored through measurement of extracellular K+ and ATP levels and nucleic acid and protein leakage, flow cytometry analysis, and scanning electron microscopy (SEM) and transmission electron microscopy (TEM) observations. The results showed that W3-2 had strong inhibitory effects on both Gram-positive and Gram-negative bacteria. It inhibited the growth of S. aureus with an MIC of 0.425 mg/mL. W3-2 increased the permeability of the bacterial cell membrane, leading to K+ efflux and thereby disrupting the integrity of the cell membrane. This resulted in the leakage of intracellular macromolecular substances (nucleic acids, proteins, and ATP) and damage to both intracellular and extracellular structures, ultimately causing bacterial cell death. This study provides a scientific basis for the development and utilization of W3-2 as a novel antimicrobial agent
Energy-Aware Random Access Networks: Connection-Based versus Packet-Based
Characterizing and comparing the optimal energy efficiency in energy-aware machine-to-machine (M2M) random access networks remains a challenge due to the distributed nature of the access behavior of nodes. To address this issue, this letter focuses on the energy efficiency limits of two typical random access schemes, i.e., connection-based Aloha and packet-based Aloha, based on which we conducted a performance comparison. Specifically, by integrating limited energy constraints and network throughput, the lifetime throughput can be derived, and further optimized with a guarantee of targeted lifetime via selecting the transmission probability. Then we present a comparative study on the optimal lifetime throughput of packet-based Aloha and connection-based Aloha to characterize criteria for beneficial connection establishment
Biometric behavior authentication exploiting propagation characteristics of wireless channel
Massive expansion of wireless body area networks (WBANs) in the field of health monitoring applications has given rise to the generation of huge amount of biomedical data. Ensuring privacy and security of this very personal data serves as a major hurdle in the development of these systems. An effective and energy friendly authentication algorithm is, therefore, a necessary requirement for current WBANs. Conventional authentication algorithms are often implemented on higher levels of the Open System Interconnection model and require advanced software or major hardware upgradation. This paper investigates the implementation of a physical layer security algorithm as an alternative. The algorithm is based on the behavior fingerprint developed using the wireless channel characteristics. The usability of the algorithm is established through experimental results, which show that this authentication method is not only effective, but also very suitable for the energy-, resource-, and interface-limited WBAN medical applications
Age-Threshold Slotted ALOHA for Optimizing Information Freshness in Mobile Networks
We optimize the Age of Information (AoI) in mobile networks using the
age-threshold slotted ALOHA (TSA) protocol. The network comprises multiple
source-destination pairs, where each source sends a sequence of status update
packets to its destination over a shared spectrum. The TSA protocol stipulates
that a source node must remain silent until its AoI reaches a predefined
threshold, after which the node accesses the radio channel with a certain
probability. Using stochastic geometry tools, we derive analytical expressions
for the transmission success probability, mean peak AoI, and time-average AoI.
Subsequently, we obtain closed-form expressions for the optimal update rate and
age threshold that minimize the mean peak and time-average AoI, respectively.
In addition, we establish a scaling law for the mean peak AoI and time-average
AoI in mobile networks, revealing that the optimal mean peak AoI and
time-average AoI increase linearly with the deployment density. Notably, the
growth rate of time-average AoI under TSA is half of that under conventional
slotted ALOHA. When considering the optimal mean peak AoI, the TSA protocol
exhibits comparable performance to the traditional slotted ALOHA protocol.
These findings conclusively affirm the advantage of TSA in reducing
higher-order AoI, particularly in densely deployed networks.Comment: 21 pages. Update version after peer revie
- …
