91 research outputs found

    A study of the effects of time aggregation and overlapping within the framework of IEC standards for the measurement of harmonics and interharmonics

    Get PDF
    Producción CientíficaThe increasing incorporation of power electronics and other non-linear loads, in addition to their energy advantages, also implies a poor power quality, especially as regards harmonic pollution. Different solutions have been proposed to measure harmonic content, taking the International Electrotechnical Commission (IEC) standards as a reference. However, there are still some issues related to the measurement of the harmonic, and especially, interharmonic content. Some of those questions are addressed in this work, such as the problem derived from the instability of the values obtained by applying the discrete Fourier transform to each sampling window, or the appearance of local peaks when there are tones separated by multiples of the resolution. Solutions were proposed based on time aggregation and the overlapping of windows. The results demonstrate that aggregation time, window type, and overlapping can improve the accuracy in harmonic measurement using Fourier transform-based methods, as defined in the standards. The paper shows the need to consider spectral and time groupings together, improving results by using an appropriate percentage of overlap and an adaptation of the aggregation time to the harmonic content

    Radio over fiber enabling PON fronthaul in a two-tiered cloud

    Get PDF
    Avec l’avènement des objets connectés, la bande passante nécessaire dépasse la capacité des interconnections électriques et interface sans fils dans les réseaux d’accès mais aussi dans les réseaux coeurs. Des systèmes photoniques haute capacité situés dans les réseaux d’accès utilisant la technologie radio sur fibre systèmes ont été proposés comme solution dans les réseaux sans fil de 5e générations. Afin de maximiser l’utilisation des ressources des serveurs et des ressources réseau, le cloud computing et des services de stockage sont en cours de déploiement. De cette manière, les ressources centralisées pourraient être diffusées de façon dynamique comme l’utilisateur final le souhaite. Chaque échange nécessitant une synchronisation entre le serveur et son infrastructure, une couche physique optique permet au cloud de supporter la virtualisation des réseaux et de les définir de façon logicielle. Les amplificateurs à semi-conducteurs réflectifs (RSOA) sont une technologie clé au niveau des ONU(unité de communications optiques) dans les réseaux d’accès passif (PON) à fibres. Nous examinons ici la possibilité d’utiliser un RSOA et la technologie radio sur fibre pour transporter des signaux sans fil ainsi qu’un signal numérique sur un PON. La radio sur fibres peut être facilement réalisée grâce à l’insensibilité a la longueur d’onde du RSOA. Le choix de la longueur d’onde pour la couche physique est cependant choisi dans les couches 2/3 du modèle OSI. Les interactions entre la couche physique et la commutation de réseaux peuvent être faites par l’ajout d’un contrôleur SDN pour inclure des gestionnaires de couches optiques. La virtualisation réseau pourrait ainsi bénéficier d’une couche optique flexible grâce des ressources réseau dynamique et adaptée. Dans ce mémoire, nous étudions un système disposant d’une couche physique optique basé sur un RSOA. Celle-ci nous permet de façon simultanée un envoi de signaux sans fil et le transport de signaux numérique au format modulation tout ou rien (OOK) dans un système WDM(multiplexage en longueur d’onde)-PON. Le RSOA a été caractérisé pour montrer sa capacité à gérer une plage dynamique élevée du signal sans fil analogique. Ensuite, les signaux RF et IF du système de fibres sont comparés avec ses avantages et ses inconvénients. Finalement, nous réalisons de façon expérimentale une liaison point à point WDM utilisant la transmission en duplex intégral d’un signal wifi analogique ainsi qu’un signal descendant au format OOK. En introduisant deux mélangeurs RF dans la liaison montante, nous avons résolu le problème d’incompatibilité avec le système sans fil basé sur le TDD (multiplexage en temps duplexé).With the advent of IoT (internet of things) bandwidth requirements triggered by aggregated wireless connections have exceeded the fundamental limitation of copper and microwave based wireless backhaul and fronthaul networks. High capacity photonic fronthaul systems employing radio over fiber technology has been proposed as the ultimate solution for 5G wireless system. To maximize utilization of server and network resources, cloud computing and storage based services are being deployed. In this manner, centralized resources could be dynamically streamed to the end user as requested. Since on demand resource provision requires the orchestration between the server and network infrastructure, a smart photonic (physical layer)PHY enabled cloud is foreseen to support network virtualization and software defined network. RSOAs (Reflective Semiconductor Optical Amplifier) are being investigated as key enablers of the colorless ONU(Optical Network Unit) solution in PON (Passive Optical Network). We examine the use of an RSOA in radio over fiber systems to transport wireless signals over a PON simultaneously with digital data. Radio over fiber systems with flexible wavelength allocation could be achieved thanks to the colorless operation of the RSOA and wavelength reuse technique. The wavelength flexibility in optical PHY are inline with the paradigm of software defined network (SDN) in OSI layer 2/3. The orchestration between optical PHY and network switching fabric could be realized by extending the SDN controller to include optical layer handlers. Network virtualization could also benefit from the flexible optical PHY through dynamic and tailored optical network resource provision. In this thesis, we investigate an optical PHY system based on RSOA enabling both analog wireless signal and digital On-Off Keying (OOK) transportation within WDM (Wavelength Division Multiplexing) PON architecture. The RSOA has been characterized to show its potential ability to handle high dynamic range analog wireless signal. Then the RF and IF radio over fiber scheme is compared with its pros and cons. Finally we perform the experiment to shown a point to point WDM link with full duplex transmission of analog WiFi signal with downlink OOK signal. By introducing two RF mixer in the uplink, we have solved the incompatible problem with TDD (Time Division Duplex) based wireless system

    Design of a secure architecture for the exchange of biomedical information in m-Health scenarios

    Get PDF
    El paradigma de m-Salud (salud móvil) aboga por la integración masiva de las más avanzadas tecnologías de comunicación, red móvil y sensores en aplicaciones y sistemas de salud, para fomentar el despliegue de un nuevo modelo de atención clínica centrada en el usuario/paciente. Este modelo tiene por objetivos el empoderamiento de los usuarios en la gestión de su propia salud (p.ej. aumentando sus conocimientos, promocionando estilos de vida saludable y previniendo enfermedades), la prestación de una mejor tele-asistencia sanitaria en el hogar para ancianos y pacientes crónicos y una notable disminución del gasto de los Sistemas de Salud gracias a la reducción del número y la duración de las hospitalizaciones. No obstante, estas ventajas, atribuidas a las aplicaciones de m-Salud, suelen venir acompañadas del requisito de un alto grado de disponibilidad de la información biomédica de sus usuarios para garantizar una alta calidad de servicio, p.ej. fusionar varias señales de un usuario para obtener un diagnóstico más preciso. La consecuencia negativa de cumplir esta demanda es el aumento directo de las superficies potencialmente vulnerables a ataques, lo que sitúa a la seguridad (y a la privacidad) del modelo de m-Salud como factor crítico para su éxito. Como requisito no funcional de las aplicaciones de m-Salud, la seguridad ha recibido menos atención que otros requisitos técnicos que eran más urgentes en etapas de desarrollo previas, tales como la robustez, la eficiencia, la interoperabilidad o la usabilidad. Otro factor importante que ha contribuido a retrasar la implementación de políticas de seguridad sólidas es que garantizar un determinado nivel de seguridad implica unos costes que pueden ser muy relevantes en varias dimensiones, en especial en la económica (p.ej. sobrecostes por la inclusión de hardware extra para la autenticación de usuarios), en el rendimiento (p.ej. reducción de la eficiencia y de la interoperabilidad debido a la integración de elementos de seguridad) y en la usabilidad (p.ej. configuración más complicada de dispositivos y aplicaciones de salud debido a las nuevas opciones de seguridad). Por tanto, las soluciones de seguridad que persigan satisfacer a todos los actores del contexto de m-Salud (usuarios, pacientes, personal médico, personal técnico, legisladores, fabricantes de dispositivos y equipos, etc.) deben ser robustas y al mismo tiempo minimizar sus costes asociados. Esta Tesis detalla una propuesta de seguridad, compuesta por cuatro grandes bloques interconectados, para dotar de seguridad a las arquitecturas de m-Salud con unos costes reducidos. El primer bloque define un esquema global que proporciona unos niveles de seguridad e interoperabilidad acordes con las características de las distintas aplicaciones de m-Salud. Este esquema está compuesto por tres capas diferenciadas, diseñadas a la medidas de los dominios de m-Salud y de sus restricciones, incluyendo medidas de seguridad adecuadas para la defensa contra las amenazas asociadas a sus aplicaciones de m-Salud. El segundo bloque establece la extensión de seguridad de aquellos protocolos estándar que permiten la adquisición, el intercambio y/o la administración de información biomédica -- por tanto, usados por muchas aplicaciones de m-Salud -- pero no reúnen los niveles de seguridad detallados en el esquema previo. Estas extensiones se concretan para los estándares biomédicos ISO/IEEE 11073 PHD y SCP-ECG. El tercer bloque propone nuevas formas de fortalecer la seguridad de los tests biomédicos, que constituyen el elemento esencial de muchas aplicaciones de m-Salud de carácter clínico, mediante codificaciones novedosas. Finalmente el cuarto bloque, que se sitúa en paralelo a los anteriores, selecciona herramientas genéricas de seguridad (elementos de autenticación y criptográficos) cuya integración en los otros bloques resulta idónea, y desarrolla nuevas herramientas de seguridad, basadas en señal -- embedding y keytagging --, para reforzar la protección de los test biomédicos.The paradigm of m-Health (mobile health) advocates for the massive integration of advanced mobile communications, network and sensor technologies in healthcare applications and systems to foster the deployment of a new, user/patient-centered healthcare model enabling the empowerment of users in the management of their health (e.g. by increasing their health literacy, promoting healthy lifestyles and the prevention of diseases), a better home-based healthcare delivery for elderly and chronic patients and important savings for healthcare systems due to the reduction of hospitalizations in number and duration. It is a fact that many m-Health applications demand high availability of biomedical information from their users (for further accurate analysis, e.g. by fusion of various signals) to guarantee high quality of service, which on the other hand entails increasing the potential surfaces for attacks. Therefore, it is not surprising that security (and privacy) is commonly included among the most important barriers for the success of m-Health. As a non-functional requirement for m-Health applications, security has received less attention than other technical issues that were more pressing at earlier development stages, such as reliability, eficiency, interoperability or usability. Another fact that has contributed to delaying the enforcement of robust security policies is that guaranteeing a certain security level implies costs that can be very relevant and that span along diferent dimensions. These include budgeting (e.g. the demand of extra hardware for user authentication), performance (e.g. lower eficiency and interoperability due to the addition of security elements) and usability (e.g. cumbersome configuration of devices and applications due to security options). Therefore, security solutions that aim to satisfy all the stakeholders in the m-Health context (users/patients, medical staff, technical staff, systems and devices manufacturers, regulators, etc.) shall be robust and, at the same time, minimize their associated costs. This Thesis details a proposal, composed of four interrelated blocks, to integrate appropriate levels of security in m-Health architectures in a cost-efcient manner. The first block designes a global scheme that provides different security and interoperability levels accordingto how critical are the m-Health applications to be implemented. This consists ofthree layers tailored to the m-Health domains and their constraints, whose security countermeasures defend against the threats of their associated m-Health applications. Next, the second block addresses the security extension of those standard protocols that enable the acquisition, exchange and/or management of biomedical information | thus, used by many m-Health applications | but do not meet the security levels described in the former scheme. These extensions are materialized for the biomedical standards ISO/IEEE 11073 PHD and SCP-ECG. Then, the third block proposes new ways of enhancing the security of biomedical standards, which are the centerpiece of many clinical m-Health applications, by means of novel codings. Finally the fourth block, with is parallel to the others, selects generic security methods (for user authentication and cryptographic protection) whose integration in the other blocks results optimal, and also develops novel signal-based methods (embedding and keytagging) for strengthening the security of biomedical tests. The layer-based extensions of the standards ISO/IEEE 11073 PHD and SCP-ECG can be considered as robust, cost-eficient and respectful with their original features and contents. The former adds no attributes to its data information model, four new frames to the service model |and extends four with new sub-frames|, and only one new sub-state to the communication model. Furthermore, a lightweight architecture consisting of a personal health device mounting a 9 MHz processor and an aggregator mounting a 1 GHz processor is enough to transmit a 3-lead electrocardiogram in real-time implementing the top security layer. The extra requirements associated to this extension are an initial configuration of the health device and the aggregator, tokens for identification/authentication of users if these devices are to be shared and the implementation of certain IHE profiles in the aggregator to enable the integration of measurements in healthcare systems. As regards to the extension of SCP-ECG, it only adds a new section with selected security elements and syntax in order to protect the rest of file contents and provide proper role-based access control. The overhead introduced in the protected SCP-ECG is typically 2{13 % of the regular file size, and the extra delays to protect a newly generated SCP-ECG file and to access it for interpretation are respectively a 2{10 % and a 5 % of the regular delays. As regards to the signal-based security techniques developed, the embedding method is the basis for the proposal of a generic coding for tests composed of biomedical signals, periodic measurements and contextual information. This has been adjusted and evaluated with electrocardiogram and electroencephalogram-based tests, proving the objective clinical quality of the coded tests, the capacity of the coding-access system to operate in real-time (overall delays of 2 s for electrocardiograms and 3.3 s for electroencephalograms) and its high usability. Despite of the embedding of security and metadata to enable m-Health services, the compression ratios obtained by this coding range from ' 3 in real-time transmission to ' 5 in offline operation. Complementarily, keytagging permits associating information to images (and other signals) by means of keys in a secure and non-distorting fashion, which has been availed to implement security measures such as image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. The tests conducted indicate a remarkable robustness-capacity tradeoff that permits implementing all this measures simultaneously, and the compatibility of keytagging with JPEG2000 compression, maintaining this tradeoff while setting the overall keytagging delay in only ' 120 ms for any image size | evidencing the scalability of this technique. As a general conclusion, it has been demonstrated and illustrated with examples that there are various, complementary and structured manners to contribute in the implementation of suitable security levels for m-Health architectures with a moderate cost in budget, performance, interoperability and usability. The m-Health landscape is evolving permanently along all their dimensions, and this Thesis aims to do so with its security. Furthermore, the lessons learned herein may offer further guidance for the elaboration of more comprehensive and updated security schemes, for the extension of other biomedical standards featuring low emphasis on security or privacy, and for the improvement of the state of the art regarding signal-based protection methods and applications

    Epilepsy

    Get PDF
    With the vision of including authors from different parts of the world, different educational backgrounds, and offering open-access to their published work, InTech proudly presents the latest edited book in epilepsy research, Epilepsy: Histological, electroencephalographic, and psychological aspects. Here are twelve interesting and inspiring chapters dealing with basic molecular and cellular mechanisms underlying epileptic seizures, electroencephalographic findings, and neuropsychological, psychological, and psychiatric aspects of epileptic seizures, but non-epileptic as well

    The Hippocampus Participates in a Pharmacological Rat Model of Absence Seizures

    Get PDF
    The thalamocortical network is responsible for the generation of spike-and-wave discharges (SWDs) in absence epilepsy. Recent studies suggest a potential involvement of the hippocampus, which may explain the variability in the extent of cognitive deficits among patients with absence epilepsy. I hypothesize that the hippocampus may become entrained in spike-and-wave discharges following thalamocortical activation. The gamma-butyrolactone (GBL) rat model of absence seizures was used in this thesis. Following GBL injection, SWDs of 4 to 6 Hz developed in the spontaneous local field potentials (LFPs) recorded by depth electrodes in the thalamus, neocortex and hippocampus. Synchronization of hippocampal, thalamic and neocortical SWDs was revealed by coherence analysis of the LFPs, and multiple unit activity of hippocampal neurons occurred within 250 msec prior to the negative peak of thalamic SWDs. Functional magnetic resonance imaging (fMRI) demonstrated functional connectivity between the hippocampus and the thalamocortical network. Thus, electrophysiological and fMRI activity of the hippocampus were shown to be time-locked to the thalamocortical SWDs, suggesting functional connectivity of the hippocampus and thalamocortical network during GBL-induced absence seizures

    How musical rhythms entrain the human brain : clarifying the neural mechanisms of sensory-motor entrainment to rhythms

    Get PDF
    When listening to music, people across cultures tend to spontaneously perceive and move the body along a periodic pulse-like meter. Increasing evidence suggests that this ability is supported by neural mechanisms that selectively amplify periodicities corresponding to the perceived metric pulses. However, the nature of these neural mechanisms, i.e., the endogenous or exogenous factors that may selectively enhance meter periodicities in brain responses to rhythm, remains largely unknown. This question was investigated in a series of studies in which the electroencephalogram (EEG) of healthy participants was recorded while they listened to musical rhythm. From this EEG, selective contrast at meter periodicities in the elicited neural activity was captured using frequency-tagging, a method allowing direct comparison of this contrast between the sensory input, EEG response, biologically-plausible models of auditory subcortical processing, and behavioral output. The results show that the selective amplification of meter periodicities is shaped by a continuously updated combination of factors including sound spectral content, long-term training and recent context, irrespective of attentional focus and beyond auditory subcortical nonlinear processing. Together, these observations demonstrate that perception of rhythm involves a number of processes that transform the sensory input via fixed low-level nonlinearities, but also through flexible mappings shaped by prior experience at different timescales. These higher-level neural mechanisms could represent a neurobiological basis for the remarkable flexibility and stability of meter perception relative to the acoustic input, which is commonly observed within and across individuals. Fundamentally, the current results add to the evidence that evolution has endowed the human brain with an extraordinary capacity to organize, transform, and interact with rhythmic signals, to achieve adaptive behavior in a complex dynamic environment

    A Brain-computer Interface Architecture Based On Motor Mental Tasks And Music Imagery

    Get PDF
    This present research proposes a Brain-Computer Interface (BCI) architecture adapted to motor mental tasks and music imagery. For that purpose the statistical properties of the electroencephalographic signal (EEG) were studied, such as its probability distribution function, stationarity, correlation and signal-to-noise ratio (SNR), in order to obtain a minimal empirical and well-founded parameter system for online classification. Stationarity tests were used to estimate the length of the time windows and a minimum length of 1.28 s was obtained. Four algorithms for artifact reduction were tested: threshold analysis, EEG filtering and two Independent Component Analysis (ICA) algorithms. This analysis concluded that the algorithm fastICA is suitable for online artifact removal. The feature extraction used the Power Spectral Density (PSD) and three methods were tested for automatic selection of features in order to have a training step independent of the mental task paradigm, with the best performance obtained with the Kullback-Leibler symmetric divergence method. For the classification, the Linear Discriminant Analysis (LDA) was used and a step of reclassification is suggested. A study of four motor mental tasks and a non-motor related mental task is performed by comparing their periodograms, Event-Related desynchronization/synchronization (ERD/ERS) and SNR. The mental tasks are the imagination of either movement of right and left hands, both feet, rotation of a cube and sound imagery. The EEG SNR was estimated by a comparison with the correlation between the ongoing average and the final ERD/ERS curve, in which we concluded that the mental task of sound imagery would need approximately five times more epochs than the motor-related mental tasks. The ERD/ERS could be measured even for frequencies near 100 Hz, but in absolute amplitudes, the energy variation at 100 Hz was one thousand times smaller than for 10 Hz, which implies that there is a small probability of online detection for BCI applications in high frequency. Thus, most of the usable information for online processing and BCIs corresponds to the α/µ band (low frequency). Finally, the ERD/ERS scalp maps show that the main difference between the sound imagery task and the motor-related mentaltasks is the absence of ERD at the µ band, in the central electrodes, and the presence of ERD at the αband in the temporal and lateral-frontal electrodes, which correspond tothe auditory cortex, the Wernickes area and the Brocas area

    Pedunculopontine-Induced cortical decoupling as the neurophysiological locus of dissociation

    Get PDF
    Mounting evidence suggests an association between aberrant sleep phenomena and dissociative experiences. However, no wake-sleep boundary theory provides a compelling explanation of dissociation or specifies its physiological substrates. We present a theoretical account of dissociation that integrates theories and empirical results from multiple lines of research concerning the domain of dissociation and the regulation of rapid eye movement (REM) sleep. This theory posits that individual differences in the circuitry governing the REM sleep promoting Pedunculopontine Nucleus and Laterodorsal Tegmental Nucleus determine the degree of similarity in the cortical connectivity profiles of wakefulness and REM sleep. We propose that a latent trait characterized by elevated dissociative experiences emerges from the decoupling of frontal executive regions due to a REM sleep-like aminergic/cholinergic balance. The Pedunculopontine Induced Cortical Decoupling Account of Dissociation (PICDAD) suggests multiple fruitful lines of inquiry and provides novel insights

    Adaptive techniques for signal enhancement in the human electroencephalogram

    Get PDF
    This thesis describes an investigation of adaptive noise cancelling applied to human brain evoked potentials (EPs), with particular emphasis on visually evoked responses. The chief morphological features and signal properties of EPs are described. Consideration is given to the amplitude and spectral properties of the underlying spontaneous electroencephalogram and the importance of noise reduction techniques in EP studies is empnasised. A number of methods of enhancing EP waveforms are reviewed in the light of the known limitations of coherent signal averaging. These are shown to oe generally inadequate for enhancing individual EP responses. The theory of adaptive filters is reviewed with particular reference to adaptive transversal filters usiny the Widrow-Hoff algorithm. The theory of adaptive noise cancelling using correlated reference sources is presented, and new work is described which relates canceller performance to the magnitude-squared coherence function of the input signals. A novel filter structure, the gated adaptive filter, is presented and shown to yield improved cancellation without signal distortion when applied to repetitive transient signals in stationary noise under the condition of fast adaption. The signal processing software available is shown to be inadequate, and a comprehensive Fortran program developed for use on a PDP-11 computer is described. The properties of human visual evoked potentials and the EEO are investigated in two normal adults using a montage of 7 occipital electrodes. Signal enhancement of EPs is shown to be possible oy adaptive noise cancelling, and improvements in signal to noise in the range 2-10 dB are predicted. A discussion of filter strategies is presented, and a detailed investiyation of adaptive noise cancel liny performed usiny a ranye of typical EP data. Assessment of the results confirms the proposal that substantial improvement in sinyle EP response recoynition is achieved by this technique
    corecore