15 research outputs found

    Antennas and Propagation Aspects for Emerging Wireless Communication Technologies

    Get PDF
    The increasing demand for high data rate applications and the delivery of zero-latency multimedia content drives technological evolutions towards the design and implementation of next-generation broadband wireless networks. In this context, various novel technologies have been introduced, such as millimeter wave (mmWave) transmission, massive multiple input multiple output (MIMO) systems, and non-orthogonal multiple access (NOMA) schemes in order to support the vision of fifth generation (5G) wireless cellular networks. The introduction of these technologies, however, is inextricably connected with a holistic redesign of the current transceiver structures, as well as the network architecture reconfiguration. To this end, ultra-dense network deployment along with distributed massive MIMO technologies and intermediate relay nodes have been proposed, among others, in order to ensure an improved quality of services to all mobile users. In the same framework, the design and evaluation of novel antenna configurations able to support wideband applications is of utmost importance for 5G context support. Furthermore, in order to design reliable 5G systems, the channel characterization in these frequencies and in the complex propagation environments cannot be ignored because it plays a significant role. In this Special Issue, fourteen papers are published, covering various aspects of novel antenna designs for broadband applications, propagation models at mmWave bands, the deployment of NOMA techniques, radio network planning for 5G networks, and multi-beam antenna technologies for 5G wireless communications

    Metodología integral de protección de datos electrónicos médicos, aplicado al almacenamiento, acceso y análisis forense de las historias clínicas en Colombia

    Get PDF
    La Historia Clínica tiene unas características especiales que requieren un manejo diferente desde el punto de vista de la seguridad informática. Dadas las condiciones que anteceden para mantener su integridad, además de cumplir con la normatividad propia de cada país, se hace conveniente la transformación de la forma tradicional mediante manuscritos, a la utilización de las tecnologías de información. Con esta evolución, los incidentes de seguridad cibernética en un sector tan crítico como este, tienen un gran impacto en la sociedad, considerando que la información de la historia clínica podría ser usada de manera inadecuada, permitiendo el robo de identidad, ingreso no autorizado, daño de la información u alteración de los datos del paciente. Aplicando la Resolución Colombiana 1995 de 1999 [1], se desprende que la información del paciente debe registrarse cronológicamente, de la misma manera que los actos médicos, procedimientos ejecutados por el equipo de médico o cualquiera intervenga en su atención, a lo largo de los planteamientos hechos, los sistemas de salud se van volviendo cada vez más vulnerables a incidentes de seguridad informática, en consecuencia a la automatización, las tecnologías de información, los volúmenes de información y la conexión con los pacientes; Al mismo tiempo la inclusión de la seguridad en los sistemas de información de salud no es una prioridad. El resultado de esta investigación es una metodología integral que permita asegurar la accesibilidad al sistema, garantizar la integridad de los datos, además de la posibilidad de realizar un análisis forense en caso de ser vulnerado, al mismo tiempo logrando mitigar las causas, generando alertas, y factores por los cuales los datos electrónicos médicos en historias clínicas no logran ser protegidos.The Clinical History has some special characteristics that require different management from the point of view of computer security. Given the above conditions to maintain its integrity, in addition for complying with the regulations of each country, it is convenient to modify the traditional form by means of manuscripts, to the use of information technologies. With this evolution, the incidents of cybersecurity in a sector as critical as this one, have a great impact on society, such as information on history. Damage to information or alteration of patient data. Applying Colombian Resolution 1995 of 1999 [1], it follows that patient information must correspond chronologically, in the same way as medical acts, procedures performed by the doctor's team or any intervention in their care, throughout the given the facts, health systems are becoming increasingly vulnerable to computer security, automation, information technology, information and connection with patients; At the same time, the inclusion of security in health information systems is not a priority. The result of this research is a comprehensive methodology that allows accessibility in the system, the integrity of the data, the possibility of carrying out an analysis in the case of vulnerability, the same time in which mitigation of the causes is being achieved, generating alerts, electronic data in clinics cannot be protecte

    Wi-Fi Enabled Healthcare

    Get PDF
    Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services. This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services. The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today’s challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world. This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems

    Performance modelling and analysis of multiple coexisting IEEE 802.15.4 wireless sensor networks

    Get PDF
    With the features of low-power and flexible networking capabilities IEEE 802.15.4 has been widely regarded as one strong candidate of communication technologies for wireless sensor networks (WSNs). It is expected that with an increasing number of deployments of 802.15.4 based WSNs, multiple WSNs could coexist with full or partial overlap in residential or enterprise areas. As WSNs are usually deployed without coordination, the communication could meet significant degradation with the 802.15.4 channel access scheme, which has a large impact on system performance. In this thesis we are motivated to investigate the effectiveness of 802.15.4 networks supporting WSN applications with various environments, especially when hidden terminals are presented due to the uncoordinated coexistence problem. Both analytical models and system level simulators are developed to analyse the performance of the random access scheme specified by IEEE 802.15.4 medium access control (MAC) standard for several network scenarios. The first part of the thesis investigates the effectiveness of single 802.15.4 network supporting WSN applications. A Markov chain based analytic model is applied to model the MAC behaviour of IEEE 802.15.4 standard and a discrete event simulator is also developed to analyse the performance and verify the proposed analytical model. It is observed that 802.15.4 networks could sufficiently support most WSN applications with its various functionalities. After the investigation of single network, the uncoordinated coexistence problem of multiple 802.15.4 networks deployed with communication range fully or partially overlapped are investigated in the next part of the thesis. Both nonsleep and sleep modes are investigated with different channel conditions by analytic and simulation methods to obtain the comprehensive performance evaluation. It is found that the uncoordinated coexistence problem can significantly degrade the performance of 802.15.4 networks, which is unlikely to satisfy the QoS requirements for many WSN applications. The proposed analytic model is validated by simulations which could be used to obtain the optimal parameter setting before WSNs deployments to eliminate the interference risks

    Ultra Low Power Communication Protocols for UWB Impulse Radio Wireless Sensor Networks

    Get PDF
    This thesis evaluates the potential of Ultra Wideband Impulse Radio for wireless sensor network applications. Wireless sensor networks are collections of small electronic devices composed of one or more sensors to acquire information on their environment, an energy source (typically a battery), a microcontroller to control the measurements, process the information and communicate with its peers, and a radio transceiver to enable these communications. They are used to regularly collect information within their deployment area, often for very long periods of time (up to several years). The large number of devices often considered, as well as the long deployment durations, makes any manual intervention complex and costly. Therefore, these networks must self-configure, and automatically adapt to changes in their electromagnetic environment (channel variations, interferers) and network topology modifications: some nodes may run out of energy, or suffer from a hardware failure. Ultra Wideband Impulse Radio is a novel wireless technology that, thanks to its extremely large bandwidth, is more robust to frequency dependent propagation effects. Its impulsional nature makes it robust to multipath fading, as the short duration of the pulses leads most multipath components to arrive isolated. This technology should also enable high precision ranging through time of flight measurements, and operate at ultra low power levels. The main challenge is to design a system that reaches the same or higher degree of energy savings as existing narrowband systems considering all the protocol layers. As these radios are not yet widely available, the first part of this thesis presents Maximum Pulse Amplitude Estimation, a novel approach to symbol-level modeling of UWB-IR systems that enabled us to implement the first network simulator of devices compatible with the UWB physical layer of the IEEE 802.15.4A standard for wireless sensor networks. In the second part of this thesis, WideMac, a novel ultra low power MAC protocol specifically designed for UWB-IR devices is presented. It uses asynchronous duty cycling of the radio transceiver to minimize the power consumption, combined with periodic beacon emissions so that devices can learn each other's wake-up patterns and exchange packets. After an analytical study of the protocol, the network simulation tool presented in the first part of the thesis is used to evaluate the performance of WideMac in a medical body area network application. It is compared to two narrowband and an FM-UWB solutions. The protocol stack parameters are optimized for each solution, and it is observed that WideMac combined to UWB-IR is a credible technology for such applications. Similar simulations, considering this time a static multi-hop network are performed. It is found that WideMac and UWB-IR perform as well as a mature and highly optimized narrowband solution (based on the WiseMAC ULP MAC protocol), despite the lack of clear channel assessment functionality on the UWB radio. The last part of this thesis studies analytically a dual mode MAC protocol named WideMac-High Availability. It combines the Ultra Low PowerWideMac with the higher performance Aloha protocol, so that ultra low power consumption and hence long deployment times can be combined with high performance low latency communications when required by the application. The potential of this scheme is quantified, and it is proposed to adapt it to narrowband radio transceivers by combining WiseMAC and CSMA under the name WiseMAC-HA

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system

    Determining the potential of wearable technologies within the disease landscape of sub-Saharan Africa

    Get PDF
    Thesis (MEng)--Stellenbosch University, 2019.ENGLISH ABSTRACT: Please refer to full text for abstract.AFRIKAANSE OPSOMMING: Raadpleeg asseblief vol teks vir opsomming

    An architecutre for the effective use of mobile devices in supporting contact learning

    Get PDF
    The features and capacities of mobile devices offer a wide range of significant opportunities for providing learning content in workplaces and educational institutions. This new approach of teaching, called mobile learning, allows for the delivery of learning content on the move at any time. Mobile learning supports learning by producing learning content to learners in a modern and acceptable way. The number of mobile learning applications has increased rapidly in educational environments. There are, however, limited mobile learning applications that take advantage of mobile devices to support contact learning in the classroom environment. The aim of this research was to design a mobile learning architecture to effectively support contact learning in the classroom. The researcher investigated the historical and theoretical background of mobile learning and reported these findings. This included an overview of existing mobile learning architectures. After identifying their limitations, the researcher designed the Contact Instruction Mobile Learning Architecture (CIMLA) to facilitate the use of mobile devices in the classroom. The researcher developed the LiveLearning prototype based on the proposed architecture as a proof of concept. He conducted a usability evaluation in order to determine the usability of LiveLearning. The results indicated that the LiveLearning prototype is effective in supporting contact learning in the classroom

    Practical Extensions to the Evaluation and Analysis of Wireless Coexistence in Unlicensed Bands

    Get PDF
    Sharing spectrum resources in unlicensed bands has proven cost effective and beneficial for providing ubiquitous access to wireless functionality for a broad range of applications. Chipsets designed to implement communication standards in the Industrial, Scientific and Medical (ISM) band have become increasingly inexpensive and widely available, making wireless-enabled medical and non-medical devices attractive to an increased number of users. Consequently, wireless coexistence becomes a concern. In response, the U.S. Food and Drug Administration (FDA) has issued a guidance document to assist medical device manufacturers ensure reasonable safety and effectiveness. Coexistence-testing methods are now being reported in literature, and novel solutions are under consideration for inclusion in the American National Standards Institute (ANSI) C63.27 Standard for Evaluation of Wireless Coexistence. This dissertation addresses practical issues for evaluating and reporting wireless coexistence. During testing, an under-test-system (UTS) is evaluated in the presence of an interfering system (IS). Accordingly, an innovative method is suggested for estimating channel utilization of multiple, concurrent wireless transmitters sharing an unlicensed band in the context of radiated open environment coexistence testing (ROECT). Passively received power measurements were collected, and then a Gaussian mixture model (GMM) was used to build a classifier for labeling observed power samples relative to their source. Overall accuracy was verified at 98.86%. Case studies are presented utilizing IEEE 802.11n as an IS with UTS based on either IEEE 802.11n or ZigBee. Results demonstrated the mutual effect of spectrum sharing on both IS and UTS in terms of per-second channel utilization and frame collision. The process of approximating the probability of a device to coexist in its intended environment is discussed, and a generalized framework for modeling the environment is presented. An 84-day spectrum survey of the 2.4 GHz to 2.48 GHz ISM band in a hospital environment serves as proof of concept. A custom platform was used to monitor power flux spectral density and record received power in both an intensive care unit (ICU) and a post-surgery recovery room (RR). Observations indicated that significant correlation in activity patterns corresponded mainly to IEEE 802.11 channels 1, 6, and 11. Consequently, channel utilization of three non-overlapping channels of 20 MHz bandwidth---relative to IEEE 802.11 channels 1, 6, and 11---were calculated and fitted to a generalized extreme value (GEV) distribution. Low channel utilization ( 50%), was observed in the surveyed environment. Reported findings can be complementary to wireless coexistence testing. Quantifying the probability of UTS coexistence in a given environment is central to the evaluation of coexistence, as evidenced in the draft of the C63.27 standard. Notably, a method for this calculation is not currently provided in the standard. To fill this void, the work presented herein proposes the use of logistic regression (LR) to estimate coexistence probability. ROECT was utilized to test a scenario with an 802.11n IS and ZigBee UTS medical device. Findings demonstrate that fitted LR model achieves 92.72% overall accuracy of classification on a testing dataset that included the outcome of a wide variety of coexistence testing scenarios. Results were incorporated with those reported in [1] using Monte Carlo simulation to estimate UTS probability of coexistence in a hospital environment

    Practical English Course for Engineering Students

    Get PDF
    Представляет собой систематизированный практический курс английского языка, целью которого является совершенствование навыков, а также развитие умений чтения и понимания англоязычной научно-технической литературы во взаимосвязи с другими видами речевой деятельности: говорением, аудированием и письмом. Состоит из четырех модулей: Electronics; Telecommunications; Information Technologies; Artificial Intelligence. Разработанная на основе модульного подхода структура, организация и изложение учебного материала позволяют использовать пособие как для аудиторной, так и для самостоятельной работы. Предназначено для студентов I ступени высшего образования, изучающих учебную дисциплину «Иностранный язык». Может быть полезно широкому кругу читателей, желающих совершенствовать навыки и развивать умения чтения и понимания англоязычной научно-технической литературы
    corecore