3,074 research outputs found
Synchronous Relaying Of Sensor Data
In this paper we have put forth a novel methodology to relay data obtained by
inbuilt sensors of smart phones in real time to remote database followed by
fetching of this data . Smart phones are becoming very common and they are
laced with a number of sensors that can not only be used in native applications
but can also be sent to external nodes to be used by third parties for
application and service development
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
Synchronization of relay nodes is an important and critical issue in
exploiting cooperative diversity in wireless networks. In this paper, two
asynchronous cooperative diversity schemes are proposed, namely, distributed
delay diversity and asynchronous space-time coded cooperative diversity
schemes. In terms of the overall diversity-multiplexing (DM) tradeoff function,
we show that the proposed independent coding based distributed delay diversity
and asynchronous space-time coded cooperative diversity schemes achieve the
same performance as the synchronous space-time coded approach which requires an
accurate symbol-level timing synchronization to ensure signals arriving at the
destination from different relay nodes are perfectly synchronized. This
demonstrates diversity order is maintained even at the presence of asynchronism
between relay node. Moreover, when all relay nodes succeed in decoding the
source information, the asynchronous space-time coded approach is capable of
achieving better DM-tradeoff than synchronous schemes and performs equivalently
to transmitting information through a parallel fading channel as far as the
DM-tradeoff is concerned. Our results suggest the benefits of fully exploiting
the space-time degrees of freedom in multiple antenna systems by employing
asynchronous space-time codes even in a frequency flat fading channel. In
addition, it is shown asynchronous space-time coded systems are able to achieve
higher mutual information than synchronous space-time coded systems for any
finite signal-to-noise-ratio (SNR) when properly selected baseband waveforms
are employed
Anonymous Networking amidst Eavesdroppers
The problem of security against timing based traffic analysis in wireless
networks is considered in this work. An analytical measure of anonymity in
eavesdropped networks is proposed using the information theoretic concept of
equivocation. For a physical layer with orthogonal transmitter directed
signaling, scheduling and relaying techniques are designed to maximize
achievable network performance for any given level of anonymity. The network
performance is measured by the achievable relay rates from the sources to
destinations under latency and medium access constraints. In particular,
analytical results are presented for two scenarios:
For a two-hop network with maximum anonymity, achievable rate regions for a
general m x 1 relay are characterized when nodes generate independent Poisson
transmission schedules. The rate regions are presented for both strict and
average delay constraints on traffic flow through the relay.
For a multihop network with an arbitrary anonymity requirement, the problem
of maximizing the sum-rate of flows (network throughput) is considered. A
selective independent scheduling strategy is designed for this purpose, and
using the analytical results for the two-hop network, the achievable throughput
is characterized as a function of the anonymity level. The throughput-anonymity
relation for the proposed strategy is shown to be equivalent to an information
theoretic rate-distortion function
Hydrologic data relay by satellite from remote areas
The author has identified the following significant results. Experimental use of LANDSAT data collection system and the GOES system has demonstrated the feasibility of using this technology to relay hydrologic data from remote areas on a near real time basis. The system has proved to be accurate, reliable, and cost effective
Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of emphspatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender
Remote Sensing of Snow Fields from Earth Satellites
Considerable effort has gone into snow line delineation using available satellite data. Furthermore, increasing emphasis is being put on automated extraction of such information and generation of a useable product for hydrologists. Implications are clear that the impact from future satellite and sensors systems will create an increased demand for computer processing before the data can be used by the hydrologist. If the coarse-resolution, broad spectral band data available from current satellites already create a demand by hydrologists for computer processing of the data, it is obvious there will be an even greater demand for computer analysis and evaluation when the future ERTS data become available
Typical teleoperator time delay profiles, phase 2
The results of the second phase of a study on time delays in communications systems applicable to the teleoperator program are presented. Estimates of the maximum time delays that will be encountered and presents time delay profiles are given for (1) ground control to teleoperator in low earth orbit, (2) ground control to teleoperator in geosynchronous orbit, and (3) low earth orbit control to teleoperator in low earth orbit
- …