751 research outputs found

    Beamforming for Magnetic Induction based Wireless Power Transfer Systems with Multiple Receivers

    Full text link
    Magnetic induction (MI) based communication and power transfer systems have gained an increased attention in the recent years. Typical applications for these systems lie in the area of wireless charging, near-field communication, and wireless sensor networks. For an optimal system performance, the power efficiency needs to be maximized. Typically, this optimization refers to the impedance matching and tracking of the split-frequencies. However, an important role of magnitude and phase of the input signal has been mostly overlooked. Especially for the wireless power transfer systems with multiple transmitter coils, the optimization of the transmit signals can dramatically improve the power efficiency. In this work, we propose an iterative algorithm for the optimization of the transmit signals for a transmitter with three orthogonal coils and multiple single coil receivers. The proposed scheme significantly outperforms the traditional baseline algorithms in terms of power efficiency.Comment: This paper has been accepted for presentation at IEEE GLOBECOM 2015. It has 7 pages and 5 figure

    On Capacity of Active Relaying in Magnetic Induction based Wireless Underground Sensor Networks

    Full text link
    Wireless underground sensor networks (WUSNs) present a variety of new research challenges. Magnetic induction (MI) based transmission has been proposed to overcome the very harsh propagation conditions in underground communications in recent years. In this approach, induction coils are utilized as antennas in the sensor nodes. This solution achieves longer transmission ranges compared to the traditional electromagnetic (EM) waves based approach. Furthermore, a passive relaying technique has been proposed in the literature where additional resonant circuits are deployed between the nodes. However, this solution is shown to provide only a limited performance improvement under practical system design contraints. In this work, the potential of an active relay device is investigated which may improve the performance of the system by combining the benefits of the traditional wireless relaying and the MI based signal transmission.Comment: This paper has been accepted for presentation at IEEE ICC 2015. It has 6 pages, 5 figures (4 colored), and 17 reference

    Joint multicast routing and channel assignment in multiradio multichannel wireless mesh networks using simulated annealing

    Get PDF
    This is the post-print version of the article - Copyright @ 2008 Springer-VerlagThis paper proposes a simulated annealing (SA) algorithm based optimization approach to search a minimum-interference multicast tree which satisfies the end-to-end delay constraint and optimizes the usage of the scarce radio network resource in wireless mesh networks. In the proposed SA multicast algorithm, the path-oriented encoding method is adopted and each candidate solution is represented by a tree data structure (i.e., a set of paths). Since we anticipate the multicast trees on which the minimum-interference channel assignment can be produced, a fitness function that returns the total channel conflict is devised. The techniques for controlling the annealing process are well developed. A simple yet effective channel assignment algorithm is proposed to reduce the channel conflict. Simulation results show that the proposed SA based multicast algorithm can produce the multicast trees which have better performance in terms of both the total channel conflict and the tree cost than that of a well known multicast algorithm in wireless mesh networks.This work was supported by the Engineering and Physical Sciences Research Council (EPSRC) of UK under Grant EP/E060722/1

    An analysis on decentralized adaptive MAC protocols for Cognitive Radio networks

    Get PDF
    The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the Cognitive Radio (CR) Technology which is an opportunistic network that senses the environment, observes the network changes, and then using knowledge gained from the prior interaction with the network, makes intelligent decisions by dynamically adapting their transmission characteristics. In this paper some of the decentralized adaptive MAC protocols for CR networks have been critically analyzed and a novel adaptive MAC protocol for CR networks, DNG-MAC which is decentralized and non-global in nature, has been proposed. The results show the DNG-MAC out performs other CR MAC protocols in terms of time and energy efficiency

    Fully probabilistic deep models for forward and inverse problems in parametric PDEs

    Get PDF
    We introduce a physics-driven deep latent variable model (PDDLVM) to learn simultaneously parameter-to-solution (forward) and solution-to-parameter (inverse) maps of parametric partial differential equations (PDEs). Our formulation leverages conventional PDE discretization techniques, deep neural networks, probabilistic modelling, and variational inference to assemble a fully probabilistic coherent framework. In the posited probabilistic model, both the forward and inverse maps are approximated as Gaussian distributions with a mean and covariance parameterized by deep neural networks. The PDE residual is assumed to be an observed random vector of value zero, hence we model it as a random vector with a zero mean and a user-prescribed covariance. The model is trained by maximizing the probability, that is the evidence or marginal likelihood, of observing a residual of zero by maximizing the evidence lower bound (ELBO). Consequently, the proposed methodology does not require any independent PDE solves and is physics-informed at training time, allowing the real-time solution of PDE forward and inverse problems after training. The proposed framework can be easily extended to seamlessly integrate observed data to solve inverse problems and to build generative models. We demonstrate the efficiency and robustness of our method on finite element discretized parametric PDE problems such as linear and nonlinear Poisson problems, elastic shells with complex 3D geometries, and time-dependent nonlinear and inhomogeneous PDEs using a physics-informed neural network (PINN) discretization. We achieve up to three orders of magnitude speed-up after training compared to traditional finite element method (FEM), while outputting coherent uncertainty estimates

    Preliminary assessment of microfibres amount in textile wastewater

    Get PDF
    Textile wastewater is a complex mixture of inorganic compounds, polymers, organic products, dyes, and microfibers (MFs), including microplastics (MPs) and natural fibers. The treatment of textile wastewater, which contains a significant share of MFs, is of great importance to prevent the release of MPs in the environment. MPs analysis requires multiple phases of pretreatment (to eliminate the organic compounds), separation of the MFs from the water, and identification of the MPs among the MFs.This work presents the preliminary results of a research aimed at exploring two issues. Firstly, the pretreatment (through Fenton, H2O2, HCl, KOH and NaOH, applied at 25 °C for 5 days and 60 °C for 6 hours) of artificial textile wastewater, evaluating the effect of the different conditions on the MFs and the MPs. Secondly, the separation of MFs from a real textile wastewater sample through different processes (centrifugation, sink-float & filtration, filtration). The results of the pretreatment tests revealed Fenton, HCl, and H2O2 at 25 °C for 5 days as the best performing chemicals and conditions. Considering the results of the separation tests, filtration gave back the best removal of the MFs from wastewater compared to centrifugation and sink-float and filtration, which left some MFs in the supernatant/float and in the sediment/sink. In conclusion, these preliminary results may be useful to further explore the detection of MFs and MPs in textile wastewater

    Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring

    Get PDF
    Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can collaboratively perform sandstorm monitoring and rapidly convey the observations to remote administration center. Despite the potential advantages, the deployment of WSNs in the vicinity of sandstorms faces many unique challenges, such as the temporally buried sensors and increased path loss during sandstorms. Consequently, the WSNs may experience frequent disconnections during the sandstorms. This further leads to dynamically changing topology. In this paper, a topology analysis of the WSNs for sandstorm monitoring is performed. Four types of channels a sensor can utilize during sandstorms are analyzed, which include air-to-air channel, air-to-sand channel, sand-to-air channel, and sand-to-sand channel. Based on the channel model solutions, a percolation-based connectivity analysis is performed. It is shown that if the sensors are buried in low depth, allowing sensor to use multiple types of channels improves network connectivity. Accordingly, much smaller sensor density is required compared to the case, where only terrestrial air channels are used. Through this topology analysis a WSN architecture can be deployed for very efficient sandstorm monitoring

    Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring

    Get PDF
    Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can collaboratively perform sandstorm monitoring and rapidly convey the observations to remote administration center. Despite the potential advantages, the deployment of WSNs in the vicinity of sandstorms faces many unique challenges, such as the temporally buried sensors and increased path loss during sandstorms. Consequently, the WSNs may experience frequent disconnections during the sandstorms. This further leads to dynamically changing topology. In this paper, a topology analysis of the WSNs for sandstorm monitoring is performed. Four types of channels a sensor can utilize during sandstorms are analyzed, which include air-to-air channel, air-to-sand channel, sand-to-air channel, and sand-to-sand channel. Based on the channel model solutions, a percolation-based connectivity analysis is performed. It is shown that if the sensors are buried in low depth, allowing sensor to use multiple types of channels improves network connectivity. Accordingly, much smaller sensor density is required compared to the case, where only terrestrial air channels are used. Through this topology analysis a WSN architecture can be deployed for very efficient sandstorm monitoring

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Get PDF
    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths
    corecore