278 research outputs found

    Soft Handover scheme for WSN nodes using media independent handover functions

    Get PDF
    The present wireless networks are equipped with multiple radio links and operate in a collaborative way to enable continuous data transfer even when any link goes down. The IEEE 802.21 is a standard to provide continuous wireless connectivity between heterogeneous link technologies using media independent handover functions as MIHF. The standard supports handover between IEEE 802.11, IEEE 802.16, 3GPP cellular networks. The wireless sensor networks (WSN) based on IEEE 802.15.4 consists of sensors to monitor various physical or physiological activities and to transfer the collected data to the remote controlling station using a short range radio. But in this case if the wireless node moves out of each other's communication range data transfer is not possible. So in this paper, the WSN communication protocol is made as a part of the IEEE 802.21 stack to explore the handover feature offered by the standard. The proposed stack has an internal partition to make WSN protocol to operate independently with other similar modules as long as they are in range, and the MIH function gets triggered by the application when the home networks are not available thus to provide handover from other link interfaces. The proposed hardware has IEEE 802.11, IEEE 802.16, and 3GPP links which are operated by the MIH functions along with the IEEE 802.15.4 interface. So the WSN modules are provisioned to have connectivity from multiple radio interfaces even if they move out of the coverage range from the current point of access. The proposed primitives for handover between WSN and other links are efficient in providing reliable handoff. Keywords: IEEE 802.21, Media independent handover, IEEE 802.15.4, Wireless sensor network

    Detection and Classification of EEG Epileptiform Transients with RBF Networks using Hilbert Huang Transform-derived Features

    Get PDF
    Diagnosis of epilepsy or epileptic transients AEP (Abnormal Epileptiform Paroxysmal) is tedious, but important, and an expensive process. The process involves trained neurologists going over the patient\u27s EEG records looking for epileptiform discharge like events and classifying it as AEP (Abnormal Epileptiform Paroxysmal) or non-AEP. The objective of this research is to automate the process of detecting such events and classifying them into AEP(definitely an Epileptiform Transient) and non-AEPs (unlikely an epileptiform transient). The problem is approached in two separate steps and cascaded to validate and analyze the performance of the overall system. The first step is a detection problem to find the Epileptiform like transients (ETs) from the Electroencephalograph (EEG) of a patient. A Radial basis function-based neural network has been trained using a training set consisting of examples from both classes (ETs and non-ETs). The ETs are the yellow boxes which are marked by expert neurologists. There are no particular examples of non-ETs and any data not annotated by experts can be considered to be examples of non-ETs. The second step is classification of the detected ETs also known as yellow boxes, into AEPs or non-AEPs. A similar Radial basis function-based neural network has been trained using the ETs marked and classified into AEPs and non-AEPs manually by seven expert neurologists. The annotations or yellow boxes along with the contextual signal was used to extract features using the Hilbert Huang Transform. The system is validated by considering an entire epoch of the patient EEG and potential ETs are identified using the detector. The potential ETs marked by the detector are classified into AEPs and non-AEPs and compared against the annotations marked by the experts

    Remote Sensing As A Tool For Conservation: Honey bees, Forage And Distribution

    Get PDF
    Employing remote sensing techniques, researchers and conservationists can gain valuable insights into the complex interplay between land use changes, vegetation dynamics, and pollination services, ultimately contributing to the conservation and sustainable management of these vital ecosystems. Indicators play a crucial role in assessing the efficacy of conservation strategies, particularly when it comes to averting habitat degradation. The suitability of habitats for these bees is strongly influenced by ecological parameters compared to social and economic parameters.vIn the context of beekeeping, habitat suitability is a critical consideration, considering the ecological environment and land suitability for feed sources. Geographic Information Systems (GIS) play a important role in developing models for land suitability evaluation

    Characterization of Pr6O11-Ag2o-B2O3 Glasses

    Get PDF
    Silver borate glasses doped with Praseodymium of different concentration has been prepared by melt quench technique. X-ray diffraction pattern shows that there is no sharp peak it confirms the amorphous nature of the present glasses. The glass transition temperature (Tg) of this glass system have been studied using the Matac MBS-8000 Digital Signal Processing and Conventional Thermal Analysis (DTA) method. The Tg of these glasses increases with increase in concentration of Pr6O11 except at 0.2 mol%Tg value is lower. We investigate the network structure of Pr6O11-Ag2O-B2O3 glass by 11B magic angle spinning (MAS)-nuclear magnetic resonance (NMR) which shows the presence of sharp peak at around 18 ppm. Formation of B4 units is assumed to be occurring initially through the formation of oxygen bridges between [BO3/2]0 units in B2O3

    Optical Properties of Praseodymium Doped Silver-Borate Glasses

    Get PDF
    Praseodymium doped silver–borate glasses having composition xPr6O11–(25 – x)Ag2O–75B2O3 (x = 0, 1, 2, 3, 4, 5) were prepared by conventional melt quenching method. The density, molar volume, and optical energy band gap of these glasses were measured. Optical absorption spectra of these glasses were recorded in the range 300–1000 nm at room temperature. The refractive index, molar refraction, and polarizability of oxide ion were calculated by using Lorentz–Lorentz relations. The oxide ion polarizabilities deduced from two different quantities, viz. refractive index and optical energy band gap, agree well compared with other glasses. The variation of the preceding optical parameters with respect to praseodymium concentration is explained

    Corrosion Classification, Rate And Corrosion Product Type: A Review

    Get PDF
    Corrosion is a slow process that occurs primarily on metal surfaces, but the corrosion related losses are of high order. When considering only the loss of metal, the damages cannot be measured. Except for the least active noble metals, corrosion occurs with all metals. The indirect losses are much higher. Consideration must also be given to the cost of fabrication and cost of preventing corrosion. Indirect losses are higher than the direct losses. When a structure such as building or bridge collapsed due to problems with corrosion the damage often involves the loss of human life and property and the cost of subsequent reconstruction and alternative solution. Corrosion is quite noticeable in some types of corrosion and is only seen when an accident occurs

    Design and Implementation of Image Steganography by using LSB Replacement Algorithm and Pseudo Random Encoding Technique

    Get PDF
    Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. Here we are implementing the image steganograpgy i.e image as the master file or cover media and secrete message can be text messages. This paper presents to provide the transfer of secret data embedded into master file to obtain new image , which is practically indistinguishable from the original image, so that other than the indeed user, cannot detect the presence of the secrete data sent. Here we use the Least Significant Bit (LSB) algorithm and Pseudo Random encoding technique for hiding the secrete data by embedding the secrete data into a master file in sending station and we use reverse process of LSB and Pseudo random encoding techniques during the retrieval of the secrete data from the master file by the intended user. The PSNR of both techniques should be measured as performance characteristics of the steganography and comparing both the techniques. DOI: 10.17762/ijritcc2321-8169.15071

    Seamless WSN Connectivity Using Diverse Wireless Links

    Get PDF
    © 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Data transfer using wireless sensor networks (WSN) is bound by its limited coverage range. In order to communicate data beyond the coverage capability of a WSN link and make it pervasive, the authors here propose a method of information handover using heterogeneous wireless links for sensor-based data transmission. They draw on connectivity, one of the main features of a pervasive network. In the handover method proposed here, the WSN link is part of a wireless module which integrates various heterogeneous wireless links. All these wireless links are combined and coordinated using media independent handover functions (MIH) in accordance with the 802.21 Standard. As wireless modules have multiple wireless links, each module can communicate with the others using any one of the active links. When these wireless modules consisting of multiple links move beyond the communication range of the WSN link to maintain continuous connectivity the MIH in the module triggers the other wireless links to hand over the service with the help of access points in the surrounding area. The concept is discussed here in the context of a smart home application which transfers the sensed information continuously to a remotely located controlling station using the existing wireless infrastructure
    • …
    corecore