18 research outputs found

    An Adaptive Algorithm to Optimize the Dynamics of IEEE 802.15.4 Networks

    Get PDF
    Presentado en ICST 2013IEEE 802.15.4 standard is becoming one of the most popular technologies for the deployment of low rate Wireless Personal Area Networks with strong power constraints. In order to reduce the energy consumption, beacon-enabled networks with long network inactive periods can be employed. However, the duration of these inactivity periods, as some other configuration parameters, are conventionally set to default values and remain fixed during the whole network operation. This implies that if they are misconfigured the network will not adapt to changes in the conditions of the environment, particularly to the most determining one, i.e. the traffic load. This paper proposes a simple procedure for the dynamic adaptation of several key parameters of IEEE 802.15.4 networks. Under this procedure, the 802.15.4 parameters are modified as a function of the existing traffic conditions.Spanish National Project No.TEC2009-13763-C02-01

    Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    Get PDF
    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead

    Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    Get PDF
    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results

    Network-Based Asymmetry of the Human Auditory System.

    Get PDF
    Converging evidence from activation, connectivity, and stimulation studies suggests that auditory brain networks are lateralized. Here we show that these findings can be at least partly explained by the asymmetric network embedding of the primary auditory cortices. Using diffusion-weighted imaging in 3 independent datasets, we investigate the propensity for left and right auditory cortex to communicate with other brain areas by quantifying the centrality of the auditory network across a spectrum of communication mechanisms, from shortest path communication to diffusive spreading. Across all datasets, we find that the right auditory cortex is better integrated in the connectome, facilitating more efficient communication with other areas, with much of the asymmetry driven by differences in communication pathways to the opposite hemisphere. Critically, the primacy of the right auditory cortex emerges only when communication is conceptualized as a diffusive process, taking advantage of more than just the topologically shortest paths in the network. Altogether, these results highlight how the network configuration and embedding of a particular region may contribute to its functional lateralization

    Rethinking First Language–Second Language Similarities and Differences in English Proficiency: Insights From the ENglish Reading Online (ENRO) Project

    Full text link
    This article presents the ENglish Reading Online (ENRO) project that offers data on English reading and listening comprehension from 7,338 university-level advanced learners and native speakers of English representing 19 countries. The database also includes estimates of reading rate and seven component skills of English, including vocabulary, spelling, and grammar, as well as rich demographic and language background data. We first demonstrate high reliability for ENRO tests and their convergent validity with existing meta-analyses.We then provide a bird’s-eye view of first (L1) and second (L2) language comparisons and examine the relative role of various predictors of reading and listening comprehension and reading speed. Across analyses, we found substantially more overlap than differences between L1 and L2 speakers, suggesting that English reading proficiency is best considered across a continuum of skill, ability, and experiences spanning L1 and L2 speakers alike. We end by providing pointers for how researchers can mine ENRO data for future studies

    Integrity and ethnicity : A research on different ethnic groups point of view on personal integrity in the context of Direct Marketing.

    No full text
    Sverige har kommit att förÀndras i takt med att inflyttningen av folk av annan etnicitet och kulturer har ökat pÄ senare decennier. Sverige har nuförtiden en kulturell och etnisk mÄngfald som Àr ett resultat avkrissituationer i omvÀrlden och dÀr Sverige har kommit att bli ett nytt hem för mÄnga. Konsumenterna i Sverige Àr med andra ord inte lika homogena som förr. Samtidigt har marknadsföringen genomgÄtt ett paradigmskifte dÀr professionella har alltmer gÄtt frÄn transaktionsmarknadsföring till relationsmarknadsföring dÀr allt större tyngd sÀtts pÄ att kÀnna kunden ochskapa en tillit och en förtroendeingivande relation med denne. Direktmarknadsföring Àr den metodik som vi har utgÄtt ifrÄn inomrelationsmarknadsföringen. Som i alla relationer, har respekterandet av denpersonliga integriteten en nyckelroll Àven i relationen mellan företag och kund. Syftet med vÄr uppsats Àr att undersöka hur synen pÄ den personliga integriteten skiljer sig Ät mellan fyra olika etniska grupper; svenskar, kroater, syrier och iranier. För att besvara det har vi utformat tvÄ forskningsfrÄgor:1. Vilka skillnader finns det i synen pÄ personlig integritet i samband med direktmarknadsföring mellan svenskar, kroater, syrier och iranier?2. Vad beror skillnaderna pÄ?För att kunna besvara frÄgorna har vi anvÀnt oss av den kvalitativa metodenoch anvÀnt oss av fokusgruppintervjuer dÀr vi har intervjuat en fokusgruppur varje aktuell etnisk grupp. Vi har Àven studerat litteratur ochvetenskapliga artiklar i Àmnet för att bilda oss en akademisk grund och ettakademiskt perspektiv pÄ vÄrt arbete.De skillnader som vi fann var bland annat att den svenska gruppen vÀljer attifrÄgasÀtta traditionella vÀrderingar för att sedan bilda en egen uppfattningnÄgot som inte förekommer hos de andra grupperna. Den svenska gruppenvar dock den grupp som lÀttast skulle kunna ge ut sitt personnummer.Svenska gruppen ser inte adressen som nÄgonting privat eftersom den Àroffentligt publicerad och dÀrför tror vi att acceptansen Àr större blandsvenskar Àn bland de andra etniska grupperna, antagligen för att svenskarnasattityder understöds av en kraftig tilltro till staten. Svenskarnas kÀnsla av attDR Àr skrÀppost som ett resultat av en ambition att leva i en viss social miljöoch DR passar inte in riktigt i den. Syrierna verkar pÄ ett sÀtt ha dentydligaste grÀnsen pÄ personlig integritet av alla de undersökta grupperna. PÄgrund av att det förekommer korruption i hemlandet anser de att detsÀkerligen finns misstanke om att det förekommer korruption i det svenska6samhÀllet ocksÄ. Att den iranska gruppen Àr mest emot handel med adressertror vi beror ocksÄ pÄ att det i deras hemland sÄ förekommer det en delkorruption och det kan vara en omedveten spÀrr som sÀger att det Àr bÀttreatt vara lite reserverad. Problemet med krÀnkning av den personligaintegriteten Àr inte endast sjÀlva registreringen utan att den registreradeinformationen hamnar i fel hÀnder. I den biten har kroatiska gruppen starkaÄsikter om företagens anvÀndning av registrerade telefonsamtalslistor vilketkan antagligen förklaras med erfarenheter frÄn krigstiden.De rekommendationer vi har lagt fram Àr bland annat att olika etniciteter harolika Äsikter om vad som betraktas personligt och mÄnga skiljer pÄ detprivata och det allmÀnna. Genom att företag skaffar information om olikaetniciteters allmÀnna förhÄllningssÀtt till personlig integritet sÄ kan de skapanÄgon form av relation med kunden. DÄ Àr företaget inte lÀngre en frÀmlingför kunden och dÄ Àr acceptansen högre nÀr det gÀller att lÀmna ifrÄn sigpersonlig information.UppsatsnivÄ:

    Exception detection in business process management systems

    No full text
    188-193This study presents exception detection in process management system, which uses active semantic model (ASM), a hybrid system comprising semantic networks, expert systems, object oriented programming and fuzzy logic. ASM is employed to capture semantic features of all kinds of workflow situations, as well as to detect and interpret exceptions

    Time Sensitive IEEE 802.15.4 Protocol

    No full text

    ZigBee: A long way to go?

    No full text
    corecore