101 research outputs found
Collaborative Beamforming for Distributed Wireless Ad Hoc Sensor Networks
The performance of collaborative beamforming is analyzed using the theory of
random arrays. The statistical average and distribution of the beampattern of
randomly generated phased arrays is derived in the framework of wireless ad hoc
sensor networks. Each sensor node is assumed to have a single isotropic antenna
and nodes in the cluster collaboratively transmit the signal such that the
signal in the target direction is coherently added in the far- eld region. It
is shown that with N sensor nodes uniformly distributed over a disk, the
directivity can approach N, provided that the nodes are located sparsely
enough. The distribution of the maximum sidelobe peak is also studied. With the
application to ad hoc networks in mind, two scenarios, closed-loop and
open-loop, are considered. Associated with these scenarios, the effects of
phase jitter and location estimation errors on the average beampattern are also
analyzed.Comment: To appear in the IEEE Transactions on Signal Processin
Secrecy Design of Indoor Visible Light Communication Network under Downlink NOMA Transmission
In this work, we investigate the transmission sum rate as well as the secrecy
sum rate of indoor visible light communication (VLC) networks for mobile
devices with the power domain non-orthogonal multiple access (NOMA)
transmission, where multiple legitimate users are equipped with photodiodes
(PDs). We introduce a body blockage model of the legitimate users as well as
the eavesdropper to focus on the case where the communications from
transmitting light-emitting diodes (LEDs) to receiving devices are blocked by
the bodies of receiving users. Furthermore, in order to improve the secrecy
without any knowledge of the channel state information (CSI) of the
eavesdropper, a novel LED arrangement is introduced to reduce the overlapping
area covered by LED units supporting different users. We also propose two LED
operation strategies, called simple and smart LED linking, and evaluate their
performance against the conventional broadcasting in terms of transmission sum
rate and secrecy sum rate. Through computer simulations, the superiority of our
proposed strategies is demonstrated.Comment: 30 pages, 13 figures. This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessibl
Live E! Project: Establishment of Infrastructure Sharing Environmental Information
The Live E! project is an open research consortium among industry and academia to explore the platform to share the digital information related with the earth and our living environment. We have getting a lot of low cost sensor nodes with Internet connectivity. The deployment of broad-band and ubiquitous networks will enable autonomous and global digital information sharing over the globe. In this paper, we describe the technical and operational overview of Live E! project, while discussing the objective, such as education, disaster protection/reduction/recovery or busi-ness cases, and goal of this project activity. 1
Beware of Pickpockets: A Practical Attack against Blocking Cards
peer reviewedToday, we rely on contactless smart cards to perform several critical operations (e.g., payments and accessing buildings). Attacking smart cards can have severe consequences, such as losing money or leaking sensitive information. Although the security protections embedded in smart cards have evolved over the years, those with weak security properties are still commonly used. Among the different solutions, blocking cards are affordable devices to protect smart cards. These devices are placed close to the smart cards, generating a noisy jamming signal or shielding them. Whereas vendors claim the reliability of their blocking cards, no previous study has ever focused on evaluating their effectiveness. In this paper, we shed light on the security threats on smart cards in the presence of blocking cards, showing the possibility of being bypassed by an attacker. We analyze blocking cards by inspecting their emitted signal and assessing a vulnerability in their internal design.We propose a novel attack that bypasses the jamming signal emitted by a blocking card and reads the content of the smart card. We evaluate the effectiveness of 11 blocking cards when protecting a MIFARE Ultralight smart card and a MIFARE Classic card. Of these 11 cards, we managed to bypass 8 of them and successfully dump the content of a smart card despite the presence of the blocking card. Our findings highlight that the noise type implemented by the blocking cards highly affects the protection level achieved by them. Based on this observation, we propose a countermeasure that may lead to the design of effective blocking cards. To further improve security, we released the tool we developed to inspect the spectrum emitted by blocking cards and set up our attack
Robotic rehabilitation training with a newly developed upper limb single-joint Hybrid Assistive Limb (HAL-SJ) for elbow flexor reconstruction after brachial plexus injury: A report of two cases
This study aimed to evaluate the effectiveness and safety of using the upper limb single-joint Hybrid Assistive Limb (upper limb HAL-SJ) during elbow flexion training following elbow flexor reconstruction for brachial plexus injury (BPI). We present the cases of two patients in whom the upper limb HAL-SJ was implemented 5 and 7 months postoperatively following elbow flexor reconstruction for BPI. They underwent elbow flexor reconstruction with intercostal nerve crossing-to-musculocutaneous nerve (ICN-MCN crossing) after BPI. Postoperative training using the upper limb HAL-SJ was started from the Medical Research Council (MRC) grade 1 elbow flexion power to MRC grade 3 once every week or every 2 weeks. Both patients could implement elbow training using the upper limb HAL-SJ even in MRC grade 1 of their elbow flexion power. Training with the upper limb HAL-SJ was performed safely and effectively in two patients with elbow flexor reconstruction with ICN crossing after BPI
Existence of a Neuropathic Pain Component in Patients with Osteoarthritis of the Knee
∙ The authors have no financial conflicts of interest. © Copyright: Yonsei University College of Medicine 2012 This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial Licens
- …