首页 > 最新文献

2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Path diversity gain with network coding and multipath transmission in wireless mesh networks 无线网状网络中网络编码和多径传输的路径分集增益
N. Pappas, V. Siris, A. Traganitis
In this paper we investigate the performance that can be achieved by exploiting path diversity through multipath forwarding together with redundancy through linear network coding, in wireless mesh networks with directional links. A key contribution of the paper is to capture the tradeoff between packet delay and throughput achieved by combining multipath forwarding and network coding, and compare this tradeoff with that of simple multipath routing where different flows follow different paths, the transmission of multiple copies of packets over multiple paths, and single path routing. The analytical framework considers the case of end-to-end retransmission for achieving reliability, and is generalized for an arbitrary number of paths and hops. We also derive the minimum and maximum number of coded packets that are needed at the receiver to retrieve all packets sent by the sender; this can be used to obtain a lower and upper bound for the delay in the case of linear network coding with multipath forwarding.
在本文中,我们研究了在具有定向链路的无线网状网络中,通过多路径转发利用路径分集和通过线性网络编码利用冗余可以实现的性能。本文的一个关键贡献是捕获了通过结合多路径转发和网络编码实现的数据包延迟和吞吐量之间的权衡,并将这种权衡与简单多路径路由的权衡进行比较,其中不同的流遵循不同的路径,在多条路径上传输多个数据包副本,以及单路径路由。分析框架考虑了端到端重传的情况,以实现可靠性,并推广到任意数量的路径和跳数。我们还推导出接收端检索发送端发送的所有数据包所需的最小和最大编码数据包数;这可以用来得到多径转发的线性网络编码的时延下界和上界。
{"title":"Path diversity gain with network coding and multipath transmission in wireless mesh networks","authors":"N. Pappas, V. Siris, A. Traganitis","doi":"10.1109/WOWMOM.2010.5534996","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534996","url":null,"abstract":"In this paper we investigate the performance that can be achieved by exploiting path diversity through multipath forwarding together with redundancy through linear network coding, in wireless mesh networks with directional links. A key contribution of the paper is to capture the tradeoff between packet delay and throughput achieved by combining multipath forwarding and network coding, and compare this tradeoff with that of simple multipath routing where different flows follow different paths, the transmission of multiple copies of packets over multiple paths, and single path routing. The analytical framework considers the case of end-to-end retransmission for achieving reliability, and is generalized for an arbitrary number of paths and hops. We also derive the minimum and maximum number of coded packets that are needed at the receiver to retrieve all packets sent by the sender; this can be used to obtain a lower and upper bound for the delay in the case of linear network coding with multipath forwarding.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
LER-MAC: A Load-independent Energy-efficient and Rate-control Integrated Asynchronous Duty Cycle MAC for Wireless Sensor Networks LER-MAC:一种用于无线传感器网络的负载无关、节能和速率控制的集成异步占空比MAC
M. Monowar, M. Alam, Md. Obaidur Rahman, C. Hong
Considering energy as a crucial resource, several duty cycle based MAC have already been proposed for Wireless Sensor Networks (WSNs) to gain higher energy efficiency during long idle period of the sensors, and are optimized for light traffic loads. Contrastively, considering the bandwidth constraint of WSNs, and to optimize the heavy traffic loads, another research trend is continuing in devising rate and congestion control at the MAC layer. To provide an integrated solution of both these distinct research trends at the MAC layer, in this paper, we present a Load-independent Energy-efficient and Rate-control Integrated Asynchronous Duty Cycle MAC (LER-MAC) for WSNs. Performance of LER-MAC has been evaluated using ns-2 which demonstrates that, LER-MAC conserves energy considerably during light traffic loads along with procures higher throughput and lower latency avoiding packet drops through maximum utilization of the channel during heavy traffic loads.
考虑到能源是一种至关重要的资源,为了在传感器长空闲时间内获得更高的能源效率,并针对轻交通负载进行了优化,已经提出了几种基于占空比的无线传感器网络MAC。相比之下,考虑到无线传感器网络的带宽限制,为了优化大流量负载,在MAC层设计速率和拥塞控制是另一个研究趋势。为了在MAC层提供这两种不同研究趋势的综合解决方案,本文提出了一种用于wsn的负载无关的节能和速率控制集成异步占空比MAC (LER-MAC)。使用ns-2对LER-MAC的性能进行了评估,结果表明,在轻流量负载期间,LER-MAC可以节省大量能量,同时在大流量负载期间,通过最大限度地利用信道,可以实现更高的吞吐量和更低的延迟,避免丢包。
{"title":"LER-MAC: A Load-independent Energy-efficient and Rate-control Integrated Asynchronous Duty Cycle MAC for Wireless Sensor Networks","authors":"M. Monowar, M. Alam, Md. Obaidur Rahman, C. Hong","doi":"10.1109/WOWMOM.2010.5534901","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534901","url":null,"abstract":"Considering energy as a crucial resource, several duty cycle based MAC have already been proposed for Wireless Sensor Networks (WSNs) to gain higher energy efficiency during long idle period of the sensors, and are optimized for light traffic loads. Contrastively, considering the bandwidth constraint of WSNs, and to optimize the heavy traffic loads, another research trend is continuing in devising rate and congestion control at the MAC layer. To provide an integrated solution of both these distinct research trends at the MAC layer, in this paper, we present a Load-independent Energy-efficient and Rate-control Integrated Asynchronous Duty Cycle MAC (LER-MAC) for WSNs. Performance of LER-MAC has been evaluated using ns-2 which demonstrates that, LER-MAC conserves energy considerably during light traffic loads along with procures higher throughput and lower latency avoiding packet drops through maximum utilization of the channel during heavy traffic loads.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information utility in mission-oriented networks 面向任务的网络中的信息效用
S. Eswaran, D. Shur, S. Samtani, A. Staikos
In recent years, utility-oriented resource allocation for wired and wireless networks has been extensively studied. A key goal of utility based analysis is to provide evaluation criteria for efficient network operation based on subjective user assessments such as usefulness and value of data. Yet the vast majority of the prior work has focused on topics like mathematical functions (concave or otherwise) of network metrics such as bandwidth, delay, packet loss, etc., or information entropy, or user-perceived quality (e.g., MOS) for interpreting utility. In this work1, we propose an alternative mission-oriented definition and metric for utility that is based on the accuracy and speed at which tasks are completed, which we believe is closer to the intent of utility-based analysis. Like previous work, our definition supports the design and engineering of networks by mapping utility metrics to the typical network design metrics (bandwidth, delay, loss, etc). Unlike previous work, it also permits simple solutions to important questions such as the joint utility or usefulness of different data streams, the impact on the utility of one data stream by another, and cross-sensory utility (e.g., the impact of a side audio channel on an image processing task, or a side video channel on an audio processing task). We present a novel experimental approach to the design of such experiments, and provide measurement results. The results quantify the effects of information encoding and the impairments incurred during transmission through imperfect networks on the information's usefulness to end-users in terms of being able to complete tasks correctly and on time.
近年来,以效用为导向的有线和无线网络资源分配问题得到了广泛的研究。基于效用的分析的一个关键目标是提供基于主观用户评估(如数据的有用性和价值)的有效网络运行的评估标准。然而,绝大多数先前的工作都集中在网络指标(如带宽、延迟、数据包丢失等)的数学函数(凹函数或其他函数)或信息熵,或用于解释效用的用户感知质量(如MOS)等主题上。在这项工作中,我们提出了另一种面向任务的效用定义和度量,它基于任务完成的准确性和速度,我们认为这更接近于基于效用的分析的意图。像以前的工作一样,我们的定义通过将效用指标映射到典型的网络设计指标(带宽,延迟,损失等)来支持网络的设计和工程。与以前的工作不同,它还允许对重要问题提供简单的解决方案,例如不同数据流的联合效用或有用性,一个数据流对另一个数据流效用的影响,以及跨感官效用(例如,侧面音频通道对图像处理任务的影响,或侧面视频通道对音频处理任务的影响)。我们提出了一种新的实验方法来设计这种实验,并提供了测量结果。结果量化了信息编码的影响,以及在不完善的网络传输过程中产生的损害,这些损害影响了信息对最终用户的有用性,即能够正确、及时地完成任务。
{"title":"Information utility in mission-oriented networks","authors":"S. Eswaran, D. Shur, S. Samtani, A. Staikos","doi":"10.1109/WOWMOM.2010.5534925","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534925","url":null,"abstract":"In recent years, utility-oriented resource allocation for wired and wireless networks has been extensively studied. A key goal of utility based analysis is to provide evaluation criteria for efficient network operation based on subjective user assessments such as usefulness and value of data. Yet the vast majority of the prior work has focused on topics like mathematical functions (concave or otherwise) of network metrics such as bandwidth, delay, packet loss, etc., or information entropy, or user-perceived quality (e.g., MOS) for interpreting utility. In this work1, we propose an alternative mission-oriented definition and metric for utility that is based on the accuracy and speed at which tasks are completed, which we believe is closer to the intent of utility-based analysis. Like previous work, our definition supports the design and engineering of networks by mapping utility metrics to the typical network design metrics (bandwidth, delay, loss, etc). Unlike previous work, it also permits simple solutions to important questions such as the joint utility or usefulness of different data streams, the impact on the utility of one data stream by another, and cross-sensory utility (e.g., the impact of a side audio channel on an image processing task, or a side video channel on an audio processing task). We present a novel experimental approach to the design of such experiments, and provide measurement results. The results quantify the effects of information encoding and the impairments incurred during transmission through imperfect networks on the information's usefulness to end-users in terms of being able to complete tasks correctly and on time.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127002454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An application layer non-repudiation wireless system: A cross-layer approach 应用层不可否认无线系统:一种跨层方法
S. Adibi
Non-repudiation techniques are to ensure any communication taking place between two or more parties will be undeniable. Therefore it is crucial to include digital signatures of the involving parties while the communication is taking place. In medical practices, involved parties may include patient(s) and doctor(s) who are involved in series of visits, diagnosis, prescription, possible operation, and etc. To avoid possible conflicts, adding non-repudiation techniques help immensely. This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics [1].
不可否认技术是为了确保双方或多方之间发生的任何通信都是不可否认的。因此,在进行通信时,包含有关各方的数字签名至关重要。在医疗实践中,当事人可能包括病人和医生,他们参与了一系列的访问、诊断、处方、可能的手术等。为了避免可能的冲突,添加不可抵赖性技术非常有帮助。本文在无线介质中考虑了这一问题,并从网络参数和性能指标[1]的角度研究了服务质量(QoS)/安全要求。
{"title":"An application layer non-repudiation wireless system: A cross-layer approach","authors":"S. Adibi","doi":"10.1109/WOWMOM.2010.5534971","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534971","url":null,"abstract":"Non-repudiation techniques are to ensure any communication taking place between two or more parties will be undeniable. Therefore it is crucial to include digital signatures of the involving parties while the communication is taking place. In medical practices, involved parties may include patient(s) and doctor(s) who are involved in series of visits, diagnosis, prescription, possible operation, and etc. To avoid possible conflicts, adding non-repudiation techniques help immensely. This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics [1].","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"33 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Generic network forensic data acquisition from household and small business wireless routers 从家庭和小型企业无线路由器获取通用网络取证数据
Zhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu
People are benefiting tremendously from pervasively deployed WiFi networks. However, criminals may exploit the anonymity of WiFi communication and wireless routers to access illegal content such as child porn videos. It's becoming an urgent topic as regards to how to preserve and acquire network forensic data from household and small business wireless routers in order to track down criminals. In this paper, we first survey the forensic capacity of nearly all household wireless routers which are available on market. We present our analysis for people who are willing to choose a wireless router to monitor their network. Secondly, we develop a generic network forensic data logging mechanism to monitor traffic into and out of wireless routers which support OpenWrt. Our code running in the wireless routers could log network traffic and send connection information to the administrator via email.
人们正从广泛部署的WiFi网络中受益匪浅。然而,犯罪分子可能会利用WiFi通信和无线路由器的匿名性来访问儿童色情视频等非法内容。如何保存和获取来自家庭和小型企业无线路由器的网络取证数据,以追踪犯罪分子,已成为一个紧迫的话题。本文首先对市场上几乎所有家用无线路由器的取证能力进行了调查。我们为那些愿意选择无线路由器来监控网络的人提供我们的分析。其次,我们开发了一个通用的网络取证数据记录机制来监控进出支持OpenWrt的无线路由器的流量。我们在无线路由器中运行的代码可以记录网络流量,并通过电子邮件将连接信息发送给管理员。
{"title":"Generic network forensic data acquisition from household and small business wireless routers","authors":"Zhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu","doi":"10.1109/WOWMOM.2010.5534945","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534945","url":null,"abstract":"People are benefiting tremendously from pervasively deployed WiFi networks. However, criminals may exploit the anonymity of WiFi communication and wireless routers to access illegal content such as child porn videos. It's becoming an urgent topic as regards to how to preserve and acquire network forensic data from household and small business wireless routers in order to track down criminals. In this paper, we first survey the forensic capacity of nearly all household wireless routers which are available on market. We present our analysis for people who are willing to choose a wireless router to monitor their network. Secondly, we develop a generic network forensic data logging mechanism to monitor traffic into and out of wireless routers which support OpenWrt. Our code running in the wireless routers could log network traffic and send connection information to the administrator via email.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Routing for minimum length schedule in multi-channel TDMA based wireless mesh networks 基于多通道TDMA的无线网状网络中最小长度调度的路由
Bo Wang, Guo-Kai Zeng, M. Mutka, Li Xiao
In TDMA based wireless mesh networks, routing and scheduling algorithms are essential to provide QoS support for mesh clients. In order to maximize the network throughput and minimize session delay, the routing and scheduling algorithms should produce a minimum length schedule. A linear programming formulation enables an optimal solution, however has very high computational cost. In this paper, we consider network scenarios where multiple orthogonal channels are available. With a channel assignment algorithm to eliminate secondary interference, we are able to use a scheduling algorithm that yields the minimum length schedule given a specific routing tree. We then propose a heuristic routing algorithm that aims to build the routing tree that results in the minimum length schedule. Our routing algorithm performs significantly better than simple routing algorithms, which are based on Breadth First Search or Dijkstra algorithms.
在基于TDMA的无线网状网络中,路由和调度算法是为网状客户端提供QoS支持的关键。为了使网络吞吐量最大化和会话延迟最小化,路由和调度算法应该产生最小长度调度。线性规划公式能够得到最优解,但计算成本很高。在本文中,我们考虑了多个正交信道可用的网络场景。通过信道分配算法来消除二次干扰,我们能够使用调度算法,在给定特定路由树的情况下产生最小长度调度。然后,我们提出了一种启发式路由算法,旨在构建路由树,从而产生最小长度调度。我们的路由算法明显优于基于广度优先搜索或Dijkstra算法的简单路由算法。
{"title":"Routing for minimum length schedule in multi-channel TDMA based wireless mesh networks","authors":"Bo Wang, Guo-Kai Zeng, M. Mutka, Li Xiao","doi":"10.1109/WOWMOM.2010.5534966","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534966","url":null,"abstract":"In TDMA based wireless mesh networks, routing and scheduling algorithms are essential to provide QoS support for mesh clients. In order to maximize the network throughput and minimize session delay, the routing and scheduling algorithms should produce a minimum length schedule. A linear programming formulation enables an optimal solution, however has very high computational cost. In this paper, we consider network scenarios where multiple orthogonal channels are available. With a channel assignment algorithm to eliminate secondary interference, we are able to use a scheduling algorithm that yields the minimum length schedule given a specific routing tree. We then propose a heuristic routing algorithm that aims to build the routing tree that results in the minimum length schedule. Our routing algorithm performs significantly better than simple routing algorithms, which are based on Breadth First Search or Dijkstra algorithms.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A method to compare new and traditional accelerometry data in physical activity monitoring 运动监测中新型与传统加速度计数据的比较方法
V. V. Hees, M. Pias, S. Taherian, U. Ekelund, S. Brage
The accelerometer devices as traditionally used in the epidemiological field for physical activity monitoring (e.g. Actigraph, Actical, and RT3) provide manufacturer-dependent output values called counts that are computed by obscure and proprietary signal processing techniques. This lack of transparency poses a challenge for comparison of historical accelerometer data in counts with data collected using raw accelerometry in S.I. units — m/s2. The purpose of this study was to develop a method that facilitates the compatibility between both methods through conversion of raw accelerometer output data collected with inertial acceleration sensors into Actigraph counts — the most widely used (de facto standard) device brand in epidemiological studies. The basics of the conversion algorithm were captured from the technical specifications of the Actigraph GT1M. Fine-tuning of the algorithm was achieved empirically under controlled conditions using a mechanical shaker device. A pilot evaluation was carried out through physical activity monitoring in free-living scenarios of 19 adult participants (age: 47 ± 11 yrs, BMI: 25.2 ± 4.1 kg-m−2) wearing both devices. The results show that Actigraph counts estimated by the proposed method explain 94.2% of the variation in Actigraph counts (p < 0.001). The concordance correlation coefficient was 0.93 (p < 0.05). The sensitivity for classifying intensity ranged from 93.4% for light physical activity to 70.7% for moderate physical activity.
传统上在流行病学领域用于身体活动监测的加速度计设备(例如Actigraph, practical和RT3)提供依赖于制造商的输出值,称为计数,这些值是通过模糊和专有的信号处理技术计算出来的。这种透明度的缺乏对历史加速度计数据计数与使用原始加速度计收集的数据进行比较提出了挑战,以si单位- m/s2为单位。本研究的目的是开发一种方法,通过将惯性加速度传感器收集的原始加速度计输出数据转换为流行病学研究中使用最广泛(事实上的标准)的设备品牌Actigraph计数,从而促进两种方法之间的兼容性。转换算法的基础是从Actigraph GT1M的技术规范中获取的。在控制条件下,利用机械激振器对算法进行了经验微调。对佩戴两种设备的19名成年参与者(年龄:47±11岁,BMI: 25.2±4.1 kg-m−2)在自由生活场景中进行身体活动监测,进行初步评估。结果表明,该方法估计的Actigraph计数解释了94.2%的Actigraph计数变化(p < 0.001)。一致性相关系数为0.93 (p < 0.05)。强度分类的敏感性从轻度体力活动的93.4%到中度体力活动的70.7%不等。
{"title":"A method to compare new and traditional accelerometry data in physical activity monitoring","authors":"V. V. Hees, M. Pias, S. Taherian, U. Ekelund, S. Brage","doi":"10.1109/WOWMOM.2010.5534986","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534986","url":null,"abstract":"The accelerometer devices as traditionally used in the epidemiological field for physical activity monitoring (e.g. Actigraph, Actical, and RT3) provide manufacturer-dependent output values called counts that are computed by obscure and proprietary signal processing techniques. This lack of transparency poses a challenge for comparison of historical accelerometer data in counts with data collected using raw accelerometry in S.I. units — m/s2. The purpose of this study was to develop a method that facilitates the compatibility between both methods through conversion of raw accelerometer output data collected with inertial acceleration sensors into Actigraph counts — the most widely used (de facto standard) device brand in epidemiological studies. The basics of the conversion algorithm were captured from the technical specifications of the Actigraph GT1M. Fine-tuning of the algorithm was achieved empirically under controlled conditions using a mechanical shaker device. A pilot evaluation was carried out through physical activity monitoring in free-living scenarios of 19 adult participants (age: 47 ± 11 yrs, BMI: 25.2 ± 4.1 kg-m−2) wearing both devices. The results show that Actigraph counts estimated by the proposed method explain 94.2% of the variation in Actigraph counts (p < 0.001). The concordance correlation coefficient was 0.93 (p < 0.05). The sensitivity for classifying intensity ranged from 93.4% for light physical activity to 70.7% for moderate physical activity.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Comparing network protocols via elimination of MAC/PHY effects 通过消除MAC/PHY效应比较网络协议
Devan Rehunathan
Outside simulation, the study of mobile network protocols is not trivial and the standard approach usually involves building a testbed and populating it with the relevant entities. While this approach, provides real-life results, it is time consuming and resource intensive. We propose an alternative approach that can be used to compare mobile network protocols with a minimum amount of resources. Our solution explores the possibility of discounting physical layer effects entirely, when doing a comparative analysis of two mobile network protocols. In this paper, we document and discuss our efforts to check if this method is feasible.
在仿真之外,对移动网络协议的研究并不简单,标准的方法通常包括建立一个测试平台并在其中填充相关实体。虽然这种方法提供了实际的结果,但它是耗时和资源密集的。我们提出了一种替代方法,可以用最少的资源来比较移动网络协议。在对两种移动网络协议进行比较分析时,我们的解决方案探索了完全忽略物理层影响的可能性。在本文中,我们记录并讨论了我们的努力来检验这种方法是否可行。
{"title":"Comparing network protocols via elimination of MAC/PHY effects","authors":"Devan Rehunathan","doi":"10.1109/WOWMOM.2010.5534968","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534968","url":null,"abstract":"Outside simulation, the study of mobile network protocols is not trivial and the standard approach usually involves building a testbed and populating it with the relevant entities. While this approach, provides real-life results, it is time consuming and resource intensive. We propose an alternative approach that can be used to compare mobile network protocols with a minimum amount of resources. Our solution explores the possibility of discounting physical layer effects entirely, when doing a comparative analysis of two mobile network protocols. In this paper, we document and discuss our efforts to check if this method is feasible.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133036315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Router selfishness in community wireless mesh networks: Cross-layer benefits and harms 社区无线网状网络中的路由器自私自利:跨层的利弊
K. Gierlowski, J. Konorski
In community wireless mesh (CWM) networks following the IEEE 802.11s standard, wireless nodes combine the functionality of a client application host and a transit packet router. Not being subjected to tight administrative control, CWM nodes may act selfishly by refusing to forward transit packets along (selected) established routes or to participate in the route creation process. Unlike in a mobile ad hoc network (MANET), a CWM node is typically connected to mains electricity, hence unconcerned about energy expenditure; the only rational (as distinct from malicious) motivation behind selfish behavior is then to prevent the incoming transit traffic from competing with the source traffic and thereby achieve a higher source throughput. We examine through simulation the benefits and harms of selfish behavior with a cross-layer view and relate them to the router density, selfish routers' location and details of their behavior. We find many conclusions and intuitions valid in MANET environments incorrect in CWMs.
在遵循IEEE 802.11s标准的社区无线mesh (CWM)网络中,无线节点结合了客户端应用程序主机和传输数据包路由器的功能。由于不受严格的管理控制,CWM节点可能会自私地拒绝沿(选定的)已建立的路由转发传输数据包或拒绝参与路由创建过程。与移动自组织网络(MANET)不同,CWM节点通常连接到主电源,因此不关心能源消耗;自私行为背后的唯一理性(与恶意不同)动机是防止传入的传输流量与源流量竞争,从而实现更高的源吞吐量。我们以跨层的视角,通过仿真研究了自私行为的利弊,并将其与路由器密度、自私路由器的位置和行为细节联系起来。我们发现许多在MANET环境中有效的结论和直觉在cwm中不正确。
{"title":"Router selfishness in community wireless mesh networks: Cross-layer benefits and harms","authors":"K. Gierlowski, J. Konorski","doi":"10.1109/WOWMOM.2010.5534998","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534998","url":null,"abstract":"In community wireless mesh (CWM) networks following the IEEE 802.11s standard, wireless nodes combine the functionality of a client application host and a transit packet router. Not being subjected to tight administrative control, CWM nodes may act selfishly by refusing to forward transit packets along (selected) established routes or to participate in the route creation process. Unlike in a mobile ad hoc network (MANET), a CWM node is typically connected to mains electricity, hence unconcerned about energy expenditure; the only rational (as distinct from malicious) motivation behind selfish behavior is then to prevent the incoming transit traffic from competing with the source traffic and thereby achieve a higher source throughput. We examine through simulation the benefits and harms of selfish behavior with a cross-layer view and relate them to the router density, selfish routers' location and details of their behavior. We find many conclusions and intuitions valid in MANET environments incorrect in CWMs.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132445474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reactive on-board regulation of cognitive radios 认知无线电的反应性机载调节
Yu Zhang, A. Baliga, W. Trappe
Malicious users may reprogram cognitive radios to disregard how their actions may harm other users. To cope with such threats, we propose that cognitive radios must have a trusted domain, which contains an onboard regulation mechanism (ORM) that 'regulates' the radio's behavior by monitoring the radio, and taking appropriate action. We present a scheme for monitoring the link quality, in real-time to assess the proper action to take. Our method promptly prevents misbehavior by taking action in a manner proportional to the level by which the cognitive radio deviates from normal, allowed behavior. We demonstrate a method for the ORM to collect the link state information needed to regulate its cognitive radio. Lastly, we examine the resulting algorithms and study our regulation relative to traditional CSMA and Aloha MAC protocols on the ORBIT testbed using USRP/GNU Radios.
恶意用户可能会重新编程认知无线电,无视他们的行为可能会如何伤害其他用户。为了应对这种威胁,我们建议认知无线电必须有一个可信域,其中包含一个机载调节机制(ORM),通过监测无线电并采取适当行动来“调节”无线电的行为。我们提出了一个方案来监测链路质量,实时评估采取适当的行动。我们的方法通过采取与认知无线电偏离正常、允许的行为的程度成比例的行动,迅速防止不当行为。我们演示了一种ORM收集调节其认知无线电所需的链路状态信息的方法。最后,我们在ORBIT测试台上使用USRP/GNU无线电对所得算法进行了检验,并研究了与传统CSMA和Aloha MAC协议相关的规则。
{"title":"Reactive on-board regulation of cognitive radios","authors":"Yu Zhang, A. Baliga, W. Trappe","doi":"10.1109/WOWMOM.2010.5535003","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5535003","url":null,"abstract":"Malicious users may reprogram cognitive radios to disregard how their actions may harm other users. To cope with such threats, we propose that cognitive radios must have a trusted domain, which contains an onboard regulation mechanism (ORM) that 'regulates' the radio's behavior by monitoring the radio, and taking appropriate action. We present a scheme for monitoring the link quality, in real-time to assess the proper action to take. Our method promptly prevents misbehavior by taking action in a manner proportional to the level by which the cognitive radio deviates from normal, allowed behavior. We demonstrate a method for the ORM to collect the link state information needed to regulate its cognitive radio. Lastly, we examine the resulting algorithms and study our regulation relative to traditional CSMA and Aloha MAC protocols on the ORBIT testbed using USRP/GNU Radios.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133093852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1