Perimeter security is a priority issue being addressed worldwide by aviation, marine port, military, and government agencies to counter threats of terrorism. these agencies are pursuing initiatives to find the appropr...
详细信息
ISBN:
(纸本)9781424441785
Perimeter security is a priority issue being addressed worldwide by aviation, marine port, military, and government agencies to counter threats of terrorism. these agencies are pursuing initiatives to find the appropriate combination of techniques that will yield productive and cost-effective solutions. At this conference last year, we presented a solution called SPAN: the Secure Perimeter Awareness Network. this year, we will detail the SPAN solution at San Francisco international Airport. In particular, this paper describes the installation, integration, and testing of multiple systems-where each system has unique capabilities-into a single perimeter security solution. then, we detail how testing of these systems was accomplished in order to derive benefits from each so that the entire system works cooperatively and effectively.
Aiming at reducing the system complexity, raising communication rate and supporting CDMA based applications, a direct sequence spread spectrum based underwater acoustic communication system is proposed. BPSK/QPSK modu...
详细信息
ISBN:
(纸本)9781424436927
Aiming at reducing the system complexity, raising communication rate and supporting CDMA based applications, a direct sequence spread spectrum based underwater acoustic communication system is proposed. BPSK/QPSK modulation is used. A RA coding scheme is adopted to reduce the BER. To reduce the phase-acquisition complexity of receiver, a carrier modulation method which lets spread-spectrum code and carrier have the same phase is adopted in transmitter. To raise the communication rate, an architecture of de-spreading, before demodulation is used in receiver. To support CDMA based applications, a band-pass signal acquisition strategy is used in receiver, and the acquisition method is delay correlation acquisition algorithm. Matlab-based simulations and practical system based experiments are carried out. the results show that the system has a good performance at supporting multi-user communication and rejecting multi-path effects. Under a water tank environment, the BER of the system without interference of other users is at 10(-4) order of magnitude, and the BER of the system with interference of two users is at 10(-3) order of magnitude.
Wireless sensor and actuator network (WSAN) are composed of a large number of heterogeneous sensors and actuators. In the automated WSAN, sensors are collaborated to monitor the physical phenomenon in the surveillance...
详细信息
ISBN:
(纸本)9780769537504
Wireless sensor and actuator network (WSAN) are composed of a large number of heterogeneous sensors and actuators. In the automated WSAN, sensors are collaborated to monitor the physical phenomenon in the surveillance field, while the actuators are to collect sensing data, process the data and perform appropriate actions without the existence of central controller. Most WSANs are used in the real-time sensing and reaction systems towards physical environment In this paper, we propose a real-time architecture for automated WSAN to bind the latency in applications. In the architecture, we present distributed mechanisms for sensor-actuator event reporting and self-aware coordination to maintain the delay bound sensor-actuator communication. And then we present mechanism for ordered multi-event task assignment, and the acting coordination mechanism to provide efficient reaction and execution of the event task in time. Preliminary simulation results are presented to demonstrate the advantages of our solutions.
In the research field of Wireless sensor Networks, how to reduce the energy consumption of WSN so that the lifetime of WSN can be prolonged is one of the hottest spots. Wireless sensor networks (WSN) lifetime is eithe...
详细信息
Mining Frequent Items from sensory data is a major research problem in wireless sensor networks(WSNs) and it can be widely used in environmental monitoring. Conventional Lossy Counting algorithm can be applied to solv...
详细信息
A flexible, ubiquitous, and universal solution for management of distributed dynamic systems will be presented. It allows us to grasp complex systems on a higher than usual, semantic level, penetrating their infrastru...
详细信息
Wireless Mesh Networks (WMNs) have the potential for improving network capacity by employing multiple radios and multiple channels (MRMC). Channel Assignment (CA) is a key issue that plays vital role in defining WMN t...
详细信息
Reasonable scanning task scheduling strategy can improve the scanning efficiency of vulnerability detection systems at a large extent. Task scheduling problem has been proved to be an NP-complete problem. Based on the...
详细信息
Wireless sensor networks have found many applications in different areas, including environmental surveillance, intelligent building, health monitoring, intelligent transportations, etc. the sensor networks consist of...
详细信息
Mesh router (MR) placement is one of the fundamental issues that need to be addressed carefully to achieve a desired performance of a wireless mesh network (WMN). the objective of the MR placement schemes is to system...
详细信息
ISBN:
(纸本)9781424451142
Mesh router (MR) placement is one of the fundamental issues that need to be addressed carefully to achieve a desired performance of a wireless mesh network (WMN). the objective of the MR placement schemes is to systematically determine the minimal number of MRs and their positions while satisfying various constraints, such as coverage, connectivity, traffic demand, etc. this paper explores the solution for placing the MRs with multiple transmission rates, which influence both transmission range and wireless link capacity. In the paper, we first formulate the problem with a mixed integer programming model. We then present a heuristic placement algorithm called ILSearch which takes into account both multiple transmission rates and co-channel interference. the ILSearch consists of two components: (1) Coverage MR determination which greedily exploits the capability of each selected MR to cover mesh clients (MCs);and (2) Relay MR determination that incrementally chooses the additional MRs for traffic relaying through the local search. Our simulation has not only shown that ILSearch can effectively obtain the MR placement that meets all the constraints, but also demonstrated that a MR placement which considers the variable transmission rates outperforms those don't.
暂无评论