首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Wireless body area networks (WBAN) is used to measure patients' health conditions continuously. Different kinds of sensors are required to measure health conditions. When such types of antennas are used on the human body, they are flexible with the movements. The usage of wearable devices is currently increasing in the biomedical field. The presented wearable antenna is suitable for biomedical applications. The presented ultra-wideband (UWB) flexible parachute shape wearable antenna is fabricated on a jeans textile substrate. The prototype antenna has a −10 dB measured impedance bandwidth of 5800 MHz (7 to 12.8 GHz) with average radiation efficiency of 75.28%. The prototype antenna's size is 40 × 40 mm2 (1.32 × 1.32 λ 0 2 at centre frequency 9.9 GHz) and a peak gain of 4.5 dB at 12.33 GHz. The fabricated antenna is suitable for biomedical applications in X-band frequencies and can be implemented with a low-cost manufacturing process. The radiating element is made by conductive copper tape. Muscle-equivalent phantoms are used to analyze the body effect on antenna performance. The radiation effect emitted by the presented antenna on the human body is calculated by the specific absorption rate (SAR) value. The maximum SAR value of the proposed antenna is 1.84 W/kg at 12.33 GHz. This leads to promising results for wearable applications related to remote health care monitoring, such as biotelemetry and mobile health with a sensor-driven approach.  相似文献   

2.
随着中国老龄化和家庭空巢化的加剧,患有慢性疾病的老人在医院外的健康监护问题变得日益突出。这就需要人们能够设计出有别于传统医疗仪器的新系统,这样的新系统称为体域网系统。论述了体域网无线心电监护系统的设计方案,重点介绍了患者系统以及预警系统的构成。患者系统采用便携式心电检测模块来采集患者的心电信号;蓝牙短距无线通信技术用于将实时心电信号传输到智能手机;预警系统能接收患者系统发送的心电信号。最后给出了在医院环境中对系统进行的三项测试结果。  相似文献   

3.
To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.  相似文献   

4.
The use of wireless body area networks (WBANs) in healthcare applications has made it convenient to monitor both health personnel and patient status continuously in real time through wearable wireless sensor nodes. However, the heterogeneous and complex network structure of WBANs has some disadvantages in terms of control and management. The software‐defined network (SDN) approach is a promising technology that defines a new design and management approach for network communications. In order to create more flexible and dynamic network structures in WBANs, this study uses the SDN approach. For this, a WBAN architecture based on the SDN approach with a new energy‐aware routing algorithm for healthcare architecture is proposed. To develop a more flexible architecture, a controller that manages all HUBs is designed. The proposed architecture is modeled using the Riverbed Modeler software for performance analysis. The simulation results show that the SDN‐based structure meets the service quality requirements and shows superior performance in terms of energy consumption, throughput, successful transmission rate, and delay parameters according to the traditional routing approach.  相似文献   

5.
A wireless body area network (WBAN) is a radio‐frequency‐based wireless communication technology that consists of a number of different sensor and actuator nodes interconnected with a body gateway. Considering the constrained resources in WBAN devices, simple and noise‐robust synchronization algorithms are required. Frame synchronization and frequency offset estimation are extremely important in the design of a robust WBAN receiver. In this paper, a detection strategy such as frame synchronization and frequency estimation is described in the WBAN system, which can improve the receiver performance. In doing so, algorithms are designed or chosen for the frame detection, carrier frequency offset synchronization, and joint fine‐time and phase‐offset estimation by exploiting the spike‐like property of the physical layer convergence protocol preamble and the frame structure in the WBAN system. The performance of the WBAN synchronization receiver is verified by computer simulation. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

6.
基于网络编码的无线体域网多中继协作节能策略   总被引:1,自引:0,他引:1  
针对无线体域网中传输链路存在中断情况从而消耗额外能量的问题,在多源多中继系统模型中引入网络编码,提出一种基于网络编码多中继协作算法,并分析了该算法下系统的网络能耗,推导出系统的每比特网络整体能耗公式。仿真结果表明:该算法与传统的多路径多中继转发算法相比,可以较大程度的减少网络的整体能耗,适当地增加信源节点或者减少中继节点的数目对降低网络的整体能耗也有一定的作用。该算法能减少多源多中继网络的整体能耗,延长网络的生命周期。  相似文献   

7.
针对无线体域网( WBAN)应用中人们关注的病患个人敏感数据在传输过程中容易受到攻击的安全问题,提出一种结合随机网络编码和椭圆曲线密码学( ECC)的安全签名方案。该方案首先在网络中引入随机网络编码建立多播网络模型,增加相同传输次数下的数据信息量;通过采用ECC算法对信息进行签名,保障病患相关生理信息的通信安全。该方案共有三个阶段,即创建、签名和验证阶段。理论证明了该方案是安全的,能够有效地对信息进行污染验证,并确定受攻击节点的位置。  相似文献   

8.
程定国  曾浩洋 《电讯技术》2023,63(3):441-447
对无线网络流量的分析和准确预测是无线网络管理与安全领域的重要研究内容之一,在网络规划、网络监控、流量趋势分析、网络优化以及入侵检测和异常检测等方面发挥着重要作用。介绍了目前典型的无线网络流量分析的模型与常用流量分析方法,综述了传统无线通信网络(如无线局域网和物联网)中的流量分析技术,指出了流量分析技术应用于无线自组网系统的可能性与面临的几点挑战,以及无线自组网系统与流量分析技术结合的发展方向。  相似文献   

9.
王文斌 《信息技术》2007,31(6):126-127
WLAN的出现,充分解决了有线网络先天性缺陷所带来的一系列问题。与有线网络相比,WLAN具备了很多特定优势。作为有线局域网的一种补充和扩展,WALN使计算机具有了可移动性,能快速、方便地解决有线网络不易实现的网络连通问题,成为今后网络发展的主导方向。IEEE802.11标准是IEEE制定的无线局域网标准,各厂商的产品在同一物理层上可以互相操作,这样就使得无线局域网的两种主要用途“多点接入”和“多网段互联”更易于低成本实现,从而为无线局域网的进一步普及打通了道路,文中介绍了几个常用标准的特点。  相似文献   

10.
This article investigates the mutual coupling reduction of a compact two elements wearable ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna. The ground plane of the proposed wearable MIMO antenna structure consists of three connected square ring-shaped stubs and two rectangular slots of narrow height. These ground stubs and slots minimize the mutual coupling effect between antennas and provide high isolation. The suggested MIMO antenna functions from the 1.87 to 13.82 GHz frequency spectrum covering WLAN (2.4–2.484 GHz), UWB (3.1–10.6 GHz), and X band (8–12 GHz) with 152.32% fractional bandwidth. It sustains port isolation above 27 dB throughout the 2 to 13.82 GHz frequency band. Inside the whole working frequency band, the suggested antenna offers a tiny envelope correlation coefficient (ECC < 0.098), greater diversity gain (DG > 9.93 dB), minimum channel capacity loss (CCL < 0.32 bits/s/Hz), and slight magnitude variation in mean effective gain of antenna ports (< 0.1 dB). The recommended antenna yields a SAR level below the designated threshold (<1.6 W/kg), affirming its suitability for body-worn applications. The designed MIMO antenna structure has an overall volume of 32 × 48 × 1.5 mm3.  相似文献   

11.
Advances in wearable technology and the proliferation of wearable devices have led to the rapid development of wearable wireless sensor networks (WWSNs) in the fields of medical monitoring and disaster relief, which have gradually become a key technology for the Internet of Medical Things. This study focused on the safety of rescuers in the event of a large‐scale fire and applied a WWSN to monitor and transmit their physiological information. User mobility is a huge problem for routing in a WWSN: the topology changes rapidly and routing should be adjusted accordingly, but node movement can easily fracture links that need to be repaired, which takes time and can cause routing holes. Thus, mainstream routing algorithms are presently unsuitable for fire rescue. To solve the routing hole problem, a hole processing and trust value‐based mobile adaptive routing algorithm (MARA) is proposed comprising two parts: location‐aided routing for multiple request zones (LAR‐MRZ) and route maintenance algorithm based on the trust value (RMA‐TV). Simulation results showed that MARA provided an excellent performance in terms of the packet delivery rate and delay and demonstrated good adaptability for a WWSN in a fire scenario.  相似文献   

12.
针对无线芯片域网络(wireless chip area network,WCAN)中PCB上芯片内/间高速无线互连场景,提出了基于蜂窝Ad Hoc的组网策略,并对其网络模型、无线节点设计、多址接入、路由和流量控制策略展开研究,最后通过仿真实验与传统无线Mesh组网架构进行对比分析,得到比其更低的网络时延和抖动、更大的网络吞吐量,并在高速数据传输环境下也能保持较低的分组丢失率.验证了所提策略的优越性,对今后WCAN组网架构的研究及未来5G网络技术的发展提供了参考.  相似文献   

13.
The experience from computer vision was learned,an innovative neural network model called InnoHAR (inception neural network for human activity recognition) based on the inception neural network and recurrent neural network was put forward,which started from an end-to-end multi-channel sensor waveform data,followed by the 1×1 convolution for better combination of the multi-channel data,and the various scales of convolution to extract the waveform characteristics of different scales,the max-pooling layer to prevent the disturbance of tiny noise causing false positives,combined with the feature of GRU helped to time-sequential modeling,made full use of the characteristics of data classification task.Compared with the state-of-the-art neural network model,the InnoHAR model has a promotion of 3% in the recognition accuracy,which has reached the state-of-the-art on the dataset we used,at the same time it still can guarantee the real-time prediction of low-power embedded platform,also with more space for future exploration.  相似文献   

14.
How to effectively protect the security of data sharing in WBAN was a key problem to be solved urgently.The traditional CP-ABE mechanism had a 〝one to many〝 data security communication function which was suitable for access control in WBAN,but it had high computational complexity and did not support attribute revocation.Fully considering of limitations on computation and storage of sensor nodes and dynamic user attribute in WBAN,a CP-ABE scheme was proposed which was provably secure against CPA under the standard model and supported attributes revocation,outsourced encryption and decryption.Compared with the proposed schemes,the computation burden on senor nodes is greatly reduced and the user's attribution can be revoked immediately and fine grained while meeting the demand of its security in the proposed scheme.  相似文献   

15.
A wireless body area network (WBAN) enables the continuous monitoring of health conditions including heart rate, temperature, and glucose levels. It is composed of several sensors that are placed on the body. The network's performance is significantly affected by the unpredictable movements of the human body. Due to the varying proximities between them, the existence of several WBANs creates a challenge when mobility is involved. In this fictitious scenario, we consider a park area with both mobile and static WBANs or WBAN-equipped individuals passing through the park who have varying degrees of mobility. When a mobile WBAN passes a static WBAN and is within a minimum distance of the static WBAN, they pair up and immediately interfere. Inter-interference caused by WBANs operating in a limited area causes packet loss and performance deterioration. In this work, static WBAN locations are optimised to minimise interference and system inter-interference problems are addressed by a game theoretic method. This paper formulates a flexible game theoretic framework to study WBAN coexistence using the expected pay-off function considering a two-player game. It is observed from the results obtained that the probability of interference caused by fast mobile WBANs is reduced to a maximum of 50% compared with that caused by slow mobile WBANs thereby reducing the need for relocation of static WBANs.  相似文献   

16.
The wireless sensor network (WSN) has attracted lots of attention recently. Broadcast is a fundamental operation for all kinds of networks and it has not been addressed seriously in the WSN. Therefore, we propose two types of power and time efficient broadcasting protocols, namely one‐to‐all and all‐to‐all broadcasting protocols, for five different WSN topologies. Our one‐to‐all broadcasting protocols conserve power and time by choosing as few relay nodes as possible to scatter packets to the whole network. Besides, collisions are carefully handled such that our one‐to‐all broadcasting protocols can achieve 100% reachability. By assigning each node a proper channel, our all‐to‐all broadcasting protocols are collision free and efficient. Numerical evaluation results compare the performance of the five topologies and show that our broadcasting protocols are power and time efficient. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
雷倩  庞宇 《数字通信》2014,(1):36-38,45
体域网(BAN)的研究在远程医疗及远程医疗服务方面起着重要的作用,由于无线传感器节点附着在人体表面,人体不可避免地会吸收可能有害的电磁波,因此,对人体处于BAN网络下的SAR值的研究变得格外重要.而由于BAN中通信距离很短,电磁波沿身体表面传播的通道与普通的无线信道不同,需要建立适用于BAN网络环境的计算模型.以FDTD有限时域差分法为依托,建立三维矩形人体组织网格模型以及三维站立式人体网格模型,采用半波偶极子天线在贴近人体皮肤表面处对矩形人体组织模型与站立式人体模型在不同频率下的SAR值进行仿真,得到了在0.9 GHz,2.4 GHz,5 GHz 3种频率下人体SAR值.  相似文献   

18.
在当前疫情防控背景下,对体温进行实时不间断的监测是一种十分有效的疫情防控手段,但由于高校内师生聚集、人员流动性较大,采用传统的测温手段效率低、实时性差,无法满足疫情防控的要求,文章利用当前广泛应用的无线传感器网络技术,构建体温监测系统,实现自动测温、数据上传、体温预警、应急处理等功能。  相似文献   

19.
Network coding (NC) has showed to be beneficial to improve transmission performance in wireless mesh networks. Random linear coding is usually applied as the default coding schema. However, random linear coding causes significant decoding delay and jitter at receiver. Further, current NC does not support weight assignment to original packets, which is however indispensable for popular applications such as quality of service control and multipath media streaming in wireless mesh networks. Partial network coding (PNC) can largely reduce decoding delay and receiving fluctuation while keeping the benefit of NC. However, PNC does not support weight‐based data replacement and weight assignment to original packets. In this work, we propose weighted partial network coding (WPNC), which is a generalized coding schema of PNC. WPNC inherits all merits of PNC and part of NC. With WPNC, both decoding delay and receiving fluctuation will be reduced as observed in PNC. Also, WPNC is quite suitable for those applications that require weight assignment to original packets. After providing the whole framework of WPNC and thorough theoretical analysis to its performance, we have demonstrated how WPNC can be integrated with quality of service control and multipath routing supported media streaming in wireless mesh networks. Performance of WPNC is inter‐validated by both theoretical analysis and numeric evaluations. Copyright © 2011 John; Wiley & Sons, Ltd.  相似文献   

20.
Following the wired network virtualization, virtualization of wireless networks becomes the next step aiming to provide network or infrastructure providers with the ability to manage and control their networks in a more dynamic fashion. The benefit of the wireless mobile network virtualization is a more agile business model where virtual mobile network operators (MNOs) can request and thus pay physical MNOs in a more pay‐as‐you‐use manner. This paper presents some resource allocation algorithms for joint network virtualization and resource allocation of wireless networks. The overall algorithm involves the following two major processes: firstly, to virtualize a physical wireless network into multiple slices, each representing a virtual network, and secondly, to carry out physical resource allocation within each virtual network (or slice). In particular, the paper adopts orthogonal frequency division multiplexing (OFDM) as its physical layer to achieve more efficient resource utilization. Therefore, the resource allocation is conducted in terms of sub‐carriers. Although the motivation and algorithm design are based on IEEE 802.16 or WiMAX networks, the principle and algorithmic essence are also applicable to other OFDM access‐based wireless networks. The aim was to achieve the following design goals: virtual network isolation and resource efficiency. The latter is measured in terms of network throughput and packet delivery ratio. The simulation results show that the aforementioned goals have been achieved. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号