Friday, May 31, 2019

Blind Obedience Essay -- essays research papers fc

Blind ObedienceWhile sitting in church on Sunday going through the same motions of every Sunday, my son leans over to ask, Why do we have to stand up for this prayer? My response because we be supposed to. Reading The Childrens Story by James Clavell, made me think a little more ab pop out this question that I had no answer for. A person needs to be able to explain why he does what he does. Children are innocent and unk presentlying they are alike a blank piece of paper waiting to be filled up with drawings and ideas. This book shows just how easy it is to mold a child.It uses a schoolroom of children facing a major change in their lives as the setting. The story moves quickly and the characters are only briefly sketched out. The story has a science simile feel to it. The events preceding the story include a war (with an unknown opponent) that we have lost. The main character among the children is Johnny whose father fought in the war and is now being held prisoner. Johnny is af raid for his father and about the changes that are coming to his school because of the defeat. The author is able to assume that we all share common experiences from our juvenility and our days in grade school, introducing the characters with a minimum of prose. The major theme is critiquing education systems that teach children what to think by repetition and memorization. Clavell uses the story to point out how that makes individuals vulnerable to manipulation. How many ...

Thursday, May 30, 2019

Dr. Faustus Essay -- essays research papers

Dr. Faustus     Dr. Faustus, written by Christopher, is the story of a man that represents the common human dissatisfaction with being human. He sells his soul to the devil for what he believes to be limitless power, with full logical knowledge as to the consequences of such a transaction. He knows the stakes of his gamble with the devil. His extensive education and his cultural environment had certainly alerted him as to the dangers associated with Lucifer. Although aware of the consequences of such a pact, he is blinded by three things that bring about his ultimate demise. His greed to know all, his pride that make him believe he was better than man, and his denial that in the give the sack he would bring his own downfall upon himself. If Faustus had not been these things he would not have brought an end to himself.     Dr. Faustus denies the existence of everything, from his eventual torture in hell if he does not repent, to men, society, and indeed the world. The only aspect of his life which he does not deny is his strong-arm reality. When Faustus meets with Mephistopheles (a messenger of the devil) he is frightened and demands a new appearance for his devil servant.     "I charge thee to return and change thy shape Thou art to ill-favored to attend on me. Go, and return an old Franciscan friar That holy shape becomes a devil best." (Marlowe p.14)By choosing Mephistopheles to change his form, he i...

Wednesday, May 29, 2019

Television and Media - Family Life With, and Without TV :: Comparison Compare Contrast Essays

Family Life With, and Without TVJust about everyone in the United States owns and watches television. Consequently, weve become accustomed to a fairly predictable and monotonous home flavor. all(prenominal) working day, we come home, pick up the mail, switch on the TV. Every night, we cook dinner, clean up the kitchen, watch some TV. Every weekend, we do the shopping, intermit the chores, and settle in to watch a movie. And why not? Its relaxing to hunker down on the sofa at the end of a jade day and it doesnt take any energy to flip through the channels with the remote control in one hand and a bowl of buttered popcorn in the other. In my family, we grew up with the TV on. Every weekend, we watched Gunsmoke and Bonanza together as a family. Every year, we made special treats for the Wizard of Oz. I wouldnt watch developed my love for cooking if I hadnt watched Graham Kerr as the Galloping Gourmet every day after school. I was hooked on Drawing With fast one Nagy and years later graduated from Kendall College of Art and Design. Television isnt all bad. It placates us and creates a comfortable background while we take care of business at home and when were tired it lulls us to sleep. TV is a companion for the elderly and a convenient babysitter for the young. It makes burglars think were home when were not. It entertains us cheaply with bouncing action sports, incomparable performing arts and singular events of the world all in living color. It educates us about everything from the cells in our body to the galaxies in the universe. Besides, what would life be like without TV? Could we stand the silence? How would we relax? What would we do with so much time on our hands? Lets take a verbalism at how the average American family might react in a sudden shift to life without TV. Mr. and Mrs. Jones decide to unplug the TV and put it in the garage starting Monday night. They want the family to spend more quality time together. No one tak es Mom and Dad seriously and the family jokes about it all weekend. Theres a little tension in the air Monday night.

The Character of Odysseus in Homers Odyssey Essay -- Odyssey essays

The Character of Odysseus in The Odyssey Homers epic tale The Odyssey is a story of the triumphs and downfalls that ar in store for one warriors hanker pillage nucleotide. Odysseus, the hero from the Trojan wars, has led his people of Ithaca and other Achaean soldiers to victory and now wishes to return home to his wife and family of Ithaca. Through his twenty year journey Odysseus is often tested not only of his physical strength, but his wits as well. The many accomplishments he achieved earned him great status and recognition throughout ancient Greece. The mistakes he made caused the deaths of many men. Consequently, we as readers are able to see the many personas that Odysseus carries with him. Odysseus possesses any attribute that Homeric Greeks admire. He displays loyalty, piety, manly valor and intelligence. We see Odysseuss loyalty in book one. Odysseus has won the Trojan War, and has been trapped on the island of Ogygia with the beautiful nymph Calypso. For ten years, Odysseus longed to return home to his wife Penelope, despite the attractions set up by Calypso. Never once did he accept his fate on the please island. Odysseus loyalty to Penelope is also at hand in the following So then, Royal son of Laertes, Odysseus, man of exploits, still eager to leave at once and hurry sticker to your own home, your beloved native land? Good luck to you, even so. Farewell But if you only knew, down deep, what intentness are fated to fill your cup before you reach that shore, youd stay right here, preside in our house with me and be immortal. Much as you long to see your wife, the one you pine for all your days ... POETRY VERSION (BOOK 4) This quote states the... ...estraint is also evident in the brutal attacks of Melanthius and Antinous. Melanthius kicking the lowly disguised Odysseus, and Antinous blow to Odysseus with a stool. At first instinct one would fight back, especially with the strength and agility of Odysseus. Nevertheless Odysseus restrain s and knows that a premature revealimg of his true personal identity would ruin the future plans in store for the total take over of his palace. So, just as any other beggar would react, the mighty Odysseus bows his head and walks back to the hut, with visions of the soon to be victory in his head. Looking at Odysseus in whole, the strength intelligence, arrogance, and cunning restraint stand out above all creating a truly powerful and courageous leader. Works CitedHomer. The Odyssey. Trans. Robert Fitzgerald. New York Farrar Straus Giroux, 1998.

Tuesday, May 28, 2019

Oedipus, the Cursed Man Essay -- Oedipus the King Oedipus Rex

Oedipus, the Cursed Man Have you ever had one of those days when it seems that everything is against you, that livelihood could not look any bleaker than it does right now? We have all had moments like those, entirely nothing can compare to the feeling Oedipus had on that direful day when he found out that he was cursed by the gods, destined to kill his father and marry his mother. This tragic story of the cursed slice is told in Sophocles play, Oedipus the King. This essay will examine one of Oedipus speeches, found in lines 1183 - 1194, made before he learns of his appalling fate. It is a passage full of melodramatic irony. We, the consultation, know the truth. Even Jocasta has just come to realize the facts, but Oedipus is still unaware of the imp end doom. Let it kick downstairs Whatever will, whatever must I must know my birth, no matter how common it may be-I must see my origins face-to-face. She perhaps, she with her womans pride may well be mortified by my birth, but I, I count myself the son of Chance, the great goddess, giver of all good things- Ill never see myself disgraced. She is my mother And the lunations have marked me out, my blood brothers, one moon on the wane, the next moon great with power. That is my blood, my nature-I will never betray it, never fail to search and learn my birth (Oedipus lines 1183-1194) The passage begins with Oedipus crying, Let it burst Whatever will, whatever must / I must know my birth, no matter how common / it may be-I must see my origins face-to-face (lines 1183 - 1185). He is burning to know his past, no matter how ugly it may be. He believes the truth can be no worse than learning that he comes from a humbl... ...ldren and siblings. Again, the audience knows the truth and wishes the opposite of what Oedipus persevered to discover. The reader wishes that he would indeed give up the search to find his true origins. It will only result in ending his life in horrific misery. Thi s short yet heartfelt speech made by Oedipus before he learns of his fate is packed with dramatic irony. He is blinded to the truth, but the readers are entirely aware of his dreadful fame. This makes the speech all the more painful and wrenching for the audience. Oh how we must pity a tabby like Oedipus, the cursed man. May what happened to him never happen to another. Work Cited Sophocles, Oedipus the King. Trans. Robert Fagles. The Norton Anthology of World Literature. 2nd ed. Vol. A. Ed. Sarah Lawall and Maynard Mack. New York Norton, 2002. 617-658.

Oedipus, the Cursed Man Essay -- Oedipus the King Oedipus Rex

Oedipus, the Cursed Man Have you ever had unmatched of those days when it seems that everything is against you, that life could not look any bleaker than it does right today? We have all had moments like those, but nothing can compare to the feeling Oedipus had on that dreadful day when he found out that he was cursed by the gods, destined to kill his father and marry his mother. This tragic story of the cursed man is told in Sophocles play, Oedipus the King. This essay leave examine one of Oedipus speeches, found in lines 1183 - 1194, made before he learns of his appalling fate. It is a passage full of dramatic irony. We, the audience, know the truth. Even Jocasta has just come to pass water the facts, but Oedipus is still un alert of the impending doom. Let it burst Whatever will, whatever moldiness I must know my birth, no matter how everyday it whitethorn be-I must see my origins face-to-face. She perhaps, she with her womans pride may well be mortified by my birth, but I, I count myself the son of Chance, the great goddess, donor of all good things- Ill never see myself disgraced. She is my mother And the moons have marked me out, my blood brothers, one moon on the wane, the next moon great with power. That is my blood, my nature-I will never betray it, never fail to search and learn my birth (Oedipus lines 1183-1194) The passage begins with Oedipus crying, Let it burst Whatever will, whatever must / I must know my birth, no matter how common / it may be-I must see my origins face-to-face (lines 1183 - 1185). He is eager to know his past, no matter how ugly it may be. He believes the truth can be no worse than learning that he comes from a humbl... ...ldren and siblings. Again, the audience knows the truth and wishes the opposite of what Oedipus persevered to discover. The reader wishes that he would then give up the search to find his true origins. It will only result in ending his life in horrific misery. This short mo reover heartfelt speech made by Oedipus before he learns of his fate is packed with dramatic irony. He is blinded to the truth, but the readers are entirely aware of his dreadful fame. This makes the speech all the more painful and wrenching for the audience. Oh how we must pity a king like Oedipus, the cursed man. May what fall outed to him never happen to another. Work Cited Sophocles, Oedipus the King. Trans. Robert Fagles. The Norton Anthology of World Literature. 2nd ed. Vol. A. Ed. Sarah Lawall and Maynard Mack. New York Norton, 2002. 617-658.

Monday, May 27, 2019

Coursework Assessment Essay

In Patch Adams, Robin Williams portrays a doctor who strives to improve the quality of life. The video is a perfect example of many cases of sacramental awareness and the sacrament of Anointing of the Sick. Patch encounters a once-brilliant man in a psychiatric clinic. Arthur Mendel give-and-take helps hunter the first character Patch meets is Arthur Mendel son. Arthur influences Patchs ability to bring in through problems.In a Christ-like manner, we must see through and ancient the problems and look ahead toward the solution Christ died for our sins by looking past the problem. Patch also helps out his roommate, Rudy out. This brings on a revelation for Patch which lets him see through the scientific names of diseases. He learns to treat the person, not the disease. When he agrees to become a doctor, Patch is not only venturing into the field to physically furbish up people but also more importantly to spiritually heal people.This parallels Anointing of the Sick after meeting h is two close friends, Truman and Cairn, Patch desires to ease up out and help people, not to bury himself in his books. His friends quickly jump on the bandwagon and help him to carry out his theories. The sacramental awareness of Patchs roommate is questionable until we find that he is genuinely good in the end. However, Dean Walcott is up until the end a foe of Patchs. He is touch with the physical nerve of healing much more than the spiritual aspect of healing.In the old church, Anointing of the Sick was sometimes believed to be physical. The spiritual aspect of healing would later be brought back into effect rightfully. When Patch is treating patients in his clinic, he exhibits great sacramental awareness by simply admitting that we are a community that can help each other. He proclaims that everyone is both a doctor and a patient. Patch also nears the meaning of the sacrament of Anointing of the Sick. He heals people in a beautiful way.

Sunday, May 26, 2019

Major Games in Amateur Sport Essay

The world of major versions events is a dynamic, evolving and growing industry (like the business of sport itself), with an change magnitude number of major world events broadcasting rights and cut throat competition to be the host. (Gratton et al, 2001, 63) The Deaflympics program go out present 20 different competitive events in the following summer disciplines Athletics Track and Field Badminton team up competition/Mens and Wowork forces singles /Mens and Womens multiply /Mixed doubles Basketball Team tournament for men and women. Beach Volleyball Team tournament for men and women. Bowling Singles Six games /Doubles Six games /Trios Six games /Team (5 players) make pass Road Sprint /Individual Time Trial /Road Race /Points Race Football Team tournament for men and women. Handball Team tournament for men and women. Judo Karate Taekwondo Men Women Orienteering Long Event /Relay Event /Sprint Event Shooting Free Rifle prone /Free Rifle three positions / strain Rif le /Free Pistol /Rapid Fire Pistol Swimming Freestyle / Backstroke/Breaststroke /Butterfly Individual Medley Team relay dodge Tennis Mens and Womens singles /Mens and Womens doubles /Mens and Womens teams /Mixed doubles/ Tennis Mens and Womens singles /Mens and Womens doubles /Mixed doubles Volleyball Team tournament for men and women. Water Polo- Team tournament for men only. Wrestling Freestyle -Thewrestling competitions will consist of the following events (men only) Wrestling definitive men onlyThe bid to host process involves two critical steps. The Initial applications must be submitted to the International Olympic Committee. Procedural contact via the IOC will be made with the International Committee of Sports for the Deaf. However, protocol indicates that final decision remains with the oversight sanctioning body of The Summer and WinterDeaflympics, the International Olympic Committee.The increasing complexity of the relationship between a greater number of public and private actors has challenged the political and institutional capacity of the state to steer the indemnity choices affecting society and the economy. (Budd et al, 2004, 12)The national and local level participation requires an official application from the Applicant City. Known as the candidature acceptance procedure, a questionnaire in Phase One of the bid process is submitted to the IOC. The collaboration between the local sponsors, city officials and bid committee benefit from a complete overview of organizing the Deaflympics and of what will be expected from them should they be selected as Candidate Cities and reach Phase Two of the procedure.Venue selection for each sport must meet the following customary criteria. However the most important and over whelming factor is broadcast access. The struggle for control over Olympic communication is centered on television, the medium mostly responsible for transforming the modern Olympic movement. (Larson et al, 1993, 65)On a seconda ry yet vital level, the type and condition of the competition surface or field of play, set capacity and format, number of locker paths, training amenities, equipment storage, sports shops, concession stands, public address and multi media system, box office, press facilities, communications, parking/handicap access, scheduling, medical facilities and advertising.Upon selection, a second touchstone specific to the sport will be evaluated. Ever more policy makers view telecommunications as a strategic resource hence the financial creative activity of the bid is paramount to success of the games. (Read et al, 1996, 9)To ensure the security of athletes, coaches, and fans the need for professional security support, trained staff and volunteers, communication equipment, local, national and international media, accreditation, VIP room and services. Most importantly liability and cancellation insurance, physician(s) on-site, first aid facilities on-site, emergency medical services, str ategies for injuries and an emergency evacuation strategy must be in place.Critical to the provision and implementation to the plan require participation from local communities by actively attending the games and using their purchasing power. All local and state wide sport organizations will provide professional help with the operational aspects of the events.Regarding sports issues, it is necessary to have some appreciation of the structure of government, the development and organization of sport and the dominant warning of policy-making. (Houlihan, 1997, 22)The Municipal Government, local and state wide business community together with state wide corporate sponsors must provide the fund raising chemical mechanism to initiate the application process, maintain operational support thru to the completion of the games.Gratton, Chris Sport in the City The Role of Sport in Economic and Social Regeneration.Publisher Routledge. graze of effect London. Publication socio-economic class 2001. Page Number 63.Budd, Adrian, Sport and International Relations An Emerging Relationship. Publisher Routledge. Place of Publication New York. Publication Year 2004. Page Number 112.Larson, James F., Global Television and the political science of the Seoul Olympics. Publisher Westview Press. Place of Publication Boulder, CO. Publication Year 1993. Page Number 65.Houlihan, Barrie Sport, Policy, and Politics A Comparative Analysis. Publisher Routledge. Place of Publication London. Publication Year 1997. Page Number 22.Read, William H. Telecommunications Strategy for Economic Development. Publisher Praeger Publishers. Place of Publication Westport, CT. Publication Year 1996. Page Number 9.

Saturday, May 25, 2019

Swot: Shopping Mall and Similar Stalls

. SWOT Matrix STRENGTHS WEAKNESS FEATURES OF USB WATCH MARKETING SERVICES AGENCIES As the USB watch has the USB the watch preempt also have an scandalise and As the product is new to the market it would be difficult to timer. increase the sales because people still dont know about the product and if they would accept the product. DISTRIBUTION OF THE PRODUCT FORMS OF USB The product is not yet known to most of the people and making it The product remains vulnerable to the possibility that instauration distributed in Alabang especially in Festival Mall and Alabang may falter over time. Town Center that are commonly known to them. The product can be sold at CD-R King or any similar stalls. FASHIONABLE WATCH The USB watch has different styles and colors that make the wearer stylish. OPPORTUNITIES THREATS enunciate VENTURES OR STRATEGIC ALLIANCES WEAK BRAND NAME Joining CD-R king and other similar stalls that allow the productAs a new in the industry in producing a USB watch competing with to be introduced in the market and knowing that they are easily a known spot like Timex. found on malls. MATERIALS ARE RECYCLED FAST CHANGING ENVIRONMENT If the product can be made through recycled parts of a calculating machine As the people are changing what they think would be needed in it could make our product in a cheaper cost. making their life cheerful and having many alternatives in the form of USB like pens. FINANCIAL CRISIS As the economy slows the purchasing power of people would decline and they would prefer buying their primary need.

Friday, May 24, 2019

Determining the Right Quantity of Food (Home Remedy) To Give a Diabetic Patient In Case Of a Hypoglycaemic Episode

IntroductionThis shed is concerned with an construct that would enhance c be containy in the community. The bea of focus is the hypoglycaemic cause on diabetes longanimouss and the social occasion of home remedies to manage hypoglycaemia. Diabetic patients kip down what kinds of food they have to consume to keep wellnessy, and how to restore their blood boodle levels in case of a hypoglycaemic episode. According Frier and Schernthaner (2011), people whitethorn know the overcompensate food to give or chance upon, just now most do not know the right metre. The biggest ch aloneenge, however, lies with those family members who may not even be awargon of the right food and quantity of sugars that push the blood sugar to the accepted levels (Ali, 2011 Boughton, 2011 Onwudiwe et al., 2011). Usually, it is recommended that patients take fast-acting carbohydrates with 15-20 gms of carbohydrates. The blood sugar level is rechecked after 15 minutes, which prompts an opposite do se of 15-20 gms if the blood sugar level is still down in the mouth (Fonseca, 2010). Determining the right quantity of food that contains 15-20 gms of fast-acting carbohydrate is a challenge (Onwudiwe et al., 2011 Ali, 2011). Consequently, an innovation that plunder easily guide people on how to handle instances of hypoglycaemic attacks at home using the right quantity of household ingredients leave ensure that such(prenominal) attacks are handled appropriately.The InnovationHealth care delivery notify be enhanced through a categorisation of means depending on available resources, heads and the patients health conditions. In this research, focus is on diabetic patients who arrest from hypoglycaemia. Hypoglycaemia is a condition of low sugar levels than the recommended (Boughton, 2011). These patients can suffer from hypoglycaemic episodes anytime and anywhere. Because of that, their families, friends and other people around them should be aware of a quicker way to handle the situation. There are proposed means of condenseting out of the hypoglycaemic episode which includes taking foods and drinks that have fast acting carbohydrates (15-20gms). This is the best home remedy to the condition. Foods always recommended include coke, get across sugar, fruit juice, raisins, Lucozade, and many more (Boughton, 2011). The problem is, people may be aware of these fast-acting carbohydrates, but do not know the right quantity to take or give the patient suffering from hypoglycaemia (Boughton, 2011). The new idea is to provide a leaflet containing the quantity of fast-acting carbohydrates that these patients should receive. Examples are eight ounces of skimmed milk, quadruple ounces of soda or fruit juice, and five-six life savers candies.HypoglycaemiaHypoglycaemia is the state of low blood sugar in the body. For diabetic patients, it is the episodes of abnormal low plasma glucose concentration that can cause harm to the patient. It occurs when there is too much insulin or too little glucose in the body all which may be due to eating less than usual, taking too much insulin, more exercise than normal, eating later than usual, and medication interaction or due to an infirmity (Frier, Heller & McCrimmon, 2013).According to Yakubovich & Gerstein (2011), hypoglycaemia can either occur with or without symptoms. If the blood glucose level of a diabetic patient is ?70 mg/dL, thusly the patient should be concerned about hypoglycaemia and take necessity measures to increase the blood glucose level (Yakubovich & Gerstein, 2011), since they are likely to suffer from life lumbering conditions such as insulin shock. Hypoglycaemia is a common problem among diabetic patients. Boughton (2011) posits that both diabetes type I and II patients can experience hypoglycaemic episodes some(prenominal) times a week. Briscoe and Davis (2006) too postulate that about 90% of patients who use insulin experience hypoglycaemic episodes. Hypoglycaemia is commonly a complication of diabetes preaching. Current treatment guidelines recommend intensive glycaemic control. Hypoglycaemia, however, is a threat to the achievement of this state, both because of its occurrence and incidence. The need for intensive glycaemic control proved that some microvascular complications and some macrovascular complications could be trim down by comprehensive metabolic control. This kind of control cannot be achieved when the available treatment regimens cause hypoglycaemia (Briscoe and Davis, 2006). Because of the regularity of occurrence and the high likelihood of such episodes occurring at home, school or far away from the hospitals, diabetic patients should have a quick way of managing them. A common way of managing hypoglycaemic episodes is by administering fast acting carbohydrates. This impart ensure increased body sugar levels (Briscoe and Davis, 2006). Leaflets provide access to such training easy and quick. They excessively act as health promotional devices.Why Is It An Innovation?People may have the needed ingredients to stop a hypoglycaemic attack around them, but make use of these ingredients can be limited if they lack knowledge. There are health sources with nurture about fast-acting carbohydrates and the right quantity that should be taken in case a diabetic patient suffers a hypoglycaemic episode at home. The main problem is that these foods may be available randomly, and not all their quantities can be remembered easily. Additionally, one may think that he/she has the right quantity to give the patient, yet such a quantity can be confused by the other. It is from such a problem that the proposition to develop a leaflet containing the recommended quantity was developed. With such leaflets at home, anybody can help the patient.The necessity for the InnovationThis innovation is one of the ways of preventing the damaging effects of hypoglycaemia. If a diabetic patient can detect low blood glucose levels early enough, the damaging effects of hypoglycaemia that have been documented can be bring down. Hypoglycaemia has been associated with increased risk of mortality (Kalra et al., 2013 Werner, 2013 Mccoy et al., 2012 Cryer, 2012 Frier, Schernthaner & Heller, 2011 Yakubovich & Gerstein, 2011, Heller, 2008). There are studies that have directly constitute links between hypoglycaemia and high mortality rates in diabetic patients and those that link it directly through other complications. According to Mccoy et al., (2012), severe hypoglycaemia has been associated with 3.4 times increased threat of death. This was a conclusion obtained from self-reports on hypoglycaemia. Additional information from patient-reported hypoglycaemia from hospitals could only mean that the risk is higher (Mccoy et al., 2012). Any health focussing officer would think of preventing hypoglycaemia so that this increased risk is reduced. One way of preventing it is through access to germane(predicate) information about its f ocussing. This proposed idea entrust contribute to the reduction of severe hypoglycaemic cases that may then lead to death.The same information about 3.4 fold risks is communicated in Cryer (2012). Thestudy also indicates that hypoglycaemia is an impeding factor in the glycaemic management of diabetes. It damages the defences that can protect an individual from subsequent hypoglycaemia, therefore, causes recurrent hypoglycaemia. It causes morbidity in many with go on type II diabetes and in most people with type I diabetes. It prohibits the maintenance of euglycemia and reduces the quality of life the benefits of glycaemic control are never realized by the patient. Cryer (2012) also reviewed information from various reports about hypoglycaemia and found out that one in every ten or one in every twenty-five people with type I diabetes die from hypoglycaemia. It concluded that hypoglycaemia episodes need not to be life threatening for them to cause devastating effects (Cryer, 2012). This only emphasises the impact that this proposed innovation may have on diabetes patients. It has the potential of preventing any devastating effects, including death.Hypoglycaemia also has other health effects, for example, the effect on the cardio -vascular system, which in turn contributes to increased mortality. According to Frier, Schernthaner and Heller (2011), hypoglycaemia cause hemodynamic changes such as peripheral systolic blood pressure, and increased heart rate, reduced peripheral arterial resistance, a fall in central blood pressure and increased stroke volume, myocardial contractility and cardiac output. If such high run short load finds an already weakened heart, like the ones found in type II diabetic patients with coronary heart disease, dangerous consequences should be expected. Hypoglycaemia has also been associated with abnormal electrical activity in the heart, therefore, has high chances of causing sudden death (Frier, Schernthaner & Heller, 2011 Yakubovic h & Gerstein, 2011). All these evidences support the importance of preventing hypoglycaemia, at all levels. Prevention or good maintenance of blood glucose levels can enhance the quality of life.Risks and Benefits of the InnovationProvision of the leaflets is a way of providing high-quality information recommended for self-care and helps in decision-making. In this case, there volition be a class of fast-acting carbohydrates with the right quantities. A patient may get tired of taking non-diet soda all the time, and decide on other options such as fruit juice, glucose tablets, and honey. The leaflets will improve health literacy, clinical decision making, patient safety, care experience, self-care, service development, and access to health advice for both the patient and the family members (Greenwood, 2002).Research evidence has shown that chronic conditions cause anxiety, but understanding of the condition and how to manage and treat it improves the susceptibility of the patient to cope with the condition or to retrieve from it. It is for this reason that the leaflets with information on what to take when attacked by an episode of hypoglycaemia are very important for diabetic patients. Patient information leaflets merge information (Lowry, 2005). The leaflets also act as health promotion devices and will assist nurses in their health education and promotional activities (Greenwood, 2002).This innovation has other advantages, such as they contain information relevant for the individual, ensure consistency of information, are cheap and easy to produce and can be easily updated. This proposed innovation would also abandon readers to work through their own pace. According to Lowry (2005), they provide the carer and the patient with a focus for shared knowledge and discussion, and can also be used as a resource to healthcare organizations for informing their new staff members.In order to ensure that the leaflets have specific information specific to an indivi dual patient, it will make use of a structure that allows for a variety of options to be included.Disadvantages of LeafletsSome are usually produced for general issues, therefore not individualised. This may be a problem to diabetic patients who need special attention or have specific restrictions when it comes to taking some fast acting carbohydrates. Some may be allergic to some foods. This may not be a problem in this case since the leaflet will provide a variety of food and their quantities.The leaflets can remain unused unless those they are meant for are motivated to use them. In the case of managing hypoglycaemia among diabetic patients, for those who do not suffer hypoglycaemia, these leaflets may remain unused. To avoid this problem, here will be monitoring of the use of the leaflets (Lowry, 2005). The leaflets may do more harm than good if they are sternly produced. There are specific recommendations on how to produce a health information leaflet. If the leaflets are, for example, produced in a manner that can lead to the misconception of information, they may not achieve their aims as expected (Lowry, 2005). This will be avoided by a series of tests with the draft leaflet to ensure they are not misunderstood.Leaflets can be lost or misplaced easily. A proposed idea to eliminate this is to encourage the users to stick some of them on walls where they can easily be seen and have others in their bags, or wallets. Those that require professional attention may take longer to update and may also be costly. It needs some groundwork through before the resource is developed. As in the case of the proposed leaflet, there will be the groundwork needed to determine those with diabetes in the community, the number of the patients, and complications that they suffer. Groundwork will also find out about the family members around, their current self-care practices, and other important information that can inform the development of this health promotional resource (Lowry, 2005). latent Resources Needed to Implement the InnovationA research study will be conducted on the community to find out the number of people with diabetes, what they know about hypoglycaemia and how they currently manage the episodes. There is also need to prepare for an education program for these people and their family members on how to manage such episodes and get the neighbours, and friends involved. One can experience a hypoglycaemic episode unexpectedly and can need help. It is important to know how to relay relevant information, and quick to the soul that the patient may seek help. Resources needed, therefore, areField researchers or interviewersHealth educators or just nursesFinancial resources to undertake the research and educational program activitiesThe innovation development and implementation have about five main stages. There is the planning stage, the piece stage, conducting final checks, the consultation, and finally the distribution stage.PlanningThis is the initial preparedness stage where the leaflet developer will consider the kind of information he or she will need, and for what purpose, the kind of resources, needed and the people who will be involved. It will entail identification of those who will be involved and how each of them will be involved, for example, the research will need interviewers who will seek specific information from the patients. The person has to state why specific information is needed from a clinician, patient or carers. It is while planning that the individual should review all relevant and available information from relevant sources, for example, the NHS, peer-reviewed journal articles and Diabetes associations. He or she should also think of distribution methods, for example, if the leaflets will be given to the patients directly, placed on the scoot where they can easily be accessed, emailed, or even just posted (NHS, 2008).WritingThis stage involves writing down patient information and treasur eing its effects. One can look for recommended frameworks to guide the development of patient information. With the evidence from previously conducted research, the leaflet should contain the right information and should be easy to read. It involves a series of writing and testing until the right product is finally produced. When assessing readability, the developer can check the draft against leaflet development guidelines, and then check with team members, and maybe members of the public. When assessing whether it is good for patients, the developer can test it on people who are not familiar with the condition. The draft can also be checked by clinicians, patient support groups, experts, to tolerate that it is right for the targeted patients (NHS, 2008).Conducting Final ChecksWhatever is to be done in this stage depends on the contents in the leaflet and the purpose of producing such leaflets. In this proposed innovation, the leaflets are meant to improve patient self-care. Final checks may include confirming the patients and family members numbers and checking if the information conflicts with other information from influential and reliable health sources (NHS, 2008).ConsultationIn this stage, the draft is given to the patients and interested groups for feedback. Changes can be made depending on the responses received from the parties (NHS, 2008).DistributionThis stage is all about identifying the right distribution strategies in relation to the aim of developing the leaflets. For example, if the leaflets are meant for improving self-care, the healthcare professional will have to think of how these leaflets will reach the targeted patients. The perfect method is to deliver each leaflet to each patient and family members after consultation with them, and educating them on its benefits. They should also be informed about the whole escort of improving health care delivery. The stage also involves monitoring to identify how the information is used, and if the re is a need for any improvements (NHS, 2008). Additional resources that will be needed are writing materials, human resource for distribution, and financial resources for distribution and other project activities such as testing the leaflet draft. Implementation DifficultiesThere are no current implementation difficulties except for finding adequate resources to conduct the research in the community and identify the patients. It may also be difficult to incline all diabetes patients to come to educational programs on how to manage hypoglycaemia alongside the management of diabetes. According to the NHS guideline, the best approach is educating the patients and their families on a one-on-one basis, but this is expensive and time consuming. It may depend on the patients visit to the hospitals, which is an unsure way of reaching the patients.Leadership and Management Skills NeededThe leadership and management skills pass away to one category of management which is project management . Under this category, these skills can again be classified under technical project management skills, general management skills, and leadership skills (Hallows, 2002). Technical project management skills are such as project planning and writ of execution skills. Planning skills gives one the ability gather and assess information for estimates, identify dependencies, develop a work breakdown structure, assign and level resources, and analyse the risks among other abilities. Project execution skills give one the ability to develop estimates at completion, gather and evaluate data, prepare meaningful reports, and monitor the progress of the project (Hallows, 2002). These technical skills are very important for planning and execution of the proposed project. Project leadership skills involve managing the expectations and relationships of the participants. Hallows (2002) indicates that project management leadership requires the ability to engage the main stakeholders involved in the pr oject in each phase. An example, is, in the planning stage, the project manager has to get all the relevant departments involved, and any other parties that will be involved. Like in the leaflet development case, the project manager has to find a way of engaging the patients, the carers, family members and the health care organization supporting or sponsoring the project. The project manager can decide when it is necessary to share ideas, and the communication strategy that is necessary for attainment of the objectives of the project (Hallows, 2002). The project manager of this proposed project should have the ability to convince others about the benefits of the project, and explain the cherish of their roles. General management skills are such as the ability to listen, delegate, goal setting, time management, communications, negotiation, and meeting management. There is also the need for human resource management skills. Project planning and implementation will require people to p erform different duties. The performance of the project depends on the employees activities, without good management skills, the outcome of the project may be affected negatively (Hallows, 2002).ReferencesAli, Z. H. (2011). Health and Knowledge Progress among Diabetic Patients after Implementation of a Nursing Care Program establish on their Profile. Journal of Diabetes and Metabolism, 2121.Boughton, B. (2011). Patients with Diabetes Lack Knowledge about Hypoglycemia.Medscape Medical News. Retrieved from http//www.medscape.com/viewarticle/740881Briscoe, V. J. and Davis, S. N. (2006). Hypoglycemia in Type 1 and Type 2 DiabetesPhysiology, Pathophysiology, and Management. Clinical Diabetes, 24 (3) 115-121.Cryer, P. E. (2012). Severe Hypoglycemia Predicts Mortality in Diabetes, Diabetes Care. 35(9)1814-1816.Fonseca, V. (2010). Diabetes Improving Patient Care. New York Oxford University Press.Frier, B. M., Heller, S. and McCrimmon, R. (2013). Hypoglycaemia in Clinical Diabetes. (3rdEd.). West Sussex, UK John Wiley & Sons.Frier, B. M., Schernthaner, G. and Heller, S. R. (2011). Hypoglycemia and Cardiovascular Risks.Diabetes Care, 34(2) S132-S137.Greenwood, J. (2002). Employing a Range of Methods to meet Patient InformationNeeds. Nursing Times. Retrieved fromhttp//www.nursingtimes.net/employing-a-range-of-methods-to-meet-patient-information-needs/200054.article.Hallows, J. E. (2002). The Project Management Office Toolkit. New York AMACOM DivAmerican Mgmt Assn.Heller, S. (2008). Sudden Death and Hypoglycaemia. Diabetic Hypoglycemia, 1(2) 2-7.Kalra, S., Mukherjee,J. J., Venkataraman, S., Bantwal, G., Shaikh, S., Saboo, B., Das, A. K. andRamachandran, A. (2013). Hypoglycemia The pretermit Complication. Indian Journal of Endocrinology and Metabolism, 17(5) 819834.Lowry, M. (2005). Knowledge that Reduces Anxiety Creating patient information leaflets.Professional Nurse, 10 (5) 318-320.Mccoy, R. G., Van Houten, H. K., Ziegenfuss, J. Y., Shah, N. D., Wermers, R. A. and Smi th, S.(2012). Increased Mortality of Patients With Diabetes Reporting Severe Hypoglycemia. Diabetes Care. 35(9)1897-1901.NHS. (2008). Quality and usefulness Improvement Tools. Retrieved fromhttp//www.institute.nhs.uk/quality_and_service_improvement_tools/quality_and_service_improvement_tools/patient_information.htmlOnwudiwe, N. C., Mullins, C. D., Winston, R. A., Shaya, F. T., Pradel, F. G., Laird, A. andSaunders, E. (2011). Barriers to Self-management of Diabetes A qualitative Study among Low-income Minority Diabetics. Ethnicity & Disease, 21 27-32.Werner, J. (2013). Diabetic Status, Glycaemic Control & Mortality in Critically Ill Patients.ESICM News. Retrieved fromhttp//www.esicm.org/news-article/Article-review-ESICM-NEXT-Diabetic-status-Glycaemic-Control-Mortality-WERNER.Yakubovich, N. and Gerstein, H. C. (2011). Serious Cardiovascular Outcomes in Diabetes TheRole of Hypoglycemia. Circulation, 123 342-348.

Thursday, May 23, 2019

Human Relations Case Study Essay

1. Personality is a relatively stable set of traits that aids in explaining and predicting individual behavior. What are some of preindication Cubans traits that can explain his behavior during Maverick enliveneds?You have to excuse me for sounding naive moreover I had no idea who Mark Cuban was After reading about him, Im not sure I like him. I find his behavior ridiculous and childish from the outside looking in. Only when I began to read about his business savvy did I find Mr. Cuban tolerable. I find that he is a fan/owner but still an owner and he must be a hard player because you dont just fall into a position of that caliber. I think he poses a truly driven and determined personality and Mark was quoted on Forbes.com as saying the bring out personality trait that lead to his success is I worked hard and smarter than to the highest degree people in the business I have been in. To me this sound arrogant but it works for him Therefore, because Mark Cuban believes in himself he can act out as a eccentric fan because he doesnt seem to mind the money or the respect it costs him.2. Would you describe Mark Cuban as a Type A or Type B personality type?I would say that Mark Cuban is 100% type A. Some of the key characteristics that lead me to believe this is that most type As have a exaggerated sense of time making everything they do tactual sensation very urgent. I can see this in Mr. Cuban and it makes more sense when hes jumping around and screaming because the event that he loves is a timed sport. Also, type A personalities tend to be very competitive, and see everything as a challenge which Mark shows at every game3. wherefore is Mark Cuban described as someone with an internal locus of control?Someone with an internal locus of control believes that outcomes are determined by their perfor slicece, they like to control every aspect of their life. I can see where a self motivated and well educated person such as Mark may be described as a control freak. 4. The Big Five Model of Personality categorizes traits into the dimensions of surgency, agreeableness, adjustment, conscientiousness, and openness to experience. Which of these dimensions are strongest or clearly evident in Mark Cubans personality?I would say that the strongest traits that I was able to decipher would be conscientiousness because I think that any business man of Mark Cubans caliber would have to be both efficient and organized in order to be successful. some other trait would be surgency, Any You Tube video of a Mavericks game will show Mark jumping out of his seat for the whole game leading me to believe that he is both outgoing and obviously far more energetic than myself5. Is Mark Cuban projecting a positive or negative image with his eccentric behavior during Maverick games?I instantly thought Mark Cuban was a over the top jerk and he gave me a negative feeling. Being a type A personality I can see where someone may assume that he wouldnt be my type of people, however I feel that its deeper than that. I tend to shy away from look at me people and I feel that he is intentionally putting on a show. There is a part of me that has to respect a hard working business man like Cuban but the way he displays his emotions is atrocious. I can also see how this behavior is a unique business move, making fans every die hard lovers or completely hate the Mavericks.6. Mark Cuban has had a lot of disagreements with the NBA Commissioner that have resulted in fines totaling almost a million dollars. all(prenominal) incident brings a lot of publicity to the team and Cuban himself most of it negative. Chapter 1 discusses three alternatives for resolving human relations problems budge the other person, revision the situation or change yourself. Which approach or combination of approaches will you recommend for Mark Cuban and why?I think that in most situations a combination approach works well and I would tell Mark that in order to avoid all these fines, and turn them into fans you need to change yourself. I would say that hes going to have to acknowledge the way hes behaving and want to change for himself. If Mr. Cuban cant control his out-burst then maybe its time he admits he has a problem and can no longer attend the games therefore ever-changing the situation.

Wednesday, May 22, 2019

Wireless Sensor Networks

1. Introduction The increasing interest in radiocommunication demodulator webs can be promptly understood simply by thinking about what they essentially ar a whacking number of small sensing self-powered knobs which gather information or detect limited events and promulgate in a wireless fashion, with the end goal of handing their processed data to a grip office. Sensing, affect and communication are three blusher elements whose combining in one tiny whatsis gives rise to a vast number of exertions A1, A2. sensing element engagements leave alone endless opportwholeies, only if at the same duration pose formidable challenges, uch as the fact that zero is a scarce and usually non-renewable resource. However, recent advances in outset power VLSI, engraft computing, communication computer computer hardware, and in general, the convergence of computing and communications, are making this emerging technology a reality A3. Likewise, advances in na nonechnology and Micro Electro-Mechanical strategys (MEMS) are pushing toward networks of tiny distri justed sensors and actuators. 2. Applications of detector profitss executable applications of sensor networks are of interest to the most diverse fields. Environmental monitor, warfare, child education, surveillance, micro-surgery, and griculture are only a few examples A4. Through joint efforts of the University of California at Berkeley and the College of the Atlantic, environmental monitoring is carried out off the coast of Maine on Great Duck Island by means of a network of Berkeley motes equipped with various sensors B6. The pommels accuse their data to a baseborn station which makes them available on the Internet. Since habitat monitoring is rather sensitive to merciful presence, the deployment of a sensor network provides a noninvasive approach and a remarkable degree of granularity in data acquisition B7. The same idea lies behind thePods project at the University of how-do-you-do at Manoa B8, where environmental data (air temperature, light, wind, relative humidity and rainfall) are gathered by a network of weather sensors embedded in the communication units deployed in the South-West Rift Zone in Volcanoes National Park on the Big Island of Hawaii. A major concern of the questioners was in this case camouflaging the sensors to make them c everyplacet to curious tourists. In Princetons Zebranet Project B9, a dynamic sensor network has been created by attaching surplus collars equipped with a low-power GPS frame to the necks of zebras to onitor their moves and their behavior. Since the network is intentional to operate in an infrastructure-free environment, peer-to-peer swaps of information are used to produce redundant databases so that seekers only take away to encounter a few zebras in rove to collect the data. Sensor networks can also be used to monitor and study natural phenomena which intrinsically discourage human presence, much(prenominal) as h urricanes and woodland fires. common efforts in the midst of Harvard University, the University of New Hampshire, and the University of North Carolina have recently led to the deployment of a wireless sensor etwork to monitor eruptions at Volcan Tungurahua, an lively volcano in central Ecuador. A network of Berkeley motes monitored infrasonic symptoms during eruptions, and data were transmitted over a 9 km wireless link to a base station at the volcano observatory B10. Intels radio set Vineyard B11 is an example of apply ubiquitous computing for clownish monitoring. In this application, the network is expected not only to collect and interpret data, further also to use such data to make decisions aimed at detecting the presence of parasites and enabling the use of the earmark kind of insecticide. info collection relies on data mules, small devices carried by people (or dogs) that communicate with the nodes and collect data. In this project, the attention is shifted from rel iable information collection to active decisionmaking based on acquired data. Just as they can be used to monitor nature, sensor networks can handlewise be used to monitor human behavior. In the Smart Kindergarten project at UCLA B12, wirelessly-networked, sensor-enhanced toys and other classroom tendencys supervise the learning process of children and allow unobtrusive monitoring by the teacher. Medical research and healthcare can greatly benefit rom sensor networks vital sign monitoring and accident recognition are the most natural applications. An eventful issue is the care of the elderly, especially if they are affected by cognitive dec source a network of sensors and actuators could monitor them and even assist them in their periodical routine. Smart appliances could help them organize their lives by reminding them of their meals and medications. Sensors can be used to capture vital signs from patients in real-time and relay the data to handheld computers carried by medical personnel, and wearable sensor nodes can store patient data such as identification, history, and treatments.With these ideas in mind, Harvard University is cooperating(a) with the School of Medicine at Boston University to damp CodeBlue, an infrastructure public figureed to support wireless medical sensors, PDAs, PCs, and other devices that may be used to monitor and treat patients in various medical scenarios B13. On the hardware side, the research team has Martin Haenggi is with the department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556 Fax +1 574 631 4393 emailprotectednd. edu. Daniele Puccinelli is also with the Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556. reated Vital Dust, a inflexible of devices based on the MICA21 sensor node weapons platform (one of the most popular members of the Berkeley motes family), which collect heart rate, oxygen saturation, and EKG data and relay them over a medium-range ( 100 m) wireless network to a PDA B14. Interactions between sensor networks and humans are already judged controversial. The US has recently approved the use of a radio receiver-frequency implantable device (VeriChip) on humans, whose intended application is gatewaying the medical records of a patient in an emergency. Potential future tense repercussions of this decision have been discussed in the media.An elicit application to complaisant engineering is the idea of Smart Buildings wireless sensor and actuator networks integrated within buildings could allow distributed monitoring and control, improving living conditions and reducing the zip fastener consumption, for instance by controlling temperature and air flow. Military applications are plentiful. An intriguing example is DARPAs self-healing minefield B15, a selforganizing sensor network where peer-to-peer communication between anti-tank mines is used to respond to attacks and distribute the mines in order to heal breaches , complicating the progress of enemy troops.Urban warfare is another application that distributed sensing lends itself to. An ensemble of nodes could be deployed in a urban landscape painting to detect chemical attacks, or track enemy movements. PinPtr is an ad hoc acoustic sensor network for sniper localization highly-developed at Vanderbilt University B16. The network detects the muzzle blast and the acoustic shock wave that originate from the sound of gunfire. The arrival times of the acoustic events at different sensor nodes are used to estimate the speckle of the sniper and send it to the base station with a special data aggregation and routing service.Going back to peaceful applications, efforts are underway at Carnegie Mellon University and Intel for the design of IrisNet (Internet- scale leaf Resource-Intensive Sensor net profit Services) B17, an architecture for a mankindwide sensor web based on common computing hardware such as Internet-connected PCs and low-cost sensi ng hardware such as webcams. The network interface of a PC thusly senses the virtual environment of a LAN or the Internet rather than a physical environment with an architecture based on the concept of a distributed database B18, this hardware can be orchestrated into a global sensor system hat responds to queries from users. 3. feature of speech Features of Sensor Networks In ad hoc networks, wireless nodes self-organize into an infrastructureless network with a dynamic topology. Sensor networks (such as the one in throw 1) voice these traits, but also have several distinguishing features. The number of nodes in a characteristic sensor network is much higher than in a typical ad hoc network, and dense deployments are often coveted to ensure coverage and connectivity for these reasons, sensor network hardware must be cheap. Nodes typically have mean energy limitations, which make them more misadventure-prone. They are enerally assumed to be stationary, but their relatively f requent breakdowns and the volatile nature of the wireless channel nonetheless impart in a variable network topology. Ideally, sensor network hardware should be power- high-octane, small, inexpensive, and reliable in order to maximize network lifetime, add flexibility, allay data collection and minimize the take aim for primary(prenominal)tenance. Lifetime Lifetime is extremely critical for most applications, and its primary limiting factor is the energy consumption of the nodes, which need to be self-powering. Although it is often assumed that the transmit power associated with acket transmitting accounts for the lions consider of power consumption, sensing, augury processing and even hardware doing in standby mode possess a consistent amount of power as intumesce C19, C20. In some applications, extra power is necessitate for macro-scale actuation. M some(prenominal) researchers suggest that energy consumption could be reduced by considering the existing interdependencies between individual layers in the network protocol stack. Routing and channel portal protocols, for instance, could greatly benefit from an information exchange with the physical layer. At the physical layer, benefits can be obtained with ower radio duty cycles and dynamic modulation scaling (varying the constellation size to minimize energy expenditure third QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 21 External Infrastructure Gateway Base Station Sensing Nodes Figure 1. A generic sensor network with a two-tiered archi1 tecture. See Section 5 for a hardware overview. D35). Using low-power modi for the processor or disabling the radio is generally advantageous, even though periodically turning a subsystem on and off may be more costly than always keeping it on. Techniques aimed at reducing the idle mode leakage current in CMOS-based rocessors are also noteworthy D36. Medium Access Control (MAC) solutions have a hold impact on energy consumption, as some of the primary causes of energy waste are found at the MAC layer collisions, control computer software overhead and idle listening. Powersaving forward error control techniques are not easy to implement due to the high amount of computing power that they exact and the fact that unyielding packets are normally not practical. Energy-efficient routing should avoid the going away of a node due to battery depletion. Many proposed protocols tend to minimize energy consumption on forwarding aths, but if some nodes happen to be located on most forwarding paths (e. g. , close to the base station), their lifetime pass on be reduced. Flexibility Sensor networks should be scalable, and they should be able to dynamically adapt to changes in node density and topology, like in the case of the self-healing minefields. In surveillance applications, most nodes may remain quiescent as long as nothing interesting happens. However, they must be able to respond to special events that the network intends to study with so me degree of granularity. In a self-healing minefield, a number of sensing mines ay rest period as long as none of their peers explodes, but need to quickly be enumerate operational in the case of an enemy attack. Response time is also very critical in control applications (sensor/actuator networks) in which the network is to provide a delay-guaranteed service. Untethered systems need to self-configure and adapt to different conditions. Sensor networks should also be robust to changes in their topology, for instance due to the failure of individual nodes. In particular, connectivity and coverage should always be guaranteed. Connectivity is achieved if the base station can be reached from any node.Coverage can be seen as a stride of quality of service in a sensor network C23, as it defines how well a particular bailiwick can be observed by a network and characterizes the probability of detection of geographicly constrained phenomena or events. Complete coverage is particularly imp ortant for surveillance applications. Maintenance The only desired form of maintenance in a sensor network is the complete or partial update of the program code in the sensor nodes over the wireless channel. All sensor nodes should be updated, and the restrictions on the size of the new code should be the same as in the case of fit out programming.Packet loss must be accounted for and should not impede correct reprogramming. The portion of code always running in the node to guarantee reprogramming support should have a small footprint, and updating procedures should only cause a brief interruption of the normal operation of the node C24. The functioning of the network as a only should not be endangered by unavoidable failures of single nodes, which may occur for a number of reasons, from battery depletion to unpredictable external events, and may all be independent or spatially correlated C25. Faulttolerance is particularly crucial as ongoing maintenance s rarely an option in sen sor network applications. Self-configuring nodes are necessary to allow the deployment process to run smoothly without human interaction, which should in principle be limited to placing nodes into a given geographical area. It is not desirable to have humans configure nodes for habitat monitoring and destructively interfere with wildlife in the process, or configure nodes for urban warfare monitoring in a hostile environment. The nodes should be able to assess the quality of the network deployment and indicate any problems that may arise, as well as coif to hanging environmental conditions by automatic reconfiguration. Location awareness is important for selfconfiguration and has definite advantages in terms of routing C26 and security. Time synchronization C27 is advantageous in promoting cooperation among nodes, such as data fusion, channel find, coordination of sleep modi, or security-related interaction. Data Collection Data collection is related to network connectivity and co verage. An interesting solution is the use of ubiquitous mobile agents that randomly move around to gather data bridging sensor nodes and access points, whimsically named dataMULEs ( bustling Ubiquitous LAN Extensions) in C28. The predictable mobility of the data lower can be used to save power C29, as nodes can learn its schedule. A similar concept has been implemented in Intels radiocommunication Vineyard. It is often the case that all data are relayed to a base station, but this form of centralized data collection may shorten network lifetime. Relaying data to a data sink causes non-uniform power consumption patterns that may overburden forwarding nodes C21. This is particularly harsh on nodes providing end links to base stations, which may end up relaying traffic coming from all ther nodes, thus forming a critical bottleneck for network throughput A4, C22, as shown in Figure 2. An interesting technique is clustering C30 nodes team up to form clusters and transmit their informa tion to their cluster heads, which fuse the data and forward it to a 22 IEEE CIRCUITS AND SYSTEMS MAGAZINE 3rd QUARTER 2005 sink. Fewer packets are transmitted, and a uniform energy consumption pattern may be achieved by periodic re-clustering. Data redundancy is minimized, as the aggregation process fuses strongly correlated measurements. Many applications require that queries be sent to sensing nodes.This is true, for example, whenever the goal is gathering data regarding a particular area where various sensors have been deployed. This is the rationale behind looking at a sensor network as a database C31. A sensor network should be able to protect itself and its data from external attacks, but the severe limitations of lower-end sensor node hardware make security a true challenge. Typical encoding schemes, for instance, require large amounts of memory that are unavailable in sensor nodes. Data confidentiality should be preserved by encrypting data with a secret key shared with t he intended receiver. Data integrity should be ensured to revent unauthorized data alteration. An authenticated broadcast must allow the verification of the legitimacy of data and their sender. In a number of commercial applications, a serious disservice to the user of a sensor network is compromising data availability (denial of service), which can be achieved by sleep-deprivation torture C33 batteries may be drained by continuous service requests or demands for legitimate but intensive tasks C34, preventing the node from entering sleep modi. 4. Hardware shape Issues In a generic sensor node (Figure 3), we can identify a power module, a communication block, a processing unit ith internal and/or external memory, and a module for sensing and actuation. Power Using stored energy or harvesting energy from the outside world are the two options for the power module. Energy storage may be achieved with the use of batteries or alternative devices such as fuel cells or miniaturized pepper iness engines, whereas energy-scavenging opportunities D37 are provided by solar power, vibrations, acoustic encumbrance, and piezoelectric effects D38. The vast majority of the existing commercial and research platforms relies on batteries, which dominate the node size. firsthand (nonrechargeable) batteries are often chosen, predominantlyAA, AAA and coin-type. Alkaline batteries offer a high energy density at a cheap price, offset by a non-flat discharge, a large physical size with respect to a typical sensor node, and a shelf life of only 5 years. Voltage regulation could in principle be employed, but its high inefficiency and large quiescent current consumption call for the use of components that can deal with large variations in the supply emf A5. Lithium cells are very compact and boast a flat discharge curve. Secondary (rechargeable) batteries are typically not desirable, as they offer a lower energy density and a higher cost, not to mention the fact that in most pplicatio ns recharging is simply not practical. open fire cells D39 are rechargeable electrochemical energy- con meter reading devices where electricity and heat are produced as long as hydrogen is supplied to react with oxygen. Pollution is minimal, as irrigate is the main byproduct of the reaction. The potential of fuel cells for energy storage and power delivery is much higher than the one of traditional battery technologies, but the fact that they require hydrogen complicates their application. Using renewable energy and scavenging techniques is an interesting alternative. Communication Most sensor networks use radio communication, even if lternative solutions are offered by optical maser and infrared emission. Nearly all radio-based platforms use COTS (Commercial Off-The-Shelf) components. Popular choices include the TR1000 from RFM (used in the MICA motes) and the CC1000 from Chipcon (chosen for the MICA2 platform). More recent solutions use industry regulations like IEEE 802. 15. 4 (MICAz and Telos motes with CC2420 from Chipcon) or pseudo-standards like Bluetooth. Typically, the transmit power ranges between ? 25 dBm and 10 dBm, while the receiver sensitivity can be as good as ? 110 dBm. deuce-ace QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 23 Base Station Critical Nodes Figure 2.A uniform energy consumption pattern should avoid the depletion of the resources of nodes located in the vicinities of the base station. Communication Hardware Power Sensors (? Actuators) ADC Memory Processor Figure 3. Anatomy of a generic sensor node. Spread spectrum techniques increase the channel reliability and the noise tolerance by spreading the signal over a wide range of frequencies. Frequency hopping (FH) is a spread spectrum technique used by Bluetooth the bearer frequency changes 1600 times per second on the basis of a pseudo-random algorithm. However, channel synchronization, hopping sequence search, and the high data rate ncrease power consumption this is one of the strongest caveats when using Bluetooth in sensor network nodes. In Direct Sequence Spread Spectrum (DSSS), communication is carried out on a single carrier frequency. The signal is calculate by a higher rate pseudo-random sequence and thus spread over a wide frequency range (typical DSSS radios have spreading factors between 15 and 100). Ultra Wide Band (UWB) is of great interest for sensor networks since it meets some of their main requirements. UWB is a particular carrier-free spread spectrum technique where the RF signal is spread over a spectrum as large as several GHz.This implies that UWB signals look like noise to conventional radios. Such signals are produced using baseband pulses (for instance, Gaussian monopulses) whose length ranges from 100 ps to 1 ns, and baseband transmission is generally carried out by means of pulse position modulation (PPM). Modulation and demodulation are indeed extremely cheap. UWB provides built-in ranging capabilities (a wideband signal al lows a good time resolution and therefore a good location accuracy) D40, allows a very low power consumption, and performs well in the presence of multipath fading. Radios with relatively low bit-rates (up to 100 kbps) re advantageous in terms of power consumption. In most sensor networks, high data rates are not needed, even though they allow shorter transmission times thus permitting lower duty cycles and alleviating channel access contention. It is also desirable for a radio to quickly switch from a sleep mode to an operational mode. Optical transceivers such as lasers offer a strong power advantage, mainly due to their high directionality and the fact that only baseband processing is required. Also, security is intrinsically guaranteed (intercepted signals are altered). However, the need for a line of sight and recise localization makes this option impractical for most applications. Processing and Computing Although low-power FPGAs might become a viable option in the near future D41, microcontrollers (MCUs) are now the primary choice for processing in sensor nodes. The key metric in the selection of an MCU is power consumption. Sleep modi deserve special attention, as in many applications low duty cycles are essential for lifetime extension. Just as in the case of the radio module, a extravagant wake-up time is important. Most central processing units used in lower-end sensor nodes have clock speeds of a few MHz. The memory requirements depend on the pplication and the network topology data storage is not critical if data are often relayed to a base station. Berkeley motes, UCLAs Medusa MK-2 and ETHZs BTnodes use low-cost Atmel AVR 8-bit RISC microcontrollers which consume about 1500 pJ/instruction. More sophisticated platforms, such as the Intel iMote and Rockwell WINS nodes, use Intel StrongArm/XScale 32-bit processors. Sensing The high consume rates of modern digital sensors are usually not needed in sensor networks. The power efficiency of sensors an d their turn-on and turn-off time are much more important. Additional issues are the physical ize of the sensing hardware, fabrication, and assembly compatibility with other components of the system. Packaging requirements come into play, for instance, with chemical sensors which require contact with the environment D42. Using a microcontroller with an onchip analog comparator is another energy-saving technique which allows the node to avoid sampling values falling outside a certain range D43. The ADC which complements analog sensors is particularly critical, as its resolution has a direct impact on energy consumption. Fortunately, typical sensor network applications do not have stringent resolution requirements.Micromachining techniques have allowed the miniaturization of many types of sensors. Performance does decrease with sensor size, but for many sensor network applications size matters much more than accuracy. Standard integrated circuits may also be used as temperature sens ors (e. g. , using the temperaturedependence of subthreshold MOSFETs and pn junctions) or light intensity transducers (e. g. , using photodiodes or phototransistors) D44. Nanosensors can offer promising solutions for biological and chemical sensors while concurrently meeting the most ambitious miniaturization needs. 5. Existing Hardware PlatformsBerkeley motes, made commercially available by Crossbow, are by all means the best known sensor node hardware implementation, used by more than 100 research organizations. They consist of an embedded microcontroller, low-power radio, and a small memory, and they are powered by two AA batteries. MICA and MICA2 are the most successful families of Berkeley motes. The MICA2 platform, whose layout is shown in Figure 4, is equipped with an Atmel ATmega128L and has a CC1000 transceiver. A 51-pin expansion connector is available to interface sensors (commercial sensor boards designed for this specific platform are available).Since the MCU is to hand le 24 IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005 medium access and baseband processing, a fine-grained event-driven real-time operating system (TinyOS) has been implemented to specifically address the concurrency and resource management needs of sensor nodes. For applications that require a better form factor, the circular MICA2Dot can be used it has most of the resources of MICA2, but is only 2. 5 cm in diameter. Berkeley motes up to the MICA2 generation cannot interface with other wireless- enabled devices E47. However, the newer generations MICAz and Telos support IEEE 802. 15. , which is part of the 802. 15 Wireless Personal Area Network (WPAN) standard being developed by IEEE. At this point, these devices represent a very good solution for generic sensing nodes, even though their unit cost is still relatively high (about $100$200). The proliferation of different lowerend hardware platforms within the Berkeley mote family has recently led to the development of a new v ersion of TinyOS which introduces a flexible hardware abstraction architecture to simplify multi-platform support E48. Tables 1 and 2 show an overview of the radio transceivers and the microcontrollers most commonly used in xisting hardware platforms an overview of the key features of the platforms is provided in Table 3. Intel has designed its own iMote E49 to implement various improvements over available mote designs, such as increased CPU processing power, increased main memory size for on-board computing and improved radio reliability. In the iMote, a powerful ARM7TDMI core is complemented by a large main memory and non-volatile storage area on the radio side, Bluetooth has been chosen. Various platforms have been developed for the use of Berkeley motes in mobile sensor networks to enable investigations into controlled mobility, which facilitates eployment and network repair and provides possibilities for the implementation of energy-harvesting. UCLAs RoboMote E50, Notre Dames M icaBot E51 and UC Berkeleys CotsBots E52 are examples of efforts in this direction. UCLAs Medusa MK-2 sensor nodes E53, developed for the Smart Kindergarten project, expand Berkeley motes with a second microcontroller. An on-board power management and track unit monitors power consumption within the different subsystems and selectively powers down unused parts of the node. UCLA has also developed iBadge E54, a wearable sensor node with sufficient computational power to process the sensed data.Built around an ATMega128L and a DSP, it features a Localization Unit designed to estimate the position of iBadge in a room based on the presence of special nodes of known location attached to the ceilings. In the context of the look project (a joint effort among several European institutions) custom nodes E55, C24 have been developed to test and demonstrate energy-efficient networking algorithms. On the software side, a trademarked operating system, PEEROS (Preemptive EYES veridical Time O perating System), has been implemented. The Smart-Its project has investigated the possibility of embedding computational power into objects, leading o the creation of three hardware platforms DIY Smartits, tinge computers and BTnodes. The DIY Smart-its E56 have been developed in the UK at Lancaster University their modular design is based on a core board that provides processing and communication and can be elongated with add-on boards. A typical setup of Smart-its consists of one or more sensing nodes that broadcast their data to a base station which consists of a standard core board connected to the serial port of a PC. Simplicity and extensibility are the key features of this platform, which has been developed for the creation of Smart Objects.An interesting application is the pack Table four load cells placed underneath a coffee table form a Wheatstone twain and are connected to a DIY node that observes load changes, determines event types like placement and removal of obj ects or a person moving a finger across the surface, and also retrieves the position of an object by correlating the values of the individual load cells after the event type (removed or placed) has been recognized E57. Particle Computers have been developed at the University of Karlsruhe, Germany. Similarly to the DIY platform, the Particle Smart-its are based on a core board quipped with a Microchip PIC they are optimized for energy efficiency, scalable communication and small scale (17 mm ? 30 mm). Particles communicate in an ad hoc fashion as two Particles come close to one another, THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 25 Oscillator 7. 3728-MHz DS2401P Silicon Serial No. Antenna Connector Connector LEDs Battery Connection 32. 768-kHz Oscillator 14. 7456-MHz Oscillator ATMEL ATMega 128L CPU CC1000 Transceiver ATMEL AT45DB041 Data ostentatiousness Figure 4. Layout of the MICA2 platform. they are able to talk. Additionally, if Particles come near a gateway device, they can be connected to Internet-enabled evices and access services and information on the Internet as well as provide information E58. The BTnode hardware from ETHZ E47 is based on an Atmel ATmega128L microcontroller and a Bluetooth module. Although advertised as a low-power technology, Bluetooth has a relatively high power consumption, as discussed before. It also has long connection setup times and a lower degree of freedom with respect to possible network topologies. On the other hand, it ensures interoperability between different devices, enables application development through a standardized interface, and offers a significantly higher bandwidth (about 1 Mbps) ompared to many low-power radios (about 50 Kbps). Moreover, Bluetooth support means that COTS hardware can be used to create a gateway between a sensor network and an external network (e. g. , the Internet), as opposed to more costly proprietary solutions E59. MIT is working on the ? AMPS (? -Adaptive Multidomain Power- aware Sensors) project, which explores energy-efficiency constraints and key issues such as selfconfiguration, reconfigurability, and flexibility. A first prototype has been designed with COTS components three stackable boards (processing, radio and power) and an ptional extension module. The energy dissipation of this microsensor node is reduced through a variety of poweraware design techniques D45 including fine-grain shutdown of inactive components, dynamic voltage and frequency scaling of the processor core, and adjustable radio transmission power based on the required range. Dynamic voltage scaling is a technique used for active power management where the supply voltage and clock frequency of the processor are regulated depending on the computational load, which can vary significantly based on the operational mode D36, C20. The main oal of second generation ? AMPS is clearly stated in D46 as breaking the 100 ? W average power barrier. Another interesting MIT project is the draw ing pin computing system E60, whose goal is the modelling, testing, and deployment of distributed peer-to-peer sensor networks consisting of many identical nodes. The pushpins are 18 mm ? 18 mm modular devices with a power substrate, an infrared communication module, a processing module (Cygnal C8051F016) and an expansion module (e. g. , for sensors) they are powered by direct contact between the power substrate and superimposed conductive sheets. 26 MCU Max.Freq. MHz Memory Data Size bits ADC bits Architecture AT90LS8535 (Atmel) 4 8 kB Flash, 512B EEPROM, 512B SRAM 8 10 AVR ATMega128L (Atmel) 8 128 kB Flash, 4 kB EEPROM, 4 kB SRAM 8 10 AVR AT91FR4081 (Atmel) 33 136 kB On-Chip SRAM, 8 Mb Flash 32 Based on ARM core (ARM7TDMI) MSP430F149 (TI) 8 60 kB + 256B Flash, 2 kB RAM 16 12 Von Neumann C8051F016 (Cygnal) 25 2304B RAM, 32 kB Flash 8 10 Harvard 8051 PIC18F6720 (Microchip) 25 128 kB Flash, 3840B SRAM, 1 kB EEPROM 8 10 Harvard PIC18F252 (Microchip) 40 32 K Flash, 1536B RAM, 256B EE PROM 8 10 Harvard StrongARM SA-1110 (Intel) 133 32 ARM v. 4PXA255 (Intel) 400 32 kB Instruction Cache, 32 kB Data 32 ARM v. 5TE Cache, 2 kB Mini Data Cache Table 2. Microcontrollers used in sensor node platforms. Radio (Manufacturer) Band MHz Max. Data Rate kbps Sensit. dBm Notes TR1000 (RFM) 916. 5 115. 2 ? 106 OOK/ASK TR1001 (RFM) 868. 35 115. 2 ? 106 OOK/ASK CC1000 (Chipcon) 3001,000 76. 8 ? 110 FSK, ? 20 to 10 dBm CC2420 (Chipcon) 2,400 250 ? 94 OQPSK, ? 24 to 0 dBm, IEEE 802. 15. 4, DSSS BiM2 (Radiometrix) 433. 92 64 ? 93 9XStream (MaxStream) 902928 20 ? 114 FHSS Table 1. Radios used in sensor node platforms. IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005MIT has also built Tribble (Tactile reactive interface built by linked elements), a spherical robot wrapped by a wired skinlike sensor network designed to emulate the functionalities of biological skin E61. Tribbles surface is divided into 32 patches with a Pushpin processing module and an depart of sensors and actua tors. At Lancaster University, surfaces provide power and network connectivity in the Pin&Play project. Network nodes come in different form factors, but all share the Pin&Play connector, a custom component that allows physical connection and networking through conductive sheets which re embedded in surfaces such as a argue or a bulletin board E62. Pin&Play falls in between wired and wireless technologies as it provides network access and power across 2D surfaces. Wall-mounted objects are especially suited to be augmented to become Pin&Play objects. In a demonstration, a wall switch was augmented and freely placed anywhere on a wall with a Pin&Play surface as wallpaper. For applications which do not call for the minimization of power consumption, high-end nodes are available. Rockwellis WINS nodes and Sensorias WINS 3. 0 Wireless Sensing Platform are equipped with more powerful rocessors and radio systems. The embedded PC modules based on widely supported standards PC/104 and PC/10 4-plus feature Pentium processors moreover, PC/104 peripherals include digital I/O devices, sensors and actuators, and PC-104 products support closely all PC software. PFU Systems Plug-N-Run products, which feature Pentium processors, also belong to this category. They offer the capabilities of PCs and the size of a sensor node, but lack built-in communication hardware. COTS components or lower-end nodes may be used in this sense C32. Research is underway toward the creation of sensor nodes that are more capable than the motes, moreover maller and more power-efficient than higher-end nodes. Simple yet effective gateway devices are the MIB programming boards from Crossbow, which bridge networks of Berkeley motes with a PC (to which they interface using the serial port or Ethernet). In the case of Telos motes, any generic node (i. e. , any Telos mote) can act as a gateway, as it may be connected to the USB port of a PC and bridge it to the network. Of course, more powerful gateway d evices are also available. Crossbows Stargate is a powerful embedded computing platform (running Linux) with enhanced communication and sensor signal processing capabilities based n Intel PXA255, the same X-Scale processor that forms the core of Sensoria WINS 3. 0 nodes. Stargate has a connector for Berkeley motes, may be bridged to a PC via Ethernet or 802. 11, and includes built-in Bluetooth support. 6. Closing Remarks Sensor networks offer countless challenges, but their versatility and their broad range of applications are eliciting more and more interest from the research community as well as from industry. Sensor networks have the potential of triggering the next revolution in information technology. The challenges in terms of circuits and systems re numerous the development of low-power communication hardware, low-power microcontrollers, MEMSbased sensors and actuators, efficient AD conversion, and energy-scavenging devices is necessary to enhance the potential and the perfor mance of sensor networks. System integration is another major challenge that sensor networks offer to the circuits and systems research community. We suppose that CAS can and should have a significant impact in this emerging, exciting area. 27 Platform CPU Comm. External Memory Power Supply WesC (UCB) AT90LS8535 TR1000 32 kB Flash Lithium Battery MICA (UCB, Xbow) ATMega128L TR1000 512 kB Flash AAMICA2 (UCB, Xbow) ATMega128L CC1000 512 kB Flash AA MICA2Dot (UCB, Xbow) ATMega128L CC1000 512 kB Flash Lithium Battery MICAz (UCB, Xbow) ATMega128L CC2420 512 kB Flash AA Telos (Moteiv) MSP430F149 CC2420 512 kB Flash AA iMote (Intel) ARM7TDMI Core Bluetooth 64 kB SRAM, 512 kB Flash AA Medusa MK-2 (UCLA) ATMega103L TR1000 4 Mb Flash Rechargeable Lithium Ion AT91FR4081 iBadge (UCLA) ATMega128L Bluetooth, TR1000 4 Mb Flash Rechargeable Lithium Ion DIY (Lancaster University) PIC18F252 BiM2 64 Kb FRAM AAA, Lithium, Rechargeable Particle (TH) PIC18F6720 RFM TR1001 32 kB EEPROM AAA or Lithium Coi n Battery or RechargeableBT Nodes (ETHZ) ATMega128L Bluetooth, CC1000 244 kB SRAM AA ZebraNet (Princeton) MSP430F149 9XStream 4 Mb Flash Lithium Ion Pushpin (MIT) C8051F016 Infrared Power Substrate WINS 3. 0 (Sensoria) PXA255 802. 11b 64 MB SDRAM, 32 MB + 1 GB Flash Batteries Table 3. Hardware features of various platforms. THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE Acknowledgments The support of NSF (grants ECS 03-29766 and CAREER CNS 04-47869) is gratefully acknowledged. References General References A1 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A bailiwick on sensor networks, in IEEE Communications Magazine, pp. 02114, Aug. 2002. A2 L. B. Ruiz, L. H. A. Correia, L. F. M. Vieira, D. F. Macedo, E. F. Nakamura, C. M. S. Figueiredo, M. A. M. Vieira, E. H. B. Maia, D. Camara, A. A. F. Loureiro, J. M. S. Nogueira, D. C. da Silva Jr. , and A. O. Fernandes, Architectures for wireless sensor networks (In Portuguese), in Proceedings of the 22nd Brazilian Sym posium on Computer Networks (SBRC04), Gramado, Brazil, pp. 167218, May 2004. Tutorial. ISBN 85-88442-82-5. A3 C. Y. Chong and S. P. Kumar, Sensor networks Evolution, opportunities, and challenges, in IEEE Proceedings, pp. 12471254, Aug. 003. A4 M. Haenggi, Opportunities and Challenges in Wireless Sensor Networks, in Handbook of Sensor Networks cram Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 1. 11. 14, CRC Press, 2004. A5 J. Hill, System Architecture for Wireless Sensor Networks. Ph. D. thesis, University of California at Berkeley, Spring 2003. Applications B6 A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, Wireless sensor networks for habitat monitoring, in jump ACM shop on Wireless Sensor Networks and Applications, Atlanta, GA, Sept. 002. B7 A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, Habitat monitoring Application driver for wireless communications technology, in ACM SIGCOMM Workshop on Dat a Communications in Latin America and the Caribbean, San Jose, costa Rica, Apr. 2001. B8 E. Biagioni and K. Bridges, The application of remote sensor technology to assist the recovery of rare and endangered species, internationalistic Journal of High Performance Computing Applications, vol. 16, pp. 315324, Aug. 2002. B9 P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D.Rubenstein, Energy-efficient computing for wildlife tracking Design tradeoffs and early experiences with ZebraNet, in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, Oct. 2002. B10 G. Werner-Allen, J. Johnson, M. Ruiz, J. Lees, and M. Welsh, supervise volcanic eruptions with a wireless sensor network, in Proceedings of the Second European Workshop on Wireless Sensor Networks (EWSN05), Jan. 2005. B11 J. Burrell, T. Brooke, and R. Beckwith, Vineyard computing Sensor networks in agricultural production, IEEE Pervas ive Computing, vol. , no. 1, pp. 3845, 2004. B12 M. Srivastava, R. Muntz, and M. Potkonjak, Smart kindergarten Sensor- based wireless networks for smart developmental problem-solving enviroments, in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom01), Rome, Italy, pp. 132138, 2001. B13 T. Fulford-Jones, D. Malan, M. Welsh, and S. Moulton, CodeBlue An ad hoc sensor network infrastructure for emergency medical care, in International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, 2004. B14 D. Myung, B. Duncan, D. Malan, M. Welsh, M.Gaynor, and S. Moulton, Vital dust Wireless sensors and a sensor network for realtime patient monitoring, in 8th Annual New England Regional Trauma Conference, Burlington, MA, 2002. B15 Self-healing Mines http//www. darpa. mil/ato/programs/SHM/. B16 M. Maroti, G. Simon, A. Ledeczi, and J. Sztipanovits, shooting localization in urban terrain, IEEE Computer, vol. 37, pp. 6061, Aug. 2004 . B17 P. Gibbons, B. Karp, Y. Ke, S. Nath, and S. Seshan, IrisNet An architecture for a worldwide sensor web, IEEE Pervasive Computing, vol. 2, no. 4, pp. 2233, 2003. B18 P. Gibbons, B. Karp, Y. Ke, S.Nath, and S. Seshan, IrisNet An Architecture for Enabling Sensor-Enriched Internet Service, Tech. Rep. IRP-TR-03-04, Intel Research, Pittsburgh, PA, June 2003. Characteristic Features Lifetime C19 A. Goldsmith and S. Wicker, Design challenges for energy-constrained ad hoc wireless networks, IEEE Wireless Communications Magazine, vol. 9, pp. 827, Aug. 2002. C20 L. Yuan and G. Qu, Energy-efficient Design of Distributed Sensor Networks, in Handbook of Sensor Networks pack Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 38. 138. 19, CRC Press, 2004. C21 M.Haenggi, Twelve Reasons not to Route over Many Short Hops, in IEEE Vehicular Technology Conference (VTC04 Fall), Los Angeles, CA, Sept. 2004. C22 M. Haenggi, Energy-Balancing Strategies for Wireles s Sensor Networks, in IEEE International Symposium on Circuits and Systems (ISCAS03), Bangkok, Thailand, May 2003. Coverage C23 S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava, Coverage problems in wireless ad-hoc sensor networks, in Proceedings of the twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM01), vol. 3, Anchorage, AK, pp. 13801387, Apr. 001. Maintenance C24 N. Reijers and K. Loangendoen, Efficient code distribution in wireless sensor networks, in Second ACM International Workshop on Wireless Sensor Networks and Applications, San Diego, CA, Sept. 2003. C25 D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly resilient, energy efficient multipath routing in wireless sensor networks, in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc01), Long Beach, CA, pp. 251254, 2001. Localization and Synchronization C26 M. Mauve, H. Hartenstein, H. Fuessler, J. Widmer, a nd W.Effelsberg, Positionsbasiertes Routing fuer die Kommunikation zwischen Fahrzeugen, itInformation Technology (formerly it + ti)Methoden und innovative Anwendungen der Informatik und Informationstechnik, vol. 44, pp. 278286, Oct. 2002. C27 F. Sivrikaya and B. Yener, Time synchronization in sensor networks A survey, IEEE Network, vol. 18, pp. 4550, JulyAug. 2004. Data Collection, Routing, and Architectures C28 R. C. Shah, S. Roy, S. Jain, and W. Brunette, Data MULEs Modeling and analysis of a three-tier architecture for sparse sensor networks, in Ad Hoc Networks Journal, vol. 1, pp. 215233, Elsevier, Sept. 2003. C29 A.Chakrabarti, A. Sabharwal, and B. Aazhang, Using predictable observer mobility for power efficient design of sensor networks, in Information Processing in Sensor Networks (IPSN03), Palo Alto, CA, Apr. 2003. C30 O. Younis and S. Fahmy, HEED A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks, in IEEE Transactions on Mobile Computing, vol. 3, pp. 366379, 2004. C31 R. Govindan, J. Hellerstein, W. Hong, S. Madden, M. Franklin, and S. Shenker, The Sensor Network as a Database, Tech. Rep. 02771, University of Southern California, 2002. ftp//ftp. usc. edu/pub/csinfo/ tech-reports/papers/02-771. df. C32 M. Yarvis and W. Ye, Tiered Architectures in Sensor Networks, in Handbook of Sensor Networks rack Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 13. 113. 22, CRC Press, 2004. Security C33 F. Stajano and R. Anderson, The resurrecting duckling Security issues for ad-hoc wireless networks, in 7th International Workshop on Security Protocols, Cambridge, UK, Apr. 1999. C34 T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, Denial-of-service attacks on battery-powered mobile computers, in Proceedings of the 2nd IEEE Pervasive Computing Conference, Orlando, FL, pp. 09318, Mar. 2004. Hardware D35 C. Schurgers, O. Aberthorne, and M. Srivastava, Modulation scaling for energy aware communic ation systems, in Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 28 IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005 Huntington Beach, CA, pp. 9699, Aug. 2001. D36 A. P. Chandrakasan, R. Min, M. Bhardwaj, S. Cho, and A. Wang, Power aware wireless microsensor systems, in 28th European Solid- resign Circuits Conference (ESSCIRC02), Florence, Italy, 2002. D37 S. Roundy, P. Wright, and J. Rabaey, A study of low level vibrations as a power source for ireless sensor nodes, Computer Communications, vol. 26, pp. 11311144, July 2003. D38 J. Kymissis, C. Kendall, J. Paradiso, and N. Gershenfeld, Parasitic power harvesting in shoes, in Proceedings of the 2nd IEEE International Symposium on Wearable Computers (ISWC04), Pittsburgh, PA, Oct. 1998. D39 A. J. Appleby, Fuel Cell Handbook, New York, NY Van Reinhold Co. , 1989. D40 W. C. Chung and D. S. Ha, An Accurate Ultra WideBand (UWB) Ranging for precision summation location, in International Conferenc e on UWB Systems and Technologies, Reston, VA, Nov. 2002. D41 M. Vieira, D. da Silva Jr. C. C. Jr. , and J. da Mata, Survey on wireless sensor network devices, in Proceedings of the 9th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA03), Lisbon, Portugal, Sept. 2003. D42 B. A. Warneke and K. S. J. Pister, MEMS for distributed wireless sensor networks, in Proceedings of the 9th International Conference on Electronics, Circuits and Systems (ICECS02), vol. 1, Dubrovnik, Croatia, pp. 291294, 2002. D43 Z. Karakehayov, Low-Power Design for Smart Dust Networks, in Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems, M.Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 37. 137. 12, CRC Press, 2004. D44 B. Warneke, Miniaturizing Sensor Networks with MEMS, in Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 5. 15. 19, CRC Press, 2004. D45 R. Min, M. Bhardwaj, S. Cho, A. Sinha, E. Shih, A. Wang, and A. P. Chandrakasan, An Architecture for a Power-Aware Distributed Microsensor Node, in IEEE Workshop on Signal Processing Systems (SiPS00), Lafayette, LA, Oct. 2000. D46 D. D. Wentzloff, B. H.Calhoun, R. Min, A. Wang, N. Ickes, and A. P. Chandrakasan, Design considerations for next generation wireless power-aware microsensor nodes, in Proceedings of the 17th International Conference on VLSI Design, Mumbai, India, pp. 361367, 2004. Existing Platforms E47 J. Beutel, O. Kasten, M. Ringwald, F. Siegemund, and L. Thiele, Poster abstract Btnodesa distributed platform for sensor nodes, in Proceedings of the First International Conference on Embedded Networked Sensor Systems (SenSys-03), Los Angeles, CA, Nov. 2003. E48 V. Handziski, J. Polastre, J. H. Hauer, C. Sharp, A. Wolisz, and D. Culler, Flexible hardware abstraction for wireless sensor networks, in Proceedings of the 2nd International Workshop on Wireless Sensor Networks (EWSN 2005), Istanbul, Turkey, Jan. 2005. E49 R. M. Kling, Intel Mote An Enhanced Sensor Network Node, in International Workshop on Advanced Sensors, Structural Health Monitoring and Smart Structures at Keio University, Tokyo, Japan, Nov. 2003. E50 K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. Sukhatme, Robomote Enabling Mobility In Sensor Networks, Tech. Rep.CRES-04-006, University of Southern California. E51 M. B. McMickell, B. Goodwine, and L. A. Montestruque, MICAbot A robotic platform for large-scale distributed robotics, in Proceedings of International Conference on intellectual Robots and Systems (ICRA03), vol. 2, Taipei, Taiwan, pp. 16001605, 2003. E52 S. Bergbreiter and K. S. J. Pister, CotsBots An Off-the-Shelf Platform for Distributed Robotics, in Proceedings of the 2003 IEEE International Conference on Intelligent Robots and Systems (ICRA03), Las Vegas, NV, Oct. 2003. E53 A. Savvides and M. B.Srivastava, A distributed computation platform for wireless embedded sensing, in 20th Internat ional Conference on Computer Design (ICCD02), Freiburg, Germany, Sept. 2002. E54 S. Park, I. Locher, and M. Srivastava, Design of a wearable sensor badge for smart kindergarten, in 6th International Symposium on Wearable Computers (ISWC2002), Seattle, WA, pp. 13. 113. 22, Oct. 2002. E55 L. F. W. van Hoesel, S. O. Dulman, P. J. M. Havinga, and H. J. Kip, Design of a low-power testbed for Wireless Sensor Networks and verification, Tech. Rep. R-CTIT-03-45, University of Twente, Sept. 2003. E56 M.Strohbach, The smart-its platform for embedded contextaware systems, in Proceedings of the First International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, Apr. 2004. E57 A. Schmidt, M. Strohbach, K. V. Laerhoven, and H. -W. Gellersen, Ubiquitous interactionUsing surfaces in everyday environments as pointing devices, in 7th ERCIM Workshop User Interfaces For All, Chantilly, France, 2002. E58 M. Beigl, A. Krohn, T. Zimmer, C. Decker, and P. Robinson, Aware- Con governm ent agency aware context communication, in The Fifth International Conference on Ubiquitous Computing (Ubicomp03), Seattle, WA, Oct. 003. E59 J. Beutel, O. Kasten, F. Mattern, K. Roemer, F. Siegemund, and L. Thiele, Prototyping sensor network applications with BTnodes, in IEEE European Workshop on Wireless Sensor Networks (EWSN04), Berlin, Germany, Jan. 2004. E60 J. Lifton, D. Seetharam, M. Broxton, and J. Paradiso, Pushpin computing system overview A platform for distributed, embedded, ubiquitous sensor networks, in Proceedings of the Pervasive Computing Conference, Zurich, Switzerland, Aug. 2002. E61 J. A. Paradiso, J. Lifton, and M. Broxton, Sensate mediamultimodal electronic skins as dense sensor networks, BT Technology Journal, vol. 2, pp. 3244, Oct. 2004. E62 K. V. Laerhoven, N. Villar, and H. -W. Gellersen, Pin&Mix When Pins Become Interaction Components. . . , in Physical Interaction (PI03) Workshop on Real World User InterfacesMobile HCI Conference, Udine, Italy, Sept. 2003 . Daniele Puccinelli received a Laurea degree in Electrical Engineering from the University of Pisa, Italy, in 2001. After spending two years in industry, he joined the graduate program in Electrical Engineering at the University of Notre Dame, and received an M. S. Degree in 2005. He is currently working toward his Ph. D. degree.His research has focused on cross-layer approaches to wireless sensor network protocol design, with an emphasis on the interaction between the physical and the network layer. Martin Haenggi received the Dipl. Ing. (M. Sc. ) degree in electrical engineering from the Swiss Federal Institute of Technology in Zurich (ETHZ) in 1995. In 1995, he joined the Signal and Information Processing testing ground at ETHZ as a Teaching and Research Assistant. In 1996 he earned the Dipl. NDS ETH (post-diploma) degree in information technology, and in 1999, he completed his Ph. D. thesis on the analysis, design, and optimization of ellular neural networks. After a postdocto ral year at the Electronics Research Laboratory at the University of California in Berkeley, he joined the Department of Electrical Engineering at the University of Notre Dame as an assistant professor in January 2001. For both his M. Sc. and his Ph. D. theses, he was awarded the ETH medal, and he received an NSF CAREER award in 2005. For 2005/06, he is a CAS Distinguished Lecturer. His scientific interests include networking and wireless communications, with an emphasis on ad hoc and sensor networks. THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 29