The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless sensor networks securing code update is essential for many crucial military applications. The nodes deployed in border areas in the military region called the border sensor nodes are the more sensitive nodes. The border sensor nodes need to do some special tasks compared to other intermediate sensor nodes. So the code update to be sent to the border nodes will be different from the other...
Mobile Ad-hoc Network (MANET) is an autonomous system of randomly moving nodes where every node acts as host and router to maintain the network functionality. Ad-hoc on demand Distance Vector (AODV) is one of the principal routing protocols which may be get insecure due to malicious nodes present inside the network. Such malicious nodes affect the network performance severely by dropping all the data...
4 ?? 4 ring array antennas are combined with commercially available and custom designed RF components to realize a base station operating for channel #1 of UWB communications. The 4 transmitters and receivers modules are developed using LNA, PA, buffer amplifiers, custom designed single and dual GCM mixers, and differential BPF and LPF. The GCM mixer is driven by a StLO poly-phase board that is realized...
Recently, wireless mesh networks (WMNs) have drawn significant attention from academia and industry as a fast, easy, and inexpensive solution for broadband wireless access. In WMNs, many important applications, such as mobile TV and video/audio conferencing, require the support of multicast. In this paper, we address the issue of multicast cooperative communications over WMN. Specifically, we identify...
Cluster based organization is widely used to achieve energy efficiency in Wireless Sensor Networks (WSN). In order to achieve confidentiality of the sensed data it is necessary to have secret key shared between a node and its cluster head. Key management is challenging as the cluster head changes in every round in cluster based organization. In this paper we are proposing and prototyping a scheme...
This paper describes an indoor wireless localization method of an RFID reader using passive tags placed at known locations. The reader location is estimated using the received signal strength indication (RSSI) and trilateration. However, in an indoor wireless environment, the RSSI undergoes fading due the presence of unavoidable scatterers. Hence, trilateration under such fading environments would...
Recent advancement in wireless communications and electronics has enabled the development of low-cost & low power sensors networks. The sensor networks can be used for various application areas (e.g., health, military, home). Wireless Sensor Networks are autonomous devices forwarding locally collected data to a so-called sink node along multi-hop wireless paths. The main con-straint is the limited...
Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been called into question by a new approach, namely the opportunistic routing. It exploits the broadcast nature of wireless transmissions to take advantage from spatial diversity by routing the packets according to the propagation...
A teleoperated surgical robotic system allows surgical procedures to be conducted across long distances while utilizing wired and wireless communication with a wide spectrum of performance that may affect the outcome. An open architecture portable surgical robotic system (Raven) was developed for both open and minimally invasive surgery. The system has been the subject of an intensive telesurgical...
Autonomous navigation is an important problem in mobile robotics. Various solutions have been proposed part of them being sensor based. The use of the sensors offers flexibility and adaptability to the robot but has also disadvantages: it may need powerful processing units, mounted on the robot and it is difficult to represent correctly and in all details the environment and the position of the robot...
Dissemination techniques may be used to enable users to get the needed data efficiently. In this paper, I describe an architecture designed to provide a flexible access to data in a multi-channel dissemination-based network. I show how a suitable system fits in the overall telecommunication network. In addition, I show the consistency of the system design and provide analytical study for the space...
Recently, Knowledge Discovery Process has proven to be a promising tool for extracting behavioral patterns, regarding sensor nodes, from wireless sensor networks. In this paper, we propose a new type of behavioral patterns, which we refer to as Target-based Association Rules, to discover the correlation among a set of targets monitored by a network at a border region. Target-base Rules is an extension...
Packet discarding policies have been shown to significantly enhance the goodput of the system in high speed networks. In this paper, we develop a discrete time queueing model that combines two major discarding policies - the Partial Message Discard (PMD) and the Early Message Discard (EMD) policy. The PMD policy discards any subsequent packets that belong to a message that has lost a packet due to...
In this paper we study the capacity of the half-duplex wireless butterfly network, in which a relay node facilitates the communication between two interfering transmitter-receiver pairs. We use the deterministic approach to make progress towards approximating the capacity region of this network. We use the insights obtained from the analysis of the corresponding deterministic problem to derive a new...
We discuss a ldquoself-managementrdquo concept, suitable for the description of autonomic spectrum reallocation operations through dynamic resource allocation and control processes, for an effective realization of the Future Internet (FI) vision. We introduce a specific targeted methodology, in the form of the Generic Cognitive Cycle Model, including three distinct and separate processes (i.e. Monitoring,...
Implementing the synchronization of chaotic systems presents new challenges that are difficult to handle by using currently adopted schemes. The paper proposes an implementation of a synchronization method for a pseudo-True Random Bit Generator (PTRBG) based on chaotic systems. Synchronization of the chaotic binary sequences is achieved by using the backward iteration approach. The implementation...
Recent developments in microcontroller, radio transceiver, and energy harvesting device design now permit wireless sensor nodes to operate indefinitely from power scavenged from their environment. Many algorithms for conventional sensor networks assume that nodes run directly from non-rechargeable batteries and therefore attempt to conserve energy rather than carefully exploiting it when available...
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end userpsilas usage. Current wireless technologies in use allow hackers to monitor and even change the integrity...
Clustering is one of the most popular approaches used in wireless sensor networks to conserve energy and increase node as well as network lifetime. LEACH is among the most popular clustering protocols proposed for wireless sensor networks. In this paper we have carried out network lifetime and energy consumption analysis for cluster-based wireless sensor networks based upon LEACH protocol for periodic...
The state of Oaxaca is a major sending of migrants who make their way to Baja California (San Quintin) in Mexico and San Diego County (mainly to the area of Vista) in the United States. The intensity of migration flows from Oaxaca to both Baja California and San Diego County makes the area an attractive case to apply information and communications technologies (ICT) and public policy strategies to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.