The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LoRa, an emerging wireless technology, is examined for long range communication performance in a large area. Although LoRa shows good performance for long-distance transmission in the countryside, its radio signals can be attenuated and interfered with by buildings, trees and other signal sources. In urban areas, our observation shows that LoRa requires a dense deployment of LoRa gateways to ensure...
WSN localization methods play important roles in various applications, because many applications involve the need of localization. To propose an accurate localization method, this paper focuses on calculating the number of hops and utilizes the multidimensional scaling analysis to estimate the coordinates of unknown nodes. Then, the method of multi-power transmission is used to refine the coordinates...
Prospective memory, the ability to remember doing future tasks without being reminded, is a critical ability in everyday life. As the elderly are vulnerable to age-related declines in prospective memory, it is important to prevent this decline in advance. In this demonstration, we develop an agent-based game for practicing prospective memory. It can potentially provide a convenient and natural way...
The traditional IEEE 802.11 network is designed for the use of small scale local wireless networks such as home or campus WLANs, where one access point serves a reasonably few number of devices like smartphones, laptops, tablets, and so on. However, the emergence of the Internet of Things (IoT) have changed the scene of wireless communications, while the number of devices rapidly increases and becomes...
Multi-core processors are being increasingly adopted for embedded systems because they improve performance, power consumption and lower development cost. Composing multiple operating systems on a multi-core processor enhances the reusability of software when developing rich functional embedded systems. Multiple OS environments enable the product to use two versions of an operating system at the same...
For thermal design and assembly reason, there inevitably exist thermal aperture arrays and slots on computer enclosure, so electromagnetic pulse will get into enclosure through these apertures, which is called “back-door coupling”. This paper simulates and computes the computer enclosure's apertures coupling effects caused by electromagnetic pulse by using Transmission Line Matrix Method (TLM). Change...
Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.