The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the present situation, there is a huge research gap and development present in the creation and utilization of smart environment due to the development of wireless sensor network (WSN) and Internet of Things (IoT). The disadvantage of the earlier models and present systems is it consumes more power and there is a presence of network monitoring issues. Here, there is a need of developing a model...
The security of operations within a wireless sensor network requires the protection of messages exchanged between the sensor nodes. To achieve the security aims and prevent a WSN from being compromised by an adversary. Key management is a security technical in wireless sensor networks (WSN). In the remainder of this paper, we propose a new key pre-distribution scheme that was based on the modification...
Recently, pedestrian detection system has become an important issue to improve the road safety through its integration in several Advanced Driver Assistance Systems (ADAS). According to the literature, the use of the Histogram of Oriented Gradients (HOG) descriptor has been very efficient and robust in the development of such systems. However, the intensive calculation steps of this descriptor make...
The growth of multimedia applications in wireless sensor network requires more efficient data storage and transmission techniques. In addition, when it comes to wireless sensor network, we mainly focus several constraints. Among which the materials resources where a wireless sensor network consists of several small size devices called nodes sensors. Thus, the second challenge we face is the hostile...
The security of the information stored or transmitted through a wireless sensor network against attacks is a primary objective. Key management includes many security services such as confidentiality and authentication. Under the constraints of WSN, designing a scheme of key management is a major challenge. In this paper, we improve the resilience of pool based on symmetric key pre-distribution scheme...
In wireless sensor network applications, low-cost and low-power operation of the wireless receiver are critical. To address this need with high performance wireless front-end, many intensive researches on CMOS radio-frequency (RF) front-end circuits have been proposed. The ultimate goal is adaptive receiver design to minimize the trade-off between high performance and low-cost, low power consumption...
Requirements of Wireless Sensor Network application which are limited power, required energy and moderate performance has been forced the Wireless Sensor Network transceiver designers toward an adaptive transceiver structures. To address the above mentioned concerns, a low-noise amplifier integrated in 2.4 GHz, in 0.18 μm CMOS technology is developed. The proposed LNA can operate at 1.8 V supply voltage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.