The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
E-health is one of the domains which will need more and more IoT solutions in the future, as it requires short delays for life-dependency situations and safe local storage spaces for privacy matters. The emergency context demands efficient communication and computing capacities, and the cloud vision as well as traditional TCP/IP way of communication cannot really suit these requirements. New approaches...
In cognitive radio network (CRN), secondary users (SUs) suffer from the spectrum sensing data falsification (SSDF) attack launched by malicious users (MUs). To deal with SSDF attack, one of the typical artificial neural networks (ANN): self-organizing map (SOM) neural network is recommended. SOM network possesses the ability of classifying the SUs into categories with different frequency of occurrence...
In cognitive radio networks (CRNs), spectrum sensing data falsification (SSDF) is one of the most typical attack which hugely degrades the detection performance of cooperative spectrum sensing (CSS). SSDF and defense strategies have been an active field of research, but countermeasures of existing researches are sensitive to the number of malicious users (MUs). In this paper, we propose a two-stage...
To enforce surrounding surveillance efficiently and reduce the heavy cost to deploy various infrastructures, mobile sinks are perceived to have potentials for utilization by wireless multimedia sensor networks (WMSNs). However, since high-mobility usually causes communication disconnections and the high re-transmission rate will consume more network resources, quality of experience (QoE) monitoring...
A space-saving end-effector is designed for small scale manipulator in this paper. The end-effector is equipped with capture and actuation transmission capabilities. Two subsystems are highly integrated systems of mechanics, electronics and sensors. A trefoil shaped capture system is developed for closed envelop. The worm shaft and worm wheels are adopted for the self-locking property, and they are...
Social Peer-to-Peer (P2P) is a novel model to organize sensor networks, which can establish social relationships in an autonomous way with the benefits of extending the network boundaries and enhancing the network scalability. However, the complexity and time dependence characteristics introduced by social P2P model raise difficulties for assessing and selecting security services accurately and effectively...
We consider a class of networked control systems (NCSs) where the plant has time-varying norm-bounded parameter uncertainties, the network only provides a limited number of simultaneous accesses for the sensors and actuators, and the packet dropouts occur randomly in the network. For this class of NCSs with uncertainties and access constraints as well as packet dropouts, we derive sufficient conditions...
In this paper, we are interested in the Robust Sensor Placement Problem (RSPP) in municipal water networks. As the contamination source and time are rather random and almost impossible to forecast, we aim to minimize the maximum population exposed over all contamination scenarios by placing a limited number of sensors into the network. We formulate a mixed-integer program model based on an absolute...
In this contribution, we investigate a class of observer-based discrete-time networked control systems (NCSs) with random packet dropouts occurring independently in both the sensor-to-controller (S/C) and controller-to-actuator (C/A) channels. We first propose and prove a separation principle for the general class of NCSs where packet dropouts in the C/A and S/C channels are governed by two independent...
Intensive task-oriented repetitive physical therapies need be provided by individualized interaction between the patients and the rehabilitation specialists to improve hand motor performance for those survived from stroke and traumatic brain injury. The goal of this research is to develop a novel wearable device for robotic assisted hand repetitive therapy. We designed a pneumatic muscle (PM) driven...
Classification is a very important research topic in knowledge discovery and machine learning. Decision-tree is one of the well-known data mining methods that are used in classification problems. But sometimes the data set for classification contains vectors missing one or more of the feature values, and is called as incomplete data. Generally, the existence of incomplete data will degrade the learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.