The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A real-time irrigation scheduling system (ISS) for greenhouses has been developed in compliance with the ISO/IEC/IEEE 21451 standard. The developed system is capable of displaying greenhouse and irrigation scheduling parameters. Irrigation can wirelessly be automated by the sensor node by activating irrigation based on sensor values and predefined irrigation parameters. A low power sensor node was...
A smart helmet has been developed that is able to detect of hazardous events in the mines industry. In the development of helmet, we have considered the three main types of hazard such as air quality, helmet removal, and collision (miners are struck by an object). The first is the concentration level of the hazardous gases such as CO, SO2, NO2, and particulate matter. The second hazardous event was...
Deficiency in fresh water resources globally has raised serious alarms in the last decade. Efficient management of water resources play an important role in the agriculture sector. Unfortunately, this is not given prime importance in the third world countries because of adhering to traditional practices. This paper presents a smart system that uses a bespoke, low cost soil moisture sensor to control...
Wireless communication is an emerging and evergreen field of research and will continue to be so in the future. Increased demands in spectrum and users eventually result in spectral congestion. Cognitive Radio systems provide an intelligent and an attractive solution to this problem. Spectrum Sensing is the main key for the functioning of Cognitive Radio and helps in efficient spectrum utilization...
With the advent of an era of wireless communication, the number of users is on the rise, the result of which is spectral congestion. Cognitive Radio systems provide an intelligent and an attractive solution to this technical crisis. Spectrum Sensing is indispensable for the functioning of Cognitive Radio and helps in efficient spectrum utilization. In this paper, a wavelet based approach to spectrum...
Ubiquitous patient care monitoring system can be defined as the combination of communication technology and body sensor nodes. Ubiquitous patient care monitoring is the part of telemedicine monitoring, an application communication protocol which is HTTP (Hypertext Transfer protocol), used to access information from handheld devices such as PCs, PDA (personal digital assistant) etc. which have the...
Ad-hoc wireless multi-hop network is communication network that consist of wireless nodes, placed together in an ad hoc manner, with minimal prior planning. All nodes have routing capability and forward data packets for other nodes in multi-hop fashion. Since many applications have QoS (quality of service) requirements such as delay and throughput, it is imperative that the wireless part of the communication...
We present a centralized integrated approach, ADWISER, for (i) managing an Internet access link bandwidth, and (ii) for enhancing the performance of an IEEE 802.11 WLAN. Our single-box approach is an extension to our previous work, where we focused on meeting TCP performance objectives over WLANs. In this work, we present a novel cascaded packet scheduling algorithm to address the issue of unfair...
We consider the simplest IEEE 802.11 WLAN networks for which analytical models are available and seek to provide an experimental validation of these models. Our experiments include the following cases: (i) two nodes with saturated queues, sending fixed-length UDP packets to each other, and (ii) a TCP-controlled transfer between two nodes. Our experiments are based entirely on Aruba AP-70 access points...
We develop analytical models for estimating the energy spent by stations (STAs) in infrastructure WLANs when performing TCP controlled file downloads. We focus on the energy spent in radio communication when the STAs are in the Continuously Active Mode (CAM), or in the static Power Save Mode (PSM). Our approach is to develop accurate models for obtaining the fraction of times the STA radios spend...
Due to the limited life time of batteries, biomedical implants typically use inductive coupling to transfer power to the implantable device. Inductive coupling of source and load coils suffers from low efficiency due to the low coupling between the coils. The low coupling limits the maximum transferable power and operating range of the system. Using a resonance-based coupling technique, the adverse...
Dynamic Spectrum Access (DSA) MAC protocols allow a Cognitive Radio (CR) device to opportunistically access unused or less crowded spectrum while ensuring protection for the incumbents. Though DSA shows great potential to enhance spectrum efficiency, the associated constraints on QoS may limit its usefulness. QoS support in a DSA-based network is not trivial due to the fact that in addition to unfavorable...
The last decade has seen explosive growth in the development of mobile applications. This has increased the demand on the wireless communication services. The capability to achieve wireless access anywhere, anytime, and anyplace has become common expectation as it provides significant flexibility and freedom in mobility. But to achieve global mobility in heterogeneous networks for any mobile device...
ldquoSecure Device Pairingrdquo is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptible communication channel. Lack of prior security context and common trust infrastructure open the door for Man-in-the-Middle (also known as Evil Twin) attacks. Mitigation of these attacks requires user involvement in the device pairing...
This research paper examines the standing of wireless technology in higher education institutes located in a number of regions around the world. In this paper 33 higher education institutes have been surveyed to find out the current level of wireless development. Institutes were surveyed on wireless services provided, the number access points, the coverage area, level of growth, the impact of installing...
Space diversity technique is an attractive solution for improving quality in wireless links. The objectives of this paper are to investigate the impact of bit error rate on the number of users and the SNR for space time block coded MIMO Rayleigh fading channels. Diversity is a technique used to combat multipath-fading. Space Diversity is a technique in which multiple numbers of antennas are used at...
The demand for the wireless Internet requiring broadband is expected to increase in a dramatic way due to popularity of tri player applications including voice, video, and data transmission. The existing wireless technologies UMTS, WiFi, WiMax, may not satisfy the customer requirements, for many reasons including availability, coverage, cost and most importantly mobility. Each technologies has it...
Energy-aware routing is important in multi-hop wireless networks that are operated by battery power, e.g., wireless sensor networks. To maximize the network survivability, the energy efficiency of paths must be taken into account for route selection. Simple heuristics such as choosing paths with minimal energy consumption do not perform well, because the energy of the nodes on such paths may deplete...
We consider a framework in which several service providers offer downlink wireless data access service in a certain area. Each provider serves its end-users through opportunistic secondary spectrum access of licensed spectrum, and needs to pay primary license holders of the spectrum usage based and membership based charges for such secondary spectrum access. In these circumstances, if providers pool...
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the medium access control, link, and physical layers. We assume Markov models for the packet arrival processes and the channel gain processes. Perfect channel state information is assumed to be available at the transmitter and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.