Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Considering the bottleneck of energy efficiency and reliability in the pervasive and personalized wearable healthcare management based on Human Body Communication (HBC), an all-digital extraordinary HBC coordinator is proposed, as a configurable hub in the baseband system for Body Area Network (BAN). The unique HBC coordinator in a BAN is capable of enhancing the control, and programming of the network...
In Human Body Communication (HBC) system, low power is still one of the most important research issues for monitoring nodes supplied by battery. Utilizing two-hop extension star network topology is an efficient measure to reduce the average transmission power consumption and improve the stability. This paper proposes a digital baseband system for low duty cycle and low load network. When the nodes...
This paper is concerned with the formation method for multi-robot systems with obstacles. Consensus formation cannot avoid obstacles in the process of movement, and algorithms based on relative distances are not applicable to the situations requiring rigid topology. An algorithm has been designed combining consensus protocols and the modified artificial potential field method for the second-order...
For a hybrid sensor network constructing with static nodes and mobile nodes, adjusting the position of the mobile nodes can improve network coverage and target detection rate effectively. In this paper, we present the “Bidding” protocol based on probability detection model, and then propose a distributed covering algorithm DPFA (Distributed Potential Field Algorithm) for hybrid wireless sensor network...
Even though software-defined networking (SDN) and the OpenFlow protocol have demonstrated great practicality in the packet domain, there has been some hesitance in extending the OpenFlow specification to circuit and optical switched domains that constitute wide area multi-layer transport networks. This paper presents an overview of various proposals with regards to extending OpenFlow to support circuit...
Wireless sensor network can push the agriculture developing to the intelligent and automatic stage. In this paper, the structure and its key technology of one kind of node system of wireless sensor network are introduced, including the communication protocol between the nodes in wireless sensor network and the method of application for sensor network in digital agriculture. A new method of information...
The Re-ECN protocol is a recently proposed congestion notification scheme for IP networks. Building upon Explicit Congestion Notification (ECN), which marks packets instead of dropping them during congestion, Re-ECN requires the end users to re-insert the marking information back to the network as a feedback to allow the network react more effectively on resource management. In this work, we first...
Currently, off-line defense against the current operating system can not accurately detect the device error status, can not really prevent “walking space” and the construction of complex line against wrong operating system, electromagnetic interference and other drawbacks, the paper offers wireless communication line based on the operating system of error prevention. The system can accurately detect...
Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is required part of the key management. Among of key revocation schemes, the KeyRev is securer than previous schemes, because it depends on using session...
Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message formats, communication protocols, and security policies and so on. Therefore, it is a big challenge to design and implement the configuration and management...
This paper imports the concept of domain to design a resource locating model with local domain first based on Kademlia protocol, which is abbreviated to LDF-KAD, to refer the small world phenomenon and the characteristic of localized dataflow first on the Internet. The LDF-KAD model includes two layers structure that are super node layer and general layer. And super node layer consists of all super...
Wireless sensor networks (WSNs) can be used in many applications. Object tracking is one of the most important applications. There are many researches about tracking individual object but few researches on tracking continuous object. Continuous object affects a large number of nodes so needs more communication and cooperation to track it comparing with individual object. In this paper we propose an...
Object tracking is an important application in wireless sensor network (WSN). High-accuracy and energy-efficiency are key requirements. In this paper, we propose a novel face-based object tracking protocol (FOTP), which is used to track the object with low energy consumption and high quality. FOTP combines a hexagon algorithm with face-architecture system model, which can provide precise detection...
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and transmitting sensory data, e.g., volcanic eruption monitoring or nuclear leakage detection. In this paper, having a cluster-based WSN, we present a compensation-based reliable data delivery protocol (CRDD) to collect and transmit...
While online shopping are becoming more accepted by people in modern life, cardholders are more concerned about card fraud and the lack of cardholder authentication in the current online credit card payment. This paper proposes a purchase protocol with live cardholder authentication for online transaction which combines telephone banking and online banking together. The order information and payment...
Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide...
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH)...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.