The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wearable and connected health is a dominant field in the era of the Internet of Things (IoT). Indeed, Body Sensor Networks (BSNs) have been widely used for enabling many connected health applications in diverse areas including: activity recognition, elder care, sports, and rehabilitation. Although the number of transistors in an integrated circuit follows Moore's law, it does not apply to batteries...
Iraq is a developing country and so its developmental process has been stymied and often stalled, one obstacle is the lack of applying the latest technological innovations and instead relying on traditional methods. Wireless Sensor Networks (WSNs) is an emerging technology that have been utilized to make many improvements. This paper serves as a tutorial that aims at identifying some of the current...
Unmanned aerial vehicles (UAVs) have recently become a viable platform for surveillance and exploration tasks. Several commercial quadrotor aircraft have been successfully used as surveillance equipment with groups such as United States and Canadian police forces, and additional applications for this technology could include exploration of ra-dioactive/hazmat environments, naval search and rescue,...
Wireless localization using the received signal strength (RSS) can have tremendous savings over using specialized positioning infrastructures. In this work, we explore improving RSS localization performance in multipath environments by varying the transmitter's signal power and frequency. Using a theoretical analysis, we first show how selection of different signal powers and frequencies can improve...
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible, because it requires key management and additional infrastructural overhead. In this paper, we propose a method for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.