The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Increasing computing power efficiency has become more important as more applications are moving to mobile platforms, which tend to have a limited power available. Being able to perform a wide variety of computations efficiently is especially important for power constrained embedded applications such as unmanned aerial vehicles (UAVs), which may not be able to send the data out for processing and must...
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). To date, related works address the problem by assuming a straight‐line intrusion path and a Boolean sensing model. However, a straight‐line intrusion path is often not the case in reality, and the Boolean sensing model cannot resemble a real‐world sensor precisely. Results based on...
FPGA analytical models, that express the relationship between architectural parameters (e.g., LUT size, cluster size, inputs per cluster, etc) and performance (e.g., logic utilization, critical path delay, power, etc), have been designed mainly for island-style FPGAs targeting a general application. Therefore, most analytical models will produce inaccurate results when heterogeneous FPGA architectures...
This paper studies the mobile robot tracking problem in a wireless sensor network consisting of several sensor nodes collecting sensor information and transmitting data packets in order to determine a mobile robot's location at real-time. This paper proposed an intrusion detection algorithm based on collecting light signal and a counter-based routing protocol integrated with Automatic Repeat reQuest...
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). It is defined as the mechanism to detect moving intruder(s) by single-sensing or jointly-sensing detection. To date, related works focus on the problem of network configuration for detecting intruder(s) within a pre-specified time/distance threshold by assuming a straight line intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.