The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
All IoT(internet of things) devices can establish the relationship by connecting the network between other things. Also things can catch human behaviors and analyze them to predict a person's next action from data based on the cumulative behavior patterns of people. After analyzing, things can provide services to people derived from their analysis of individualized peoples behavior patterns. The proposed...
The aging population phenomenon is more and more increasing. In this context, the elderly's behavioral analysis through the Internet of Things technologies can help to prevent Mild Cognitive Impairment and frailty problems. In particular, since movements and body motility are good indicators of behavioral changes, this work aims to define a reliable system for controlling the position and the body...
Information-Centric Networking (ICN) is receiving attention as an emerging network technology. Due to its attractive features, such as accessing content by its name, in-network caching, etc., ICN is expected to apply essentially to the Internet of Things (IoT). IoT applications typically collect a large amount of data widely distributed in various locations. For such usage, we proposed the architecture...
The vision of internet of things is to connect every object beyond the boundaries of anywhere and whenever for the provision of services from the smart home user to fourth industrial revolution. The objects in the internet of things will be more heterogeneous because of their specialty and accuracy in their domain. Now a days in the Internet of things the data and its machine understanding gets more...
Access point selection is an issue frequently faced by mobile user due to constant movement. By connecting to the best Wireless Local Area Network (WLAN) Access Point (AP), mobile users can enjoy the advantages of power consumption reduction while sustaining good communication quality. In this paper, a new approach to intelligently selecting access point in wireless local area network using Hidden...
Cognitive radio (CR) is an enabling technology for future wireless spectrum allocation to improve the use of licensed spectrum by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing no interference to incumbent communication. However, security challenges faced by CR technology are still a research topic. One of the prevailing challenges,...
Message Authentication Code (MAC) algorithms, which ensure an integrity of packet messages, play a critical role in emerging Internet of Things (IoT) environment. However, IoT devices are only with very limited storage, energy, computation power. For this reason, many studies have been conducted to achieve an optimized MAC implementations on IoT devices. In this paper, we propose a compact implementation...
With the increasing development of the IoT applications, heterogeneous wireless networks may coexist. IEEE 802.11ah and IEEE 802.15.4g are two wireless technologies designed for IoT applications. 802.11ah is primarily developed for outdoor applications such as smart city and 802.15.4g is principally developed for large scale outdoor process control applications such as smart utility network. Both...
Quantum Key Distribution (QKD) technology provides unconditional secure cryptography key sharing between two separate sites based on the laws of physics. With the shared keys, applications are able to communicate with each other in an information theoretically secure manner. We propose a method for providing secure communication that selects between QKD-based security and standard cryptography-based...
This paper proposes a random access method using grouping nodes which are located closely to decrease collisions of nodes by long delay propagation time in underwater acoustic environments. To reduce collision probability, each node selects its group, which is predetermined by a distance from the fusion center based on RSSI level, and aligns its transmission time to the farthest node in the group...
Recently, vehicle safety has become very important in the automobile industry. TPMS(tire pressure monitoring system) is also one of the vehicle safety systems. Recent studies of TPMS are proceeding in the fields of low power operation, battery-less system, and tire location registration. In this paper, we analyze the conventional tire location registration algorithms in which the simplex communication...
Due to the development of mobile communication, user demand and traffic increased, and various services were produced. With existing 3G networks, it was hard to demand these services and users' demand. Therefore, the 4G network has been developed. As evolving into 4G networks, much experimental and development software have been created. OAI is a hardware and software platform for 4G networks that...
Industrial control network is considered as a system of several interconnecting devices that can control and monitor the industrial environments. Most control networks are widely used in industries with high degree of automation where the need of real of hard real time data accuracy is highly critical for high yield and machine uptime. The control packets transmitted over these control networks consists...
Testing automotive software using Software-in-the-Loop (SiL) simulation doesn't require the hardware such as test vehicles and ECUs. Existing testing techniques based on SiL rely on manual processes because automation techniques of testing AUTOSAR components using SiL simulation have not yet been established. In this paper, we present an automated testing technique and its implementation based on...
Cloud radio access network (C-RAN) has been proposed as a core network in the fifth-gene rati on mobile communications system. The computing resources are clustered as a pool that is centralised management as a cloud. The pool provides flexible capabilities to satisfy variant demands with large scale processing. This work stands on an operator perspective to analyse a centralised management mechanism...
The Long Term Evolution-Advanced (LTE-A) standard brings together different data and voice communication technologies and allows for the integration of more versatile users and services. To meet the users' needs for high resource demand efficiently, resource scheduling algorithms become even more important, in order to balance good system performance in terms of high throughput and fairness. In this...
In this paper, we propose a real-time lane detection and tracking algorithm using a simple filter and Kalman filter to develop a Lane Departure Warning System(LDWS) that can be implemented in an embedded system. Our LDWS was realized on the I.MX6Q board, mounted on a test vehicle, and traveled about 1,000km to derive the experimental results. Experimental results show that our LDWS operates at 97%...
Recently, Advanced Driver-assist Systems (ADASs) have attracted, demonstrating the possibility that semi-autonomous driving using state-of-the-art sensors assists the drivers with more safety, convenience, and risk avoidance than controlling the car manually. ADASs work by judging the surrounding situation with the sensor data in a vehicle, but it will be possible to carry out autonomous navigation...
In this paper, we introduced Authentication trends on IEEE 802.15 Task Group 8 which aims to develop a Standard for wireless Medium Access Control (MAC) and Physical Layer (PHY) specification for Peer Aware Communication (PAC). PAC terminals which have only low power and low computational power can make a network without infrastructure using ad-hoc searching. Because of no infrastructure, there are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.