The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a step toward sustainable wireless sensing, we present a proof of concept system that uses a Plant Microbial Fuel Cells (PMFC) as a power source. To match the very low power production capabilities of the PMFC, we couple it with an ultra-low power wake-up receiver used as a trigger for sampling and transmission of the sensed value. We demonstrate that this combination, with a new, receiver initiated...
Coordination under precision demands is an important aspect of human motor performance ability. It is usually evaluated through a carefully selected set of physical exercises, which follow the same scheme: An examiner presents candidates with a task to perform, monitors their correct task execution, and manually tracks the score achieved by each candidate. However, the latter two steps impose a significant...
This paper describes a distributed wireless acoustic sensor network (WASN) platform called WHISPER that is capable of synchronous multichannel sampling at different spatial locations with a sampling clock whose relative jitter is less than 300 ns. The platform comprises up to four data acquisition modules with onboard computing capabilities, and that can form an ad-hoc Wi-Fi network allowing an additional...
An important issue faced while employing Pyroelectric InfraRed (PIR) sensors in an outdoor Wireless Sensor Network (WSN) deployment for intrusion detection, is that the output of the PIR sensor can, as shown in a recent paper, degenerate into a weak and unpredictable signal when the background temperature is close to that of the intruder. The current paper explores the use of an optical camera as...
An algorithm, Travelling Salesperson Problem for Data Collection (TSP-DC), is presented which can plan tours for collected data from sensor nodes using a mobile sink. This is the first work which can deal with multiple different data ranges and data loads for each sensor node. Linear programming is used to schedule data transmissions to different nodes to reduce the overall tour time. Simulation results...
In this paper we propose a vehicular speed learning framework that recommends best traffic load based on a particularly required latency and throughput conditions to be achieved. The framework is composed of two main layers, the base layer and two enhancement layers. The base layer aims at providing an in-vehicle wireless receiver to inform the driver about the speed limit within the area he/she is...
Recent years have seen both mobile devices become more prominent and rapid growth in video traffic across mobile networks. This trend is expected to continue with the main constraint on mobile devices being their battery life. With the growth in performance potential, users want more out of their devices which leads to issues including battery powered mobile devices not being capable of surviving...
Wireless Sensor Networks (WSNs) are playing remarkable contribution in real time decision making by actuating the surroundings of environment. As a consequence, the contemporary agriculture is now using WSNs technology for better crop production, such as irrigation scheduling based on moisture level data sensed by the sensors. Since WSNs are deployed in constraints environment, the life time of sensors...
Networked embedded software systems incorporate varying degrees of adaptation behavior to sustain their operations with acceptable quality of service (QoS), in the face of hostile external events — such as resource outages in a cloud service, road slipperiness in a car driving, etc. For instance, a highly agile cruise control system of a car may dynamically adjust its controller parameters...
In recent years, many routing protocols that take into account particular vehicular ad hoc network (VANET) characteristics such as higher vehicle speeds and mobility patterns have been proposed. Most of the existing VANET routing protocols largely neglect vehicles as obstacles in VANETs. Obstacle shadowing caused by large vehicles such as trucks or buses more negatively affects packet transmission...
For a long time, the risk of customer churn, i.e. to leave an operator, has been used as argument in favor of Quality or Experience (QoE) research. However, the understanding of how churn behavior and QoE are related is still limited. This is problematic, as customer retention and churn prediction have grown in importance in face of ever-growing competition on the telecom market. The work presented...
Nowadays, companies such as Amazon, Alibaba, and even pizza chains are pushing forward to use drones, also called UAVs (Unmanned Aerial Vehicles), for service provision, such as package and food delivery. As governments intend to use these immense economic benefits that UAVs have to offer, urban planners are moving forward to incorporate so-called UAV flight zones and UAV highways in their smart city...
As the number of devices (things) connected to the Internet (Internet of things: IoT) is growing, achieving robust security and privacy (S&P) is becoming increasingly challenging. With the heavy use of medical things (MT), the S&P in the medical domain poses a serious issue that continues to grow. Due to the criticality and sensitivity of the data in the healthcare domain, ensuring...
The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation is going to lead the health informatics industry to cloud-hoarding of medical data, control flows, and site governance. While different healthcare enterprises opt for cloud-based solutions, it is a matter of time when fog computing...
Non-invasive, environmental monitoring is being successfully utilised to improve health care outcomes for patients while allowing them to more safely and comfortably live in their homes instead of health care facilities. This promises to reduce costs and ease the health care burden for many countries globally. However, these systems are still in early stages of research and only highly skilled researchers...
With increase in size of wireless mesh networks so are problems on interference, load-imbalance, and congestion that lowers throughput significantly. Proposals to solve issues related to this problem include accurate accounting of the channel load so that traffic can be directed along calmer regions of the networks reaching destination in time. Load aware routing metrics have been proposed for this...
This paper investigates a time sharing (TS) based user pairing strategy to accommodate similar gain users in non-orthogonal multiple access (NOMA) systems, termed as TS- NOMA. A scenario is considered in which the distribution of users in a cellular area is non-uniform, such that the number of cell center users is less than cell edge users. In this case, if two user conventional NOMA (C-NOMA) pairing...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
The IEEE 802.11 MAC protocol uses Distributed Coordinated Function (DCF) as the main element to determine the efficiency in sharing the limited resources of the wireless channels in wireless local area networks (WLANs). For analyzing 802.11 DCF networks, one of the key assumptions commonly used is that every station always has a packet to transmit (saturated state). However, in practice it may not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.