The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a highly linear current-controlled ring-oscillator (CCRO) circuit for current-to-frequency ADC in smart sensing. The proposed CCRO topology employs a distributed regulation of the oscillator rail voltage for lowering its sensitivity with respect to the controlling input current. The use of a current conveyor for this purpose ensures the stability of the current-steering control...
Formal localized reactive model of Subnet-based Failure Recovery of Sparsely Connected Network for monitoring less critical areas of border is presented in this paper to reduce monitoring by soldiers. It involves Wireless Sensor and Actor Networks (WSANs) partitioned into subnets. The topology of the subnets is sparsely connected in less critical areas where fewer sensors and actors are required....
Recently significant improvement in wireless sensor and actor networks has been made due to the increased interest of researchers. But still there is a need to overcome many operational challenges particularly in safety-critical and mission-critical large-scale applications. We propose a model of Subnet-Based Backup Assigning (SBBA) algorithm in wireless sensor and actor networks which assumes partitioning...
Visual management for industrial wireless sensor network not only requires quickly data process, but also the higher interact ability of graphical interface. However, the visual management has exists now which are just publish the equipment and relationship by list, they are little relate to simulated reality topological distribution. Based on research the topological structure of ISA100.11a protocol...
The paper presents a mathematical statement of the problem of finding a rational topology of wireless sensor networks (WSN) using unmanned aerial vehicles (UAVs), which consists of problem of sensor localization in monitoring zone and problem of UAV relays localization in the space for the organization of connected network with desired characteristics.
As the recent development of low power communication techniques, IoT applications have been implemented using various communication method. Among them, the Bluetooth Low Energy(BLE) which has been widely adopted in the most of smartphone plays a major communication channel for the range of industrial applications as well as the personal applications. However, since BLE supports only the star topology,...
This paper introduces a new way of monitoring critical parameters directly inside circuits. It describes a flow able to transform a circuit into a test vehicle: the concept is called topological exchange. The principle is to remap existing standard cells to create monitoring functions. The flow is detailed through a specific example of oxide thickness monitoring and the method is validated with post-layout...
FlexRay is a new high bandwidth communication protocol for automotive systems, providing time-triggered transmission of periodic frames in a static segment and priority-based scheduling in a dynamic segment. The analysis techniques are required to compute bounds for the FlexRay frame response times, before the standard is used for safety and time-critical applications. In this paper, we introduce...
Body Area Networks (BANs), targeting everywhere anytime health monitoring, operate in license-exempt frequency bands. They require a cross layer design that jointly considers the requirements of (1) access delay to the medium and (2) packet delivery ratio (PDR). In this paper, we experimentally evaluate the PDR of a BAN under static and dynamic scheduling schemes. Investigations show that static multi-hop...
Wireless mesh network management is more complex than wired network management mainly because of network resource constraints and link quality variability. Therefore, monitoring solutions for wired networks do not achieve satisfactory performance in mesh networks. There are several techniques and tools proposed in the literature for wireless mesh network management. Each of those techniques and tools...
Future network should focus more on what users want to get from the network rather than where users want to get through the network. Distributed content network equipped with storage and streaming server could provide effective and efficient content service to the users. We propose the hierarchical content management method to find the optimal content server in consideration of load balancing over...
Recent developments in wireless sensor networks have ushered in novel ubiquitous computing applications based on distributed large-scale data acquisition and interactive interpretation. However, current WSNs suffer from lack of effective tools to support large network deployment and administration as well as unavailability of interactive visualization techniques required to explore and analyze captured...
Wireless Mesh Network (WMN) is a self-configuring, self-organizing and self-healing communications network in a mesh topology. Every node collaborates on establishing routing path to communicate with each other or use the Internet services. Even though WMN increases reliability and provides high bandwidth, selfish or malicious nodes may disrupt the network-wide collaboration and abuse the available...
Challenges posed to border monitoring are diverse and dynamic. They cover widely varying environments and mutate as the adversaries adapt to improved monitoring and response tactics. The capability to counter the threats is in the intelligence agents possess via human intellect and the tools provided to the agents to bolster their knowledge and response plan. In this paper we present the CoyoteUGStrade...
This paper discusses two proposed star architectures for systems based on the controller area network (CAN) protocol aim to improve CAN's error containment and fault tolerance for general distributed embedded systems and safety-critical applications.
In this paper, we present a new technique to improve the reliability of H-tree SRAM memories. This technique deals with the SRAM power-bus monitoring by using built-in current sensor (BICS) circuits that detect abnormal current dissipation in the memory power-bus. This abnormal current is the result of a single-event upset (SEU) in the memory and it is generated during the inversion of the state of...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.