The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Real-time physiological monitoring of athletes during sporting events has tremendous potential for maximizing player performance while preventing burn-out and injury, and also enabling exciting new applications such as referee-assist services and enhanced television broadcast. Emerging advanced monitoring devices have the right combination of light weight and unobtrusive size to allow truly non-intrusive...
Identifying sensor holes is one of the important subjects in wireless sensor networks. Holes happen when one or more sensors are not functioning or few sensors are missing during deployment in any designated area. The presence of holes hinders the information flow in sensor networks. Different coverage models are developed and very few or no attempt was made to detect the sensor holes using game models...
In this paper, we consider the problem of measurement allocation in a spatially correlated sensor field. Our objective is to determine the probability of each sensor's being measured for improved observability; the sensor located at less correlated area should be assigned more probability. To this end, we quantify the level of correlation of each sensor through the mutual information criterion reflecting...
The problem of detecting malicious nodes in wireless sensor networks is considered. Since current security mechanisms are inadequate for wireless sensor networks, we must develop a new framework to detect malicious nodes using Zero-Sum game approach and selective node acknowledgements in the forward data path. The first few sections of the paper provide a game model with probability of cost required...
A mobile wireless ad hoc network (MANET) consists of a number of devices that form a temporary network operating without support of a fixed infrastructure. The correct operation of such a network requires its users to cooperate on the level of packet forwarding. However, a distributed nature of MANET, lack of a single authority, and limited battery resources of participating devices may lead to a...
In this paper, the issue of network topology control in wireless networks using a fully distributed algorithm is considered. Whereas the proposed distributed algorithm is designed applying game theory concepts to design a non-cooperative game, network connectivity is guaranteed based on asymptotic results of network connectivity. Simulations show that for a relatively low node density, the probability...
Computing technology is radically changing the manner in which we work and communicate with computers. ubiquitous virtual reality (U-VR) has been researched in order to apply the concept of virtual reality and its technology into ubiquitous computing. In this paper, we analyze past research on ubiquitous virtual reality and find future research direction.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.