The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to resolve the problems of city street lamp control and management, a street lamp clustered-control system based on wireless sensor and network (WSANs) is proposed in this paper. In the system, the related information of vehicles running on the road will be detected by the sensors deploying along the both side of the road, and then the sensing data will be passed to the actuators being equipped...
The role of wireless grids for distributed coordination and their suitability for sustainable cultural self preservation was assessed through a series of focus groups conducted in cooperation with a Native American Nation. After providing contextual information and definitions for key concepts in our research (wireless grid technologies, indigenous knowledge and the right to culture preservation in...
According to the feature that normal data and abnormal data in wireless sensor networks have no significant difference, this paper proposes intrusion detection model based on D-S evidence theory. Intrusion detection model views the standard deviation between data flow and historical data of each sensor as intrusion detection feature value, and then all these values treated as a group of data will...
RSSI is widely used to measure the distance in the location of wireless sensor network. There are random errors and outliers in the RSSI signal. Usual algorithms cannot be used to delete the influence of the mixed errors. A location method is proposed for which removal of RSSI ranging error mixed in this paper on the analysis of error. The proposed method can delete outliers and filter random errors,...
In Wireless telecardiology applications, an ECG signal is often transmitted without any patient details which are often supplied separately as clear text. This allows the possibility of confusion of link between signal and identity (for example, with wireless signal collision attacks). ECG data transmission can be more robustly tied to either patient identity or other patient meta-data if this meta-data...
In order to detect various kinds of malicious attacks in wireless sensor networks we proposed a Trust Model based intrusion detection scheme which meets the efficient lightweight and flexible property in this paper. It makes use of some nodes with high trust degree to monitor the whole cluster decreasing the huge power consumption and prolonging life of the whole networks. We propose an algorithm...
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of robust security architecture able to cope with these threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. In this paper, we designed a framework of intelligent transport system. The main task of the road condition information...
A multi-agent system (MAS) is a system composed of multiple interacting intelligent agents. Multi-agent systems can be used to solve problems which are difficult or impossible for an individual agent or monolithic system to solve. In this paper, we propose a security system based on multi agents and wireless sensors to secure the buildings and faculties of a University campus.
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.