The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a kind of novel alarming access scheme is proposed for the pervasive and mobile healthcare application. This algorithm makes use of the wasted bandwidth in Contention Free Period in order to reduce transmission latency of alarming packets. The performance evaluation shows that this scheme can reduce the delay time of the alarming frame, especially in handling the time-critical problem...
Wireless sensor networks (WSNs) should handle multiple sensing tasks for various applications. How to improve the quality of the data acquired in such resource constrained environment is a challenging issue. In this paper, we propose a sensor-channel co-allocation model for scheduling the sensing tasks. The proposed model considers the capability, coupling and load balancing constraints for sensing...
In fire fighting having prompt and reliable tracking and communication in case of emergency is of paramount importance. We developed an integrated positioning, sensing and communication platform for tracking first responders in urban fire fighting. A Quality of Service (QoS) enabled TDMA MAC (QT-MAC) was designed to provide a low latency and high reliability service for critical data transfer, as...
Recent technological advances in miniaturization and wireless communication have made Wireless Sensor Networks an active research field. The increasing number of multimedia and real-time applications for Wireless Sensor Networks has led to a growing interest in Quality of Service for this category of networks. In this paper, we propose a QoS-geographic and energy aware routing protocol for Wireless...
In upcoming ubiquitous environment, many real-time sensing applications will emerge. These applications show different scale and characteristics on delivery demands. The applications commonly depend on real-time understanding on data from widely distributed data sources. Also, they have highly diverse and complex delivery demands in terms of data and delay, e.g., data value ranges of interest, spatial...
Spectrum management using a radio environment map (REM) to dynamically allocate frequencies may facilitate the efficient exploitation of the spectrum in a heterogeneous environment. The overhead costs of networking radios to create the map must be balanced against the impact of a poor REM due to low quality or quantity of sensor data. To study this cost-benefit balance, simulations were performed...
In this paper we evaluate the delay and sensing performance of distributed cooperative sensing in wireless sensor networks assisting cognitive secondary operation. We propose a time division multiple access protocol to exchange sensing information among neighboring sensors, that is tunable in terms of sensing cooperation range and frequency reuse distance. Our evaluation shows that short frequency...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.