The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet application. However, unacceptable VoIP performance in the presence of coexisting traffic from other applications is still one of the major problems standing in its development way. For this point, in this paper, a novel adapted adjustment packet segmentation method is proposed to...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
This paper concerns a robot system fit for detecting mine disaster information on the basis of the working principle of detecting robot system. It introduces in details the structure of the system; the technologies of passing through obstacles, obstacles avoidance by using sensors; the collection of information and wireless transmission modules, including gas sensors, temperature sensors, network...
This paper studies the design of hardware system and implementation of program algorithm for emotion robot, then focuses on the specific of wireless communication subsystem and related key technique.
This paper maps channel codes at the application layer to data-partitioned video so that more important compressed data are protected in a closed-loop communication scheme. In particular, window-growth rateless codes are a priority-scalable form of Forward Error Correction that also provide incremental protection to streamed video. The paper introduces a detailed scheme for achieving this according...
A lot of on- site management works are involved in the process of cluster project management, especially the treatment of sudden accidents which would produce plenty of knowledge and experience. As cluster project on-site management spots change frequently, knowledge produced by mobile workers in the process of on-site management is hard to be saved into the knowledge repository on time. It may cause...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
ZigBee/IEEE 802.15.4 was created to address the market need for a cost-effective, low complexity wireless networking solution that supports low data-rates, low-power consumption in application of short range. In our design, the industry-leading CC2420 from Texas Instruments (TI) is the key single-chip RF transceiver compliant with ZigBee/IEEE 802.15.4. By modifying and trimming the ZigBee stack, a...
Nowadays, Sensor network is extensively practical in numerous fields including general engineering, agriculture and environmental monitoring, health monitoring and surgery [1]. Sensors are designed as increasingly efficient and Miniature. As a matter of fact, the most important factor in the design of RF communications is the size of the antenna [2]. In fact, Miniaturization will be subject to steady...
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communication capabilities. Wireless Sensor Network (WSN) is a promising data mining solution for precision agriculture. Instrumented with wireless sensors, it will become available to monitor the plants for real time, such as air temperature, soil water content, and nutrition stress. This real time information...
In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
The new Internet terminals are at the same time mobile and multihomed since they are able to change their point of attachment to the network, and embed several network interfaces. Each one can be attached to a different network. Multihoming and mobility are generally considered as two separate concepts and thus are handled by different protocols. Nontheless, mobility and multihoming share the same...
Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper ,two type of Symmetric encryption algorithms introduced, they are 1. UMARAM 2. IMAkey Algorithm. These two algorithms a new symmetrical encryption algorithm is...
With the construction of economic and ecological zone around Poyang lake, aquatic vegetation monitoring plays an important role in promoting economic and ecological zone construction. Research on aquatic vegetation monitoring technology based on wireless sensor network (WSN) is a novel topic. However, this method is able to solve the propagation delay, floating node mobility, and high error probability,...
In the recent years, the wireless technology would have known an exponential growth, which has an impact on developing and improving the field of telecommunications beyond the means of transmission wire to the radio frequency communication. The Wireless Sensor Network (WSN) is enrolled in this context. It's a collection of component (nodes) organized into a cooperative network. The main components...
Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld...
In order to achieve the best performance of a Wireless Sensor Network (WSN), it is a must to provide a challengeable routing algorithm , which consumes less power and allows more data collection. In this paper we have considered a WSN with mobile sinks and it is considered that the router follows the basic location update algorithm with traffic awareness. We show the performances of a router under...
A printed monopole antenna with microstrip-fed Sierpinski fractal geometry for dual wideband application is presented. The operating bands are adjusted with the design of modified Sierpinski triangle (radiating patch), ground plane and scale factor used to create a fractal shape. The simulated 10 dB (VSWR 2:1) reflection bandwidth for first resonant frequency is 60% (1.47 GHz2.7 GHz). It covers GPS,...
Saving energy and prolonging network lifetime are key problem of wireless sensor networks (WSNS). In this paper, Maximum Lifetime data gathering in WSNS is considered, in which the WSNS is consists of a collection of aggregation trees together with the number of rounds each such tree which is required to be small, given the limited computation and communication resources of sensor nodes. We describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.