The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A lot of changes in the use of technology in the classroom have happened over the past few years. The prediction in the future is that our reading could be mainly digital, and e-readers are one of the emerging technologies aimed at digital reading. There is currently a huge acceptance of e-books for pleasure reading, however there is now shift to e-textbooks and their promise of notable cost savings...
Wireless Sensor Networks (WSNs) have become an important means of gathering environmental and physical information from a wide range of areas. WSNs could be used in underground, aboveground and underwater applications. In this paper, we focus on underwater transmission. One of the main limitations of WSNs is the power consumption and short lifetime of the sensors. In this paper, we propose a new solution...
Rapid development of mobile and wireless technologies pointed to the potential in using the mobile channel as a supplement to increase the usage and accessibility of e-Government services. The unique proposition of the mobile channel and its emerging technologies also offered unprecedented opportunities for the Government to provide timely, personalised and innovative e-services which is not possible...
Multi-File dissemination through wireless communication has attracted considerable attentions in recent years, especially when Device-to-Device (D2D) communication is developed to support peer-to-peer file transmission. To decrease the total delay, the authors in [1] proposed a cluster-based D2D network in which files are transmitted from the BS to several cluster-heads, and then shared inside each...
This paper presents a solution to resolve the interference problems between the Wi-FiTM and BluetoothTM wireless technologies. A new channel selecting approach is being used to select the frequency channel. The signal strength in a channel is assessed, and that value is used to select the channels to send data without interference. Thus we are trying to establish true "Coexistence without Compromise"...
Received signal strength indicator(RSSI) is considered as a good estimator of link quality and is also used to estimate the range between nodes in WSN. This paper analyzed the multipath effects on accuracy of range estimation using RSSI. Experiments are carried on in different environments. Through the analysis of experiments results, we can draw the conclusion that the estimation accuracy is getting...
Wireless networks are prone to identity based spoofing attacks and tend to degrade network performance. Received Signal Strength (RSS) spatial correlation is usually used for detecting and localizing spoofing attacks. This cannot be applied to environments where RSS value is not stable and varies with distance. This approach is also not desirable for accurate localization of multiple adversaries....
In this paper, the problem of uplink user association in small cell networks, which involves interactions between users, small cell base stations, and macro-cell stations, having often conflicting objectives, is considered. The problem is formulated as a college admissions game with transfers in which a number of colleges, i.e., small cell and macro-cell stations seek to recruit a number of students,...
Localization algorithm is an important and challenging topic in today's wireless sensor networks (WSNs). In order to improve the localization accuracy, a weighted centroid localization algorithm based on least square to predict the location of any sensor in a WSNs is proposed in this paper. The proposed algorithm proposes a Least-Square-based weight model which can reasonably weigh the proportion...
Motivated by the recent advances on internet of things (IoT) and the importance that location information has on many application scenarios, this article offers references to theoretical and localization-algorithmic tools that can be utilised in connection with IoT. We develop this discussion from basic to sophisticated localization techniques covering also some less-intuitive notions of localization,...
Global navigation systems and location-based services have found their way into our daily lives. Recently, indoor positioning techniques have also been proposed, and there are several live or trial systems already operating. In this paper, we present insights from MazeMap, the first live indoor/outdoor positioning and navigation system deployed at a large university campus in Norway. Our main contribution...
Personal Communication Services refers to a wide variety of wireless access and personal Mobility Services provided through a smaller terminal with the goal of enabling communication with a person at any time, at any place, and in any form. More and More Smart Phones compact in size, lightweight, OLED devised, high-resolution touchscreens, engineered with various mobile operating system such as google's...
Job checkpointing is a common technique for providing fault tolerance in grid computing environment. The effectiveness of checkpointing depends on the selection of the number of checkpoint interval and the duration of checkpoint interval. Fluctuating checkpointing interval can delay job execution. In this paper, a new fault-tolerant job scheduling algorithm based on checkpointing technique is presented...
In this paper, the concept for a radio frequency identification (RFID) enabled student workbook is discussed and a prototype system developed. The workbook is a question-answer notebook in traditional paper format in which hand written solutions to student assignments are written. An embedded RFID tag in the workbook is then used for the student to store his/her solution to the attempted assignment...
VANET is used to create a mobile network that is based on mobile vehicles such as cars. It is a sub category of MANET. It allows every participating vehicle into a wireless node, allowing it approximately 100 to 300 meters of each other to connect and in turn, create a wide range network. In this network vehicles can join into one another so that a mobile internet is created. It is used for ITS (Intelligence...
The acquired images in real time scenario are mixed in most cases. The separation of these mixed images is very critical since the number of components mixed and the pattern of mixing are unknown. With these unknown parameters, BSS (Blind Source Separation) plays a vital role in separation of the image mixtures. ICA, one of the widely used techniques of BSS provides better separation by finding the...
In dynamic topology of the MANET's nodes are having the high mobility in nature. Because of the dynamic nature of nodes very difficult to find the exact location of node in network for data delivery. Here we proposed that to find the exact location of node and ensure the data delivery to destination. In existing system, the location aided routing mechanism where used to find location of node. In this...
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify,...
This paper addresses Concatenation coding scheme for Multicarrier Direct Sequence Code Division Multiple Access (MC DS CDMA). It is to support high capacity & utilizing less power among all sub channels. While using Multicarrier Code Division Multiple Access (MC CDMA), it only spreads codes in frequency domain, but main disadvantage is no code orthogonality. MC DS CDMA Signal is generated by serial-to-parallel...
IEEE.802.15.4 based ZigBee will play an vital role in the future of different fields of wireless communication due to its long battery life and less power consumption. The RSSI of radio signals used to estimate the distance between ZigBee nodes and it does not require any hardware additionally other than simply a radio transceiver. In my study, I analyze the importance of RSSI(Received signal strength...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.