Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The development of a wearable recording system to acquire L-glutamate (L-Glu) neurotransmitter signals from the central nervous system (CNS) was reported. The system utilized miniature (50×100 μm2) implantable amperometric sensors fabricated on a flexible polyimide substrate to minimize in vivo tissue damage. Selectivity to L-Glu was improved through implementation of self-referencing electrode and...
Recently more and more sensor networks are powered by diverse environmental energy surrounding the deployment field. The charging process of such nodes results in intermittent network topology, through which it is very hard to deliver packets efficiently. CTP is a de facto routing protocol for wireless sensor network applications driven by the TinyOS. It constructs and maintains a routing tree by...
Generally, estrus of cow can be observed from its body such as swollen vagina, slime and mydriasis or its behaviors such as bellow out, ride piggyback with the other or let the other rides piggyback. These symptoms will only occur within 18 hours. To access the best result, therefore, the insemination should be processed during on 9–18 hours of that period time. Therefore, this project proposes the...
Positioning is the foundation of wireless sensor applications. An attack method of multiple counterfeit identities in sensor network localization is proposed. At different times, attack nodes counterfeit different identities nodes, sending false reference coordinates, which leads to the failure of positioning. In the paper, we establish a normal localization system, which can accurately calculate...
Message authentication codes (MACs) are classically used for preventing unauthorized and corrupted messages from being forwarded in a network. However, inherent energy limitations of wireless sensor networks (WSNs) make the application of most of the state-of-the art MACs unaffordable due to their large computation overhead. Therefore in this paper, in order to cope with this challenging concern,...
This paper proposes a low energy-consuming cluster-based algorithm to protect data integrity and privacy named ILCCPDA, which can dynamically elect cluster head by LEACH clustering protocol and take the simple cluster fusion approach to reduce the data transmission, thus reducing energy consumption. ILCCPDA can detect data integrity by adding homomorphic message authentication code and take the random...
The Agents of Things (AoT) is a novel concept that unites the physical and cyber worlds and enables things to intelligently interact and communicate with each other. The concept opens new areas for researchers to develop or improve applications for value-added services to humans. It entails analyzing the hardware and software spectrum of computing resources' specifications to implement a comprehensive...
The use of Wireless Sensor Network (WSN) has been widely used in many fields, especially for environmental monitoring. This present study attempts to apply the WSN technology into the retail industry or the modern market. Utilizing barcode scanning technology as a medium of sensors that are commonly used, combined with a microcontroller and XBee modules as data transmission module. This study adds...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
To achieve security in wireless sensor networks, it is needed to encrypt and authenticate message sent between sensor nodes. Key management is a very critical problem. However, as sensor nodes are resource-constrained, achieving key agreement is nontrivial. In this paper, we propose a key pre-distribution scheme based on multiple key spaces. The scheme combines the advantages of BIBD and Blom. Detailed...
Distance education that is supported traditionally through technology has transitioned from e-learning to mobile learning because of the ubiquitous presence of the Internet, as well as rapid advancements in Information and Communication Technology (ICT) and recent improvements in learning technology. With the coming and popularization of mobile devices and ubiquitous computing, the idea of e-learning...
The end-to-end packet delay is important for the application of wireless sensor networks. Reducing unnecessary and redundant handshake frame is considered as a promising way to minimize the end-to-end delay. Here, a protocol named compressed handshake media access control (CH-MAC) is p-resented by control frame compression with implicit RTS to improve delay performance. Simulation results show that...
Current methods in treating chronic wounds have had limited success in large part due to the open loop nature of the treatment. In turn, we have created a localized smart wound dressing platform that will allow for real time data acquisition of oxygen concentration at the wound site. This will serve as the first leg of a feedback loop for a fully optimized treatment mechanism tailored to the individual...
The Internet of Things and the Web of Things have focused on context awareness as a central issue in defining complex autonomic systems that rely on various layers, including devices, communications and applications. The spread usage of mobile devices that allow users to generate and to access distributed data makes it extremely important to organize the forwarding and gathering of such data in a...
Wireless Multimedia Sensor Networks (WMSNs) have recently attracted more attention and have contributed to new potential wireless sensor network (WSN) applications such as border surveillance, battlefield monitoring, target detection, target tracking and habitat monitoring. WMSNs carry heterogeneous traffic with different urgency and quality of service (QoS) requirements. While the need to minimize...
Wireless Sensor Networks (WSN) and related technologies have the important impact nowadays. These technologies have variety of applications, and they are key enabling technologies of IoT (Internet of Things). ZigBee standard is the most common WSN technology. Its importance and expansion, as a widely used technology in many different areas, influence the importance of including ZigBee technology in...
Any common methodology for functionality research in the field of communication systems engineering is network simulation. There is always the overriding worry when utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is important to recognize the particular strengths and also flaws of such simulators. There are a variety of network simulators, as an illustration,...
Wireless sensor networks (WSN) refers to a group of spatially dispersed and dedicated sensors which have limited resources, bandwidth and communication capabilities. WSN have many applications like environment monitoring, health monitoring, battlefield surveillance for military etc. Due to the resource constraint and less communication power secure communications is not possible. Many key management...
The advances in the telecommunication and computer sciences have led to the emerging of several new technologies and concepts for networking and for connecting people and devices. One of these new opportunities is the possibility to access and use computers and equipment remotely. This paradigm can be used for many different purposes - from education and research to management and business tasks....
Software defined wireless sensor network can be adapted to different application needs through dynamic programming. In this paper, we propose a signal acquisition and processing wireless sensor network (SAPSN). SAPSN consists of sampling nodes, processing nodes and remote controllers. At first, the sampling node completes the local signal sampling by analog-digital conversion. Next, according to the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.