The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Design by contract and relational interface theories are powerful for specifying component-based systems. We extend these theories with real-time properties so that our technique can model component-based real-time systems. In addition, we use linear temporal logic (LTL) for specifying the invariant properties of contracts. To specify the interaction between methods in a component, and the interaction...
In recent technological advancement such as smart grid applications, security surveillance & border protection, internet of things, disaster management & other smart home applications exhilarate the deployment of autonomous, self-configured, large-scale wireless sensor networks. Efficient power conservation is crucial concerns for sensor networks to operate in the hostile environment. Therefore...
The increasing of device interoperability creates a new way to design smart houses and to support enhanced living environments having as main aim the increasing of quality of life. In this context more supporting platforms for smart houses were developed, some of them using Cloud systems for remote supervision and control. An important aspect, which is an open issue for both industry and academia,...
In a cognitive radio network (CRN), a premise for two nodes to communicate is having a rendezvous which means that they switch to the same channel simultaneously. Most existing channel hopping solutions for the rendezvous problem is for a homogeneous CRN where nodes have the same type of cognitive radio and thus can sense the same spectrum. In reality, nodes have different types of cognitive radios...
The cloudUPDRS app is a Class I medical device, namely an active transient non-invasive instrument, certified by the Medicines and Healthcare products Regulatory Agency in the UK for the clinical assessment of the motor symptoms of Parkinson's Disease. The app follows closely the Unified Parkinson's Disease Rating Scale which is the most commonly used protocol in the clinical study of PD; can be used...
Some of the most advanced functions in automated vehicles are in the parking domain, since it provides structured environments and slow speeds. As most parking garages deny GNSS reception, vehicles rely on dead reckoning or simple path-finding algorithms. To this regard, we have developed an infrastructure-based positioning system using cameras. In this paper, we present a novel approach on how to...
Wireless Sensor Networks need energy efficient protocols for communication and data fusion to consolidate data and prolong the lifetime of the network. In this paper, an adaptive hierarchical clustering and routing method has been proposed. This clustering and routing method is based on maximum bottleneck energy routing (MBER) from a node to the sink. This method favors the routes with the highest...
WSN consists of small sensor nodes with a set of processor and limited amount of inbuilt memory units for purpose of sensing various types of relevant data from any specific region of environment. Some important applications of WSN are military, machine surveillance, preventive maintenance, disaster relief operations etc. In this type of network, routing is a little bit more complex as compared to...
Wireless sensor networks (WSN) are widely used to sense and measure physical conditions for different purposes and within different regions. However due to the limited lifetime of the sensor's energy source, many efforts are made to design energy efficient WSN. As a result, many techniques were presented in the literature such as power adaptation, sleep and wake-up, and scheduling in order to enhance...
Protection of network is the most challenging issue for preventing the harmful types of attacks and poses security issue in WSN along with information security application domains. Some of the architectures and guidelines are proposed to protect Wireless Sensor networks (WSN) against different attacks done by intruders. WSN has large variety of applications that includes mass public, military and...
The world today is becoming smart in-terms of technology. Internet of Things is an enabler for smart world. However the problem with internet of Things is that they are devices which support heterogeneous methods of communication. Another problem is that the existing network is already loaded and the surge of data increase once more and more devices are connected will be enormous. In this paper we...
In WSN there is always a scope of improvement in efficient energy utilization, network lifetime. Efficient energy utilization always seems to be an important aspect in WSN's. Because of the fact that energy consumption directly effect the overall performance of WSN. Numbers of protocols are designed for enhancement of network lifetime and prevent the batteries from earlier drainage. Most of the protocols...
A network with densely deployed access points can perform better and more reliably by adapting the transmission parameters like transmission power, minimum size of contention window (cwmin), maximum size of contention window (cwmax) and transmission rate. To understand the impact of these parameters on performance of CSMA-based protocol in a multi-AP network, we are building a testbed called DAPnet...
In cooperative spectrum sensing, clustering of the sensor nodes is vastly employed in order to reduce overall energy expenditure due to reporting while preserving high detection performance. Cluster formation is especially difficult for mobile networks since the clusters immediately become invalid. In the mobile scenario, the cluster forming algorithm should take into account the total energy expenditure,...
This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop an energy-efficient protocol that involves cooperation and coordination between primary and secondary users. To satisfy certain quality-of-service requirements, users...
Existing algorithms for orienting sensors in directional sensor networks have primarily concerned themselves with the problem of maximizing the number of covered targets, assuming that target identification as a non-issue. Such an assumption however, does not hold true in all situations. In this paper, a distributed heuristic algorithm for choosing active sensors and orienting them with the goal of...
Energy consumption is major issue in any type of Wireless Sensor Network (WSN) application. The main concern of this paper is how to increase the lifetime of network in WSN application. In any WSN application, data is measured and the same is sent to the particular destination. So each node is associated with sensors and battery, the lifetime of each node is determined by battery. One of the major...
Cardinality estimation of underwater network is somewhat troublesome using terrestrial node estimation methods due to unique characteristics of underwater environment such as large propagation latency, node mobility, non-negligible capture effect, and high error rate. For this reason, a cardinality estimation method based on cross-correlation of Gaussian signals is proposed for underwater network,...
In this paper, we propose a distributed spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access (DSA) networks. PUEA is a type of denial-of-service attack where malicious users can deprive legitimate secondary users (SUs) of spectrum access by mimicking the primary transmitter. Most studies in the literature discuss how each individual SU can develop...
The paper discusses the deployment of wireless sensor networks for intra-car monitoring and control in various automotive application scenarios. Major challenges consist of enabling robust radio communication protocols for challenging environments like the car body and offering high confidence guarantees on timely data collection and quality. Simulation results are introduced and discussed for radio...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.