The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints...
A major advantage of wirelessly powered devices is the use of wire-free and sometimes battery-free nodes that can operate for extremely long times. However, to achieve infinite network lifetime a set of chargers is needed to periodically transmit energy to the nodes through the emission of RF signals. In this paper, we study the problem of finding the optimal number of chargers so that a group of...
Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide...
Devices and methods for interaction with a computer do not change very often. However, with technology advancements, solutions for new ways of human-computer interaction are possible. Especially for physically disabled users, solutions for contactless interaction with a device promise new possibilities for independent computer use and management. In this study a solution for a contactless interaction...
The problem of searching for hidden or lost objects (called targets) by autonomous smart robots in an unknown environment arises in many applications, e.g., searching for and rescuing lost people during incidents in high-rise buildings, searching for fire sources and hazardous materials, searching for safe paths through the rubble during an emergency evacuation etc. Until the target is found, it may...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
While wearable devices have been the buzzword inthese days, they are still in the infant market stage. Thoughdemand for wearable devices has skyrocketed, the early abandonmentof devices become an important issue. Many studiesexamine the usage of wearable devices with user survey. However,it is essential to look at the real behavior of wearable users howand why wearable users enjoy or abandon devices...
Smart home is a house that uses Internet of Things(IoT) to monitor the environment, control the electric appliances and communicate with the outer world. Smart home is a complex technology, but a developing one. A smart home automation system has been developed primarily because in today's time and world, everybody's in a surge and wishes to screen and get to everything without being there physically...
Skills performance assessment in physical therapy is mainly evaluated by observational means from an expert. Recent advancements in technology enable the creation of smart instrumentation that can aid trainees and evaluators during the learning and evaluation process. Towards this goal, this paper presents the design and development of a sensorized glove for measuring movement and interaction forces...
DNA sequencing is quickly evolving into a mobile technology with a need for power efficient compute services. This paper describes such a service in the form of a VLSI base caller chip for nanopore-based 3rd generation DNA sequencers. The base caller achieves a throughput equivalent to 10 human genomes per hour with a power consumption of 200 mW. This represents a 100× power reduction over a general-purpose...
This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven...
A search and localization algorithm is used to localize a ground based moving target using an Autonomous Air Vehicle (AAV). It is assumed that the target has RF emissions. AAV utilizes Global Search (GS), Approach Target (AT), Locate Target (LT) and Target Reacquisition (TR) modes to search the entire parts of a desired area, approach the detected target, locate it, and even find the target that stop...
One of the crucial challenges in the recently emerging Internet of Things (IoT) applications is how to handle the massive heterogeneous data generated from a large number of resource-constrained sensors. In this context, cloud computing has emerged as a promising paradigm due to its enormous storage and computing capabilities, thus leading to the IoT-Cloud convergence. In such a framework, IoT devices...
Efficient spectrum sensing is a crucial function in cognitive radio (CR) networks and that enables secondary users (SUs) to detect primary user (PU) activities and make a decision to utilize vacant channels in the spectrum. Cooperative spectrum sensing, which is a prominent sensing approach in the literature due to its ability to increase sensing accuracy, is based on sharing information about channel...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
The Classroom Attentiveness Classification Tool (ClassACT) is a system designed to monitor student attentiveness in a variety of instructional phases within the learning environment: lectures, group work, assessments, etc. By collecting information about the user, the user's environment, and the device itself via the various sensors built in to the tablet, processing the data, and then passing it...
In many industries (such as pharmaceuticals, beverage industries, etc.), bottles are required to be filled up with a pre-determined amount of liquid. Implementing systems using relay logic control can cause them to be inflexible. Programmable Logic Controllers - PLCs - are more flexible in automating various processes, since the behavior of the system can be changed without changing the electrical...
Computer programming skills are a critical necessity for today's students, but maintaining student interest in programming and engineering courses is challenging unless the theory is accompanied by engaging, hands-on applications. Additionally, many schools, especially those in underprivileged areas, lack the resources and personnel to develop or implement such applications. The Southwestern Indian...
In order to improve the safety factors of MSV (Manned Submersible Vehicle) and shorten the pilot training cycle, the real hardware and software system combine with the modelling and simulation calculation of its sensors, equipment, actuators submersible ontology and motion status in deep sea environment, realizing the semi physical simulation system. First of all, the system model is built and hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.