Search
Now showing items 101-110 of 220
On target coverage in mobile visual sensor networks
(
Association for Computing Machinery, Inc
, 2014 , Conference Paper)
Recent advancements in manufacturing low-cost wireless battery operated cameras has made their application in Wireless Video Sensor Networks (WVSN) increasingly more feasible and affordable. The application of robotic ...
Towards energy efficient relay placement and load balancing in future wireless networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. ...
Effective capacity of cognitive radio links: Accessing primary feedback erroneously
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
We study the performance of a cognitive system modeled by one secondary and one primary link and operating under statistical quality of service (QoS) delay constraints. We analyze the effective capacity (EC) to quantify ...
Distributed cross-layer optimization for healthcare monitoring applications
(
IEEE Computer Society
, 2014 , Conference Paper)
Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ...
Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed
(
IEEE Computer Society
, 2014 , Conference Paper)
Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Trading wireless information and power transfer: Relay selection to minimize the outage probability
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ...
Energy efficient mobile relay selection for two-hop wireless networks
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we propose a relay selection strategy for randomly distributed multiple relays. A single relay is selected for transmitting signal from a fixed source to a fixed destination which requires minimum total ...
Performance Comparison of classification algorithms for EEG-based remote epileptic seizure detection in Wireless Sensor Networks
(
IEEE Computer Society
, 2014 , Conference Paper)
Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems. Classification is the most important technique for wide-ranging ...
Outage performance of incremental relaying networks with OFDM subcarriers mapping schemes
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The scarcity of radio resources coupled with the high data rate demands in the last few years, induced incremental relaying techniques one of the most promising technologies. This is simply because it allows reaping spatial ...