Results 121 to 130 of about 6,071 (191)

The virtual toxicology service: wearable head-mounted devices for medical toxicology. [PDF]

open access: yesJ Med Toxicol, 2014
Chai PR   +5 more
europepmc   +1 more source

Introduction of SG-BAN in IEEE 802.15 With Related Discussion

open access: closed2007 IEEE International Conference on Ultra-Wideband, 2007
Body area networks (BAN) can provide a wide range of applications including medical support, healthcare monitoring, and consumer electronics with increased convenience or comfort. To harmonize with the strong demands from both medical and healthcare societies and ICT industries, a study group referred to as IEEE 802.15.BAN (SG-BAN) was formally set up ...
Huan-Bang Li, Ryuji Kohno
openalex   +2 more sources

Analysis of WWW Performance in IEEE 802.15 Based Systems

open access: closed2007 8th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, 2007
This paper analyzes the Web traffic performance over Bluetooth enabled devices. Bluetooth technology through its considerable functionality and flexibility is incorporated in many modern personal electronic devices, offering reliable and sufficient wireless connectivity.
Pero Latkoski, Liljana Gavrilovska
openalex   +2 more sources

Pre-RAKE diversity combining for UWB systems in IEEE 802.15 UWB multipath channel

open access: closed2004 International Workshop on Ultra Wideband Systems Joint with Conference on Ultra Wideband Systems and Technologies. Joint UWBST & IWUWBS 2004 (IEEE Cat. No.04EX812), 2004
Since ultra wideband impulse radio (UWB-IR) systems can resolve many paths and are thus rich in multipath diversity, the use of the RAKE diversity combining is very effective. In the RAKE diversity combining, the bit error rate (BER) is improved with the increase of the number of fingers.
SHUNSUKE IMADA, Tomoaki Ohtsuki
openalex   +2 more sources

Detection of Greedy Behavior in WSN Using IEEE 802.15 Protocol

open access: closed2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems, 2014
On a major security issue in WSN is the availability as these networks suffer from Denial of service Attacks. One of the most aggressive DoS attacks in WSN are greedy behaviors. This attack consists in increasing the bandwidth by a compromised node at the expenses of other nodes by not respecting the access network procedure.
Lynda Mokdad   +2 more
openalex   +2 more sources

Tracking UWB monocycles in IEEE 802.15 multi-path channels

open access: closedThe Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003, 2004
This paper analyzes the variance of the timing error at the output of the timing error detector as a result of multipath effects. While G. Fock, et. al., (2001) and others have examined similar channel impairments on spread spectrum CDMA systems employing rake receiver with early-late timing detector, it is not known how severe multipath will affect ...
Chee-Cheon Chui, Richard A. Schultz
openalex   +2 more sources

2.45-GHz-CMOS temperature compensated multi-controlled oscillator for IEEE 802.15 wireless PAN

open access: closedAnalog Integrated Circuits and Signal Processing, 2006
A 2.45 GHz Multi-Controlled Oscillator (MCO) has been designed using a CMOS 0.28 ?m STMicroelectronics technology for use in frequency synthesizer and open loop FSK modulation circuit in multi-band IEEE 802.15 Wireless Personal Area Network (PAN) applications.
V. Cheynet de Beaupre   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy