Results 21 to 30 of about 757 (176)
Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks. [PDF]
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet‐of‐Medical‐Things (IoMT).
Jan SU +5 more
europepmc +2 more sources
An Image Compression Algorithm Based on Sparse Sampling for Wireless Multimedia Sensor Networks
Wireless multimedia sensor networks introduce multimedia information such as images, audio, and video on the basis of traditional wireless sensor networks, which can achieve more fine-grained monitoring applications.
Jian GUO +4 more
doaj +1 more source
EN‐DADA: Node task assignment algorithm for energy harvesting wireless multimedia sensor networks
A model of directed sensor nodes with solar energy harvesting is introduced in this paper, where the energy of such nodes is no longer limited to batteries and the directed sensing area enables better frontal tracking. On this basis, we propose a distributed algorithm for directional task assignment.
Chong Han +3 more
wiley +1 more source
SIS‐AODV consist of Ant Colony Grey Wolf Optimisation (ACGWO) over AODV algorithm to improve network performance while implementing security algorithm over MANET. Analysis results shows maximum performance with the PDR of 98% and throughput of 85%. In addition, end‐to‐end delay is reduced up‐to 25% and routing overhead decrease up‐to 20%. Abstract In a
Anita R. Patil, Gautam M. Borkar
wiley +1 more source
Building Campus Sports Information Learning Platform Based on Intelligent Sensor Network
In the present era of rapid network growth and in the face of growing national power rivalry, education, as the cornerstone of a nation and a national prosperity symbol, has been considered by countries around the world as an important indicator of comprehensive national power.
Chao Chen +4 more
wiley +1 more source
Secure Analysis for IIOT Systems Using Hyperchaotic Image Encryption
Like edge computing, intelligent cameras and image sensors are widely used in the Industrial Internet of Things (IIOT), including design and finished product quality inspection. However, the images generated by these sensors are constantly at risk of information leakage and privacy violations in the IIOT.
Haini Zeng, Qiping Zou, Xiaolong Xu
wiley +1 more source
Research on wireless sensor network video surveillance system is a hot field of media classroom education and teaching. Based on the 5G communication network theory, this paper constructs a wireless sensor network video monitoring system for multimedia classroom education and teaching, systematically analyzes the new distance education model under the ...
Wenping Wu, Biao Lu, Gengxin Sun
wiley +1 more source
XL-WMSN: cross-layer quality of service protocol for wireless multimedia sensor networks [PDF]
Energy conservation has been the prime motivation behind the design of conventional protocols for wireless sensor networks (WSNs). However, recent trends toward high data rate multimedia communication over WSNs demand traffic- and deadline-aware content delivery with minimum energy expenditure.
Hamid, Zara, Bashir, Faisal
openaire +1 more source
In the Internet age, the challenge to traditional physical education classroom teaching has also reached its peak. Traditional physical education teaching has little effect on students. The proposal of flipped classroom can be said to greatly improve the dilemma of traditional physical education classroom teaching. This article is aimed at studying the
Meng Zhao, Rashid A Saeed
wiley +1 more source
A Novel Extraction Method for Wildlife Monitoring Images with Wireless Multimedia Sensor Networks (WMSNs) [PDF]
In remote areas, wireless multimedia sensor networks (WMSNs) have limited energy, and the data processing of wildlife monitoring images always suffers from energy consumption limitations. Generally, only part of each wildlife image is valuable. Therefore, the above mentioned issue could be avoided by transmitting the target area.
Liu, Liu, Wang, Zheng, Zhang
openaire +2 more sources

