Results 41 to 50 of about 14,472 (239)

Nesnelerin İnterneti Teknolojisinin Biyomedikal Alanındaki Uygulamaları

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2016
Nesnelerin İnterneti, fiziksel nesnelerin bilgi paylaşıp beraberce karar verebilmeleri için onlara birbirlerini görme, duyma, düşünme, bir araya gelerek “konuşma” olanağı vermektedir.
Faruk Aktaş   +2 more
doaj  

Design of passive environmental safety monitoring system of underground coal mine

open access: yesGong-kuang zidonghua, 2014
The paper introduced a new design scheme of passive environmental safety monitoring system of underground coal mine based on ZigBee wireless networks and sensor detecting technique.
HU Xingzhi   +3 more
doaj   +1 more source

Design and implementation of a multi-mode information lamp identification card for positioning

open access: yesMeikuang Anquan, 2021
A low-power lamp identification card of multi-mode with over-voltage and over-current self-diagnosis function is designed to ensure the normal use time of miner’s lamp.
DAI Jianbo
doaj   +1 more source

AI‐Driven Revolution of Medical Robotics Across Surgical Innovation, Rehabilitation Intelligence, and Multimodal Healthcare Delivery

open access: yesMedComm, Volume 7, Issue 3, March 2026.
The figure illustrates the background, applications, limitations, and future trends of medical robotics in the context of global aging and strained medical resources. It highlights issues such as the increasing demand for healthcare due to aging populations, with a focus on applications in surgery, rehabilitation, medical examination, and assistance ...
Fanxuan Chen   +16 more
wiley   +1 more source

Design and simulation of prototype to get a soccer player’s heart rate using a wireless network

open access: yesLatin-American Journal of Computing, 2018
The goal of this project is the implementation of a simulation that gets the vital information of a soccer player’s body through Wireless Body Area Network (WBAN).
Vicente Ogoño, Carlos Angamarca
doaj  

Design of full coverage wireless communication system of working face of coal mine

open access: yesGong-kuang zidonghua, 2014
According to the needs of wireless communication of working face of coal mine, the paper analyzed advantages and disadvantages of existing wired and wireless communication technologies used in working face, proposed a design scheme of full coverage ...
WANG Shuqiang, BAO Jianju
doaj   +1 more source

Hardware Implementation of Wireless Sensor Network Using Arduino and Zigbee Protocol [PDF]

open access: yesEngineering and Technology Journal, 2016
This paper presents a designed and implemented Wireless Sensor Network (WSN) based on Arduino and IEEE 802.15.4/Zigbee standards. This network consists offour end nodes; each one is connected to an individual type of sensors (lighting, temperature ...
Mahmood F. Mosleh, Duaa SH. Talib
doaj   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

The Analyzes of PDOP Factors for a Zigbee Ground – Based Augmentation Systems

open access: yesPolish Maritime Research, 2017
This paper presents the analysis of PDOP factors for a ZigBee ground - based augmentation systems. It presents the idea of such a system followed by the results of assessment of application in Gdansk Marina.
Janowski Artur, Rapinski Jacek
doaj   +1 more source

Boundary effects optimization of ZigBee wireless location based on BP neural network

open access: yesGong-kuang zidonghua, 2014
By analyzing distribution law of localization error in underground wireless network localization area based on ZigBee technology, namely localization nodes will offset from outside to the inside of the network at the boundary, so the localization error ...
WEI Wenhui, GUO Ye
doaj   +1 more source

Home - About - Disclaimer - Privacy