Author: Dr. Celestine Iwendi

Celestine Iwendi is a Sensor and Electronics Researcher at the University of Aberdeen, UK. He can be reached at celestine.iwendi@ieee.org

Flying Sensors Ready To Fight Crime

The Flying toy idea has improved to a new level. You can now have drones monitoring your land aerially over large swaths of land including a farm or factory. “To reduce the number of crimes, we wanted to develop a…

3D Sensing and Communication in Hazardous Places

Node positioning and deployment in hazardous places have numerous set back. In this article I intend to show the challenges that are currently been experience for wireless sensor experts. The scope covered so far on node positioning has been two-dimensional…

The Fight against Fat : WSN Effect

Obesity is a serious problem in the world today. It is a major health issue for people with a higher risk for high blood pressure, high cholesterol and diabetes as they grow older. Scientist has experimentally developed a wireless sensor…

Wireless Sensor Network for Underwater Communication

About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…

Connect or Die: Can M2M save the world?

About the presentation Iain will explore some Machine 2 Machine (M2M) applications which could help improve quality of life as well as saving time, energy and money. “Networks” will be key to making it happen, in more ways than you…

Enhanced Security Technique For WSN Nodes

Enhanced Security Technique For Wireless Sensor Network Nodes Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security…

Wireless Sensor Networks: Technology and Applications

Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…

Dennis Hong: My seven species of robot

Dennis Hong introduces seven award-winning, all-terrain robots — like the humanoid, soccer-playing DARwIn and the cliff-gripping CLIMBeR — all built by his team at RoMeLa, Virginia Tech. Watch to the end to hear the five creative secrets to his lab’s…