The Flying toy idea has improved to a new level. You can now have drones monitoring your land aerially over large swaths of land including a farm or factory. “To reduce the number of crimes, we wanted to develop a…
Author: Dr. Celestine Iwendi
Celestine Iwendi is a Sensor and Electronics Researcher at the University of Aberdeen, UK. He can be reached at celestine.iwendi@ieee.org
3D Sensing and Communication in Hazardous Places
Node positioning and deployment in hazardous places have numerous set back. In this article I intend to show the challenges that are currently been experience for wireless sensor experts. The scope covered so far on node positioning has been two-dimensional…
The Fight against Fat : WSN Effect
Obesity is a serious problem in the world today. It is a major health issue for people with a higher risk for high blood pressure, high cholesterol and diabetes as they grow older. Scientist has experimentally developed a wireless sensor…
Wireless Sensor Network for Underwater Communication
About the presentation Although, attenuation in Electromagnetic (EM) wave propagation underwater is high at high frequencies, the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band.The aim of this paper…
Connect or Die: Can M2M save the world?
About the presentation Iain will explore some Machine 2 Machine (M2M) applications which could help improve quality of life as well as saving time, energy and money. “Networks” will be key to making it happen, in more ways than you…
Enhanced Security Technique For WSN Nodes
Enhanced Security Technique For Wireless Sensor Network Nodes Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security…
Efficient System And Localisation of Faulty Nodes
This gallery contains 1 photo →
Wireless Sensor Networks: Technology and Applications
Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…
Internet Of Things: The Bridge To Delay Tolerant Networks
The term Internet of Things was first used by Kevin Ashton in 1999. The concept of the Internet of Things first became popular through the Auto-ID Center and related market analysts publications. Radio-frequency identification (RFID) is often seen as a…
Dennis Hong: My seven species of robot
Dennis Hong introduces seven award-winning, all-terrain robots — like the humanoid, soccer-playing DARwIn and the cliff-gripping CLIMBeR — all built by his team at RoMeLa, Virginia Tech. Watch to the end to hear the five creative secrets to his lab’s…