- Energy Efficient Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Mobile Ad Hoc Networks
- Context-Aware Activity Recognition Systems
- Opportunistic and Delay-Tolerant Networks
- Energy Harvesting in Wireless Networks
- Embedded Systems Design Techniques
- Security in Wireless Sensor Networks
- Underwater Vehicles and Communication Systems
- Parallel Computing and Optimization Techniques
- Wireless Networks and Protocols
- IoT and Edge/Fog Computing
- Interconnection Networks and Systems
- Anomaly Detection Techniques and Applications
- Caching and Content Delivery
- Green IT and Sustainability
- Water Systems and Optimization
- Distributed Sensor Networks and Detection Algorithms
- Network Security and Intrusion Detection
- Speech and Audio Processing
- Human Mobility and Location-Based Analysis
- Wireless Body Area Networks
- Modular Robots and Swarm Intelligence
- IoT-based Smart Home Systems
- Wireless Communication Networks Research
University of Twente
2015-2024
Netherlands Organisation for Applied Scientific Research
2023-2024
Centro Studi Luca d’Agliano
2024
Anhui University
2024
University of Urbino
2024
Deakin University
2024
University of Pisa
2024
University of Oulu
2023
Technische Universität Braunschweig
2012-2022
Southern University of Science and Technology
2020
In the field of wireless sensor networks, those measurements that significantly deviate from normal pattern sensed data are considered as outliers. The potential sources outliers include noise and errors, events, malicious attacks on network. Traditional outlier detection techniques not directly applicable to networks due nature specific requirements limitations networks. This survey provides a comprehensive overview existing specifically developed for Additionally, it presents...
For physical activity recognition, smartphone sensors, such as an accelerometer and a gyroscope, are being utilized in many research studies. So far, particularly, the has been extensively studied. In few recent studies, combination of magnetometer (in supporting role) lead used with aim to improve recognition performance. How when various motion which available on smartphone, best for better performance, either individually or combination? This is yet be explored. order investigate this...
The position of on-body motion sensors plays an important role in human activity recognition. Most often, mobile phone at the trouser pocket or equivalent are used for this purpose. However, is not suitable recognizing activities that involve hand gestures, such as smoking, eating, drinking coffee and giving a talk. To recognize activities, wrist-worn used. these two positions mainly isolation. use richer context information, we evaluate three (accelerometer, gyroscope linear acceleration...
In recent years, the use of a smartphone accelerometer in physical activity recognition has been well studied. However, role gyroscope and magnetometer is yet to be explored, both when used alone as combination with an accelerometer. For this purpose, we investigate these three sensors recognition. We evaluate their roles on four body positions using seven classifiers while recognizing six activities. show that general complement each other, thereby making process more reliable. Moreover,...
In wireless sensor networks (WSN) data produced by one or more sources usually has to be routed through several intermediate nodes reach the destination. Problems arise when fail forward incoming messages. The reliability of system can increased providing paths from source destination and sending same packet each them (the algorithm is known as multipath routing). Using this technique, traffic increases significantly. paper, we analyze a new mechanism that enables trade-off between amount...
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting packets may help to prevent jammer from taking actions based on content packets, but temporal arrangement induced nature protocol might unravel patterns that take advantage of, even when are encrypted. By looking at packet interarrival times in three representative MAC protocols, S-MAC,...
This article presents a cross-layered approach for networking in wireless sensor networks. WSNs differ greatly from traditional ad hoc networks and therefore require the use of new types network protocols that are energy-efficient to ensure node lifetime several years on single battery can operate without assistance central managers dynamic topology. We show tightly integrated set is good solution reach target highly WSNs. Our combines medium access organization with routing.
Wireless sensor network (WSN) applications require efficient, accurate and timely data analysis in order to facilitate (near) real-time critical decision-making situation awareness. Accurate relies on the quality of WSN as well additional information context. Raw observations collected from nodes, however, may have low reliability due limited resources harsh deployment environments. This article addresses focusing outlier detection. These are defined that do not conform expected behaviour...
Recently, wireless sensor networks (WSNs) have become mature enough to go beyond being simple fine-grained continuous monitoring platforms and one of the enabling technologies for disaster early-warning systems. Event detection functionality WSNs can be great help importance (near) real-time of, example, meteorological natural hazards wild residential fires. From data-mining perspective, many real world events exhibit specific patterns, which detected by applying machine learning (ML)...
Recently, there has been a growing interest in the research community about using wrist-worn devices, such as smartwatches for human activity recognition, since these devices are equipped with various sensors an accelerometer and gyroscope. Similarly, smartphones already being used recognition. In this paper, we study fusion of device (smartwatch) smartphone We evaluate two their strengths weaknesses recognizing daily physical activities. use three classifiers to recognize 13 different...
In this paper, we describe and validate the EquiMoves system, which aims to support equine veterinarians in assessing lameness gait performance horses. The system works by capturing horse motion from up eight synchronized wireless inertial measurement units. It can be used various modes, analyzes both upper-body limb movements. validation against an optical capture is based on a Bland–Altman analysis that illustrates agreement between two systems. sagittal kinematic results (protraction,...
This study provides a comprehensive investigation of the impact disinfection byproducts (DBPs) on human health, with particular focus DBPs present in chlorinated drinking water, concentrating three primary DBP categories (aliphatic, alicyclic, and aromatic). Additionally, it explores pivotal factors influencing formation, encompassing disinfectant types, water source characteristics, environmental conditions, such as presence natural materials water. The main objective is to discern most...
One of the keywords that describe next-generation wireless communications is "seamless." As part e-Japan Plan promoted by Japanese Government, Multimedia Integrated Network Radio Access Innovation project has as its goal development new technologies to enable seamless integration various access systems for practical use 2005. This article describes a heterogeneous network architecture including common tool, platform, and access. In particular, software-defined radio are used develop...
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting packets may help prevent jammer from taking actions based on content packets, but temporal arrangement induced nature protocol might unravel patterns that take advantage even when are encrypted. By looking at packet interarrival times in three representative MAC protocols, S-MAC, LMAC and...
Wireless sensor networks have the promise of revolutionizing capture, processing, and communication mission-critical data for use first operational forces. Their low cost, power, size make it feasible to embed them into environment monitoring tags in critical care regions, responders uniform gear, collector sinks attached unmanned aerial vehicles. The ability actively change location sensors can be used mitigate some traditional problems associated with static networks. On other hand,...