Article | 21-April-2019
of leadership and, thereby, raise the primacy of pervasive communication as an essential aspect of leadership. Thus, this article focuses on dialogue as a form of communication befitting the requirements of contemporary school leadership. It argues that dialogue contributes to a form of communal professionalism in which there is a reduction in barriers between school principals, other leaders, teaching staff, parents in schools, and students. It is in this respect, it is argued, that dialogue is
Jeremy Kedian
Journal of Educational Leadership, Policy and Practice, Volume 30 , ISSUE 1, 39–50
Article | 30-November-2018
I.
OVERVIEW OF 5G WIRELESS COMMUNICATION TECHNOLOGY
A.
5G wireless communication technology
With the continuous development of the information industry, wireless communication technology has become an important part of people’s production and life. The Italian Marconi conducted radio transmission and reception experiments in 1897, a move that marked the era of human access to wireless communications. Since then, wireless communication technology has been greatly developed in both theoretical
Junying Bai,
Yongli An,
Ruihua Sun
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 86–92
research-article | 14-December-2020
A building construction project is comparable to a dynamic social system with high uncertainty and interdependence of tasks, which requires flexible collaboration of many participants often coming from various organizational affiliations. Networks of individuals enacting project function-related roles design and deliver construction projects (Pryke, 2012, 2017). Central to the performance of this interorganizational project team is communication among its diverse members, which can facilitate
Sun Kyong Lee,
Somik Ghosh
Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 103–122
Article | 24-April-2018
Low voltage power line carrier communication simulation software and simulation test system is analog carrier communication channel environment in different ways, the two systems complement each other, the former design stage for communications equipment, flexible and comprehensive simulation of the channel complex transmission characteristics; the latter stages of a communication device for debugging, you can be more effective and intuitive reflect any change in the characteristics of the load
Sun Hongliang,
Li songnong,
Ye Jun,
Hou Xingzhe,
Zheng ke,
Liu Dong,
Zhou Quan
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 190–193
Article | 24-April-2018
Low-voltage power line channel characteristics are designed for low voltage power line carrier communication system foundation. The paper used to design and develop a system for measuring the electrical characteristics of the low voltage power line communication network used to do high, including the noise characteristics of the input impedance characteristics, signal attenuation characteristics and systems, etc., a lot of experimental research. On this basis, the establishment of a low-voltage
Li songnong,
Liu Dong,
Sun Hongliang,
Hou Xingzhe,
Zheng ke,
Meng Xin,
Luo Zhishu
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 102–105
research-article | 05-January-2021
information, delivering key messages timely to the public, and controlling the spread of dis/misinformation can play a crucial role in managing epidemics (Homeland Security Council (US), 2006; World Health Organization, 2009; Centers for Disease Control and Prevention, 2014; Department of Homeland Security, 2018). COVID-19’s devastating effects on the physical and mental health of the public are unlike previous medical crises, in part because of people’s collective access to communication technologies
Ian Kim,
Thomas W. Valente
Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 129–142
Research Article | 13-December-2017
rapidly with size. The section on power shows how baseline power – and its dependence on speed – in combination with stored energy determines a body’s running time and range. The section on communication discusses scale-related communication quality and duration, especially in systems that are simultaneously large and small, e.g., in networks composed of a very large number of very small robot-like nodes.
Mel Siegel
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 285–299
Research Article | 01-September-2017
In this paper, we report on hardware structure, operation mode and software development for a new advanced communication protocol whose aim is obtaining a fully shared SPI bus with a fixed amount of wires, without renouncing to advantages of a push-pull output stage and obtaining an architecture capable of great flexibility. All four signals of a classic SPI protocol are entirely shared by the slaves on bus: when a master wants to communicate with a particular device, it will perform an
P. Visconti,
G. Giannotta,
R. Brama,
P. Primiceri,
R. de Fazio,
A. Malvasi
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 3, 506–550
Research Article | 01-December-2017
In this paper, we report a detailed description of developed Flex-SPI firmware structure together with experimental tests carried out by using ad-hoc instrumental setups based on TI MSP-EXP430F5438 experimenter boards. Developed framework, aimed to provide a solid base to test the possibility of performing a shared SPI communication with a fixed number of wires without renouncing to push-pull output stage advantages, has been implemented and successfully validated. Also, FlexSPI energy
P. Visconti,
G. Giannotta,
R. Brama,
P. Primiceri,
R. de Fazio,
A. Malvasi
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 4, 754–792
Research Article | 01-September-2017
A new way of data transmission between two vehicles using light fidelity technology is proposed in this paper. A best way of avoiding accidents can be achieved by the communication between the vehicles. This system can be simplified by using LED bulbs for data transmission. The previously used data transmission technology can be overcome by the newly proposed LIFI technology. The major objective of this system is to achieve reliable communication between the vehicle using a transmitter and a
Lokesh S,
Priya N,
Divyakanni K,
Karthika S
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 212–224
Research Article | 01-June-2017
SPI and I2C communication protocols followed by the proposal of a new hybrid protocol suited for embedded systems, named FlexSPI, thought as an evolution of the classic SPI. Thanks to a robust software architecture, it is able to provide many features that can be used by smart objects to enhance their capabilities. In this way, sensors and actuators or, more in general, subsystems, can quickly exchange data and efficiently react to malfunctioning; moreover, number of devices on bus can be safely
P. Visconti,
G. Giannotta,
R. Brama,
P. Primiceri,
A. Malvasi,
A. Centuori
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 2, 262–295
research-article | 30-November-2019
coordination in multi-agent system, multiple agents operate in the environment. Communication between multiple agents leads with the set of rules that is called interaction protocols. These interaction protocols are guaranteed for interoperability between agents by coordination. Agent accomplishes its task in a particular domain. In short, RTMAS utilize this approach which is suitable for solving complex problems that require response time. Julian et al. (2002) proposed a SIMBA (Sistema Multiagente Basado
Awais Qasim,
Sobia Iqbal,
Zeeshan Aziz,
Syed Asad Raza Kazmi,
Adeel Munawar,
Basit Ali Gilani,
Neelam Qasim
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–15
Research Article | 30-November-2014
Social networking sites (SNSs) are increasingly dominant platforms for communication among adolescents. Recently, concerns have been raised about the risks involved with SNS use, particularly among more vulnerable adolescents.Our goal was to explore the experience of SNS use by adolescents with psychiatric illnesses. We also sought to understand the ways in which these sites may be a useful way to communicate—as well as a potential source of increased stress—for this vulnerable population.We
Gerrit Ian van Schalkwyk,
Katherine Klingensmith,
Paige McLaughlin,
Zheala Qayyum
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 3 , ISSUE 2, 108–114
Article | 23-April-2018
Studies have shown that there are a lot of low-voltage power line is one of the main obstacles to strong noise limit for data transmission quality. Power line noise can be divided into steady background noise, narrowband interference noise, sudden impulse noise and periodic noise. Background noise is distributed throughout the communication band, low-voltage power line up white Gaussian noise 22dB [133 or more. Sudden noise is generated by the random access or disconnect electrical equipment
Ye Jun,
Sun Hongliang,
Li songnong,
Hou Xingzhe
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 98–101
Article | 30-November-2018
improved, and current ground network and IoT equipment cannot support this demand.
Due to the characteristics of the satellite network: covering no dead zones, communication distance has nothing to do with cost, convenient networking, safe and reliable communication, and can be used as a last-guaranteed communication method in the event of ground network paralysis caused by earthquakes, floods, and snowstorms, Particularly suitable as a supplementary application in the power industry. The ubiquitous
Dong Chuang
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 38–46
Article | 12-April-2018
Ye Jun,
Li songnong,
Sun Hongliang,
Hou Xingzhe
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 125–128
Research Article | 27-February-2017
Summary. The article discusses the possibility of the application of the NFC technology as a system of selling tickets in passenger rail transport. The NFC (Near Field Communication) technology is a wireless and contactless technology of transmission of radio data over short distances (max. 5 cm). This technology is very similar to the RFID (Radio Frequency Identification) technology. It is assumed that this technology will spread rapidly and that already in 2015 around 85% of the payments in
Henryk KOMSTA,
Eva BRUMERCIKOVA,
Bibiana BUKOVA
Transport Problems, Volume 11 , ISSUE 3, 43–53
Article | 30-November-2018
I.
INTRODUCTION
With the rapid popularization of the practical application of wireless communication system, the number of wireless communication users and user service demand have increased exponentially, but the radio spectrum resources which can be used in wireless communication services are extremely limited. The contradiction between the increasing demand of wireless service and the limited radio spectrum resources is becoming more and more prominent. MIMO multi antenna technology is a new
Sun Ruihua,
Bai Junying,
An Yongli
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 61–69
research-article | 30-November-2019
calibration in P300 and SSVEP (steady-state visual evoked potential) paradigms or often longer training in MI-BCI (motor imagery-brain computer interface). While the lengths of these sessions are usually fixed or limited, it is possible that in some cases longer training or repeating the whole session on another day may turn a fail into successful communication.
The quality of EEG recordings, rendering of the stimuli and the efficiency of the signal processing algorithms used in different BCI systems vary
Anna Chabuda,
Marian Dovgialo,
Anna Duszyk,
Anna Stróż,
Maciej Pawlisz,
Piotr Durka
Acta Neurobiologiae Experimentalis, Volume 79 , ISSUE 4, 421–431
Research Article | 15-February-2020
Clustering, an energy efficient approach is used in Wireless Sensor Network. Clustering involves cluster formation and Cluster Head Selection. As the Cluster Head is involved in carrying out the entire communication, a high energy node has to be selected as Cluster Head. In this paper, a novel predictive Fuzzy based Cluster Head selection algorithm is proposed. The proposal suggests a new input parameter, Rate of recurrent Communication apart from the standard parameters namely the Residual
Hemavathi Natarajan,
Sudha Selvara
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–8
Article | 09-April-2018
smart meters are use as down-computer clew. The structure of the system hardware and the interconnection of the various parts are introduced simply, the design and implementation of communication system of down-computer is elaborated in detail, and the part of the communication system program is given. The actual operation shows that the remote monitoring function can be realized and design requirements be satisfied by the application of intelligent instruments of real-time collection, processing
Bi Xueqin,
Zhang Liguang,
Ma Xiaohui
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 118–121
Research paper | 10-April-2013
YUAN Fei,
YE Zheng-Shan,
LIN Cong-Ren,
CHENG En
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 752–771
research-article | 30-November-2020
maintain orthogonality (Rabie and Adebisi, 2017). NOMA allows a single transmitter using the same frequency to send multiple signals for multiple users, the multiple signals use superposition of power, which improves overall spectrum efficiency (Balyan, 2020; Balyan and Daniels, 2020; Ding et al., 2017). Device-to-device (D2D) communication can be used to establish direct communication between users without getting processed through a base station (BS) or other backbone networks. This help reducing the
Vipin Balyan,
Dhiraj Gupta
International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–6
Research paper | 20-February-2013
The objective of this paper is to study the image communication behavior of a wireless video sensor, and analyze its performance under resource constrained wireless multimedia sensor networks. Energy consumption and rate distortion model of DCT-based coded image compression and transmission is developed. Based on energy consumption and rate distortion model proposed, resource allocation is optimized with limited energy and bandwidth. Number of DCT coefficient and step size of quantization table
Xiong Zheyuan,
Fan Xiaping,
Liu Shaoqiang,
Li Yongzhou,
Zhang Huan
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 1, 120–135
Research Article | 01-September-2017
administrator. In addition, each organization needs to enforce certain administrative and operational work when they interact over the network owned and operated by other organizations. Thus, without careful planning and coordination, one troop cannot communicate with the troops or leverage the communication infrastructure operated by the country troops in the same region. The purpose of this investigation was to test the components of the Soldier Tracking and Performance Measurement System against the
P. Chakravarth,
S. Natarajan,
M. Anto Bennet
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 259–270
Review | 30-November-2014
Autism spectrum disorder (ASD) is currently not curable, but it may be malleable to varying degrees in response to different interventions to improve outcomes.We conducted a systematic review of interventions aimed at ameliorating social communication impairments in patients with ASD. This study was registered in the International Prospective Register of Systematic Reviews (no. CRD42013003780).We focused on the ASD interventions that are frequently applied in Swedish clincial practice to
Tatja Hirvikoski,
Ulf Jonsson,
Linda Halldner,
Aiko Lundequist,
Elles de Schipper,
Viviann Nordin,
Sven Bölte
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 3 , ISSUE 3, 147–168
Research paper | 06-February-2018
alter vagal gut-brain communication associated with increased body fat accumulation. Sprague-Dawley rats consumed a low energy-dense rodent diet (LFD; 3.1 kcal/g) or high energy-dense diet (HFD, 5.24 kcal/g). Minocycline was used to manipulate gut microbiota composition. 16S Sequencing was used to determine microbiota composition. Immunofluorescence against IB4 and Iba1 was used to determine NTS reorganization and microglia activation. Nodose ganglia from LFD rats were isolated and co-cultured with
Alexandra C. Vaughn,
Erin M. Cooper,
Patricia M. DiLorenzo,
Levi J. O’Loughlin,
Michael E. Konkel,
James H. Peters,
Andras Hajnal,
Tanusree Sen,
Sun Hye Lee,
Claire B. de La Serre,
Krzysztof Czaja
Acta Neurobiologiae Experimentalis, Volume 77 , ISSUE 1, 18–30
Research Article | 10-April-2013
as a sighted people. The system is linked with a GSM-GPS module to pin-point the location of the blind person and to establish a two way communication path in a wireless fashion. Moreover, it provides the direction information as well as information to avoid obstacles based on ultrasonic sensors. A beeper, an accelerometer sensor and vibrator are also added to the system. The whole system is designed to be small, light and is used in conjunction with the white cane. The results have shown that
Abdel Ilah Nour Alshbatat
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 568–582
Article | 30-November-2018
I.
INTRODUCTION
With the rapid development of mobile communications, satellite communications, and on-board electronics, there is an increasing shortage of spectrum resources. However, users continue to put forward higher requirements on the speed, throughput and distance in wireless mobile communication, and the capacity requirements of the system are also getting higher and higher. Due to the extremely rich spectrum resources in the high-frequency microwave band, modern communication systems
Bai Junying,
An Yongli
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 73–78
Letter | 16-October-2019
Sandra Nance,
Cynthia Flickinger
Immunohematology, Volume 34 , ISSUE 4, 164–164
Article | 30-November-2018
I.
INTERFACE AND SOCKET
The transport layer implements end-to-end communication, so there are two terminals for each transport layer connection. What is the terminal of the transport layer connection? It is neither the host, nor the host’s IP address, and not the application process, not the transport layer protocol port. The terminal to which the transport layer connects is called a socket. According to the definition of RFC793, the port number is spliced to the IP address to form a socket. A
Xu Yinqiu,
Xie Jianping
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 56–63
Research Article | 15-February-2020
Underwater Wireless Sensor Networks (UWSN) share the common challenges of terrestrial Wireless Sensor Network (WSN), however they are significantly different from terrestrial WSN. Mainly, because acoustic wireless communication is the main physical layer technology in UWSN. Acoustic communication offers longer range, but has limitations due to low speed of sound, high error probability, limited bandwidth capacity, node mobility and 3-dimensional network architecture. Most of the ground based
Beenish Ayaz,
Alastair Allen,
Marian Wiercigroch
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5
Article | 23-April-2018
Cheng Xiaoming,
Ye Jun,
Li songnong,
Sun Hongliang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 94–97
Research Article | 01-September-2017
Chakravarthy .P,
Thamizhoviya .K Kavitha.S,
Meena .S
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 186–197
Article | 30-November-2018
protection, the construction of data security grading system, based on different security levels to determine the open rights of data, to ensure the efficiency of business execution and smooth management.
Internet of things technology is developing rapidly, but the corresponding infrastructure and security protection capabilities do not adapt to it. Network security is the biggest hidden danger of the power Internet of things. On the one hand, non-ip communication protocol is often used to transmit data
Jiao Longbing
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 68–73
Research paper | 27-December-2017
This paper discusses a new solution for switch management in intelligent manufacturing network. It makes PLC (Programmable Logic Controller) communication module have the switch management features and exchange I/O data in manufacturing network. The switch manager has used the chip of the Ethernet switch device 88E6165. The Marvell 88E6165 device embedded in communication devices is a single-chip 6 port gigabit Ethernet switch with five integrated gigabit Ethernet transceivers. It performs the
Guangfu Wang
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 856–878
research-article | 27-April-2020
been distinguished based on exchange of information or resources (Thompson, 1967).
This empirical study considered how the benefits of brokerage are contingent on the independent–interdependent nature of the work role. That is, how the informal organization, operationalized as the intra-organizational communication network structure, corresponds with the formal work role for performance. The novelty and value in this approach is that when the formal and informal organizations have been linked to
Anssi Smedlund,
Emily W. Choi
Connections, Volume 40 , ISSUE 1, 47–59
Article | 01-June-2016
A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor nodes with one-way hash function. Since the one-way hash function can ensure that the attacker cannot
ZHU Ling-Zhi,
HE Rui,
ZHANG Jun-Ling
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 979–996
Article | 02-November-2017
S. K. Palit,
Stuart. Bickerstaff,
Chris Langmaid
International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 1, 118–134
research-article | 30-November-2019
the single communication channel that this agent will use to communicate with the other entities. Here margin represents the time that will be used to decide if a task should be executed on reflex server or deliberative server. We define a new type State to represent the current status of any agent so here state represents the current state of this In-agent. type represents the agent type, i.e. In-agent or ARTIS agent. rModel represents the set of all representations required for the adaptation
Awais Qasim,
Zeeshan Aziz,
Syed Asad Raza Kazmi,
Adnan Khalid,
Ilyas Fakhir,
Jawad Hassan
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–13
research-article | 30-November-2019
Underwater communication (UWC) is a booming research field as it serves many applications (Hu et al., 2019). It is used by oceanographers in navigation and exploration of deep seas; by military in protection and guarding of the water borders and to detect underwater mines; by divers to communicate with their host ship; and by governments as an early warning system against floods or earthquakes (Kao et al., 2017). Since a large number of devices has to be used in order to create an underwater
Mohammad M. Abdellatif,
Salma M. Maher,
Ghazal M. Al-sayyad,
Sameh O. Abdellatif
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–11
Research Article | 21-April-2017
Properly organized ticket distribution is a crucial tool to realize tariff policy of public passenger transport provider in the given area, as well as the factor influencing the ticket sale profits. Providing the proper accessibility of public communication ticket sale network requires signing contracts with third parties, which is consequently connected with the necessity to divide the tasks and responsibilities among them, which generates certain risk for each of the parties. In the article
Anna URBANEK
Transport Problems, Volume 10 , ISSUE 1, 45–54
research-article | 14-September-2020
alone. If there is a difference in the strength of homophily between offline and online social networks, studies regarding homophily that examine only the offline or online environment will fail to depict the strength of homophily in a social group. In this study, I aim to reveal the differences in gender homophily among communication media through a case study of a high school classroom.
To address the ‘offline vs. online’ question in a modern setting, it is necessary to consider that nowadays
Naoki Maejima
Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 77–97
Article | 08-April-2018
In order to keep multi-role communication action of virtual network classroom orderly and correctly at the same time, this paper proposes and studies its communication collaborative relationship based on Petri Net. Firstly, it introduces the basic theory and the system state change graph of the roles in virtual classroom, and discusses in detail the collaborative relationship between students and teacher in network environment. Especially by taking advantage of Petri Net tool, this paper in
Shengquan Yang,
Shujuan Huang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 29–37
Article | 09-April-2018
Wei Zhang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 52–55
Research Article | 13-December-2017
As we know, the data transmission in the wireless networks is more unreliable than it is in the wired network environment. Although the virtual carrier sensing scheme can be used in the wireless unicast transmission, the multicast and broadcast still not utilize the acknowledgement mechanism for reliable transmission. This is due to the acknowledgement packets of broadcast transmission will cause much higher communication traffic and overhead. Since reliable data broadcast is critical and
Tien-Wen Sung,
Ting-Ting Wu,
Chu-Sing Yang,
Yueh-Min Huang
International Journal on Smart Sensing and Intelligent Systems, Volume 3 , ISSUE 3, 504–520
Article | 05-September-2013
Masato Noto,
Seiji Yoneda
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1533–1558
Research Article | 22-May-2019
Katarzyna Jas,
Urszula Małolepsza
Postępy Mikrobiologii - Advancements of Microbiology, Volume 56 , ISSUE 3, 275–281
Research paper | 01-September-2011
The paper presents the steps involved in implementing a customizable wireless sensor node for the detection of gaseous substances leakage in both internal and external environments. The node consists of various modules namely, sensors, signal conditioning, computational unit, wireless communication and power supply. The measurand to be measured are carbon dioxide, oxygen, relative humidity and temperature. A computational analysis is performed using a nano-watt PIC18LF4620 microcontroller and
S. Edward Jero,
A. Balaji Ganesh,
T.K. Radhakrishnan
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 3, 482–495
research-article | 12-April-2019
Introduction
Many children who are referred to psychiatric services have difficulties in communicating effectively in daily life and talking about their problems. The results of several international studies indicate a higher prevalence of language difficulties among children with mental health problems and that these difficulties often remain undiscovered unless specific assessments of language and communication are done (1). Cohen et al. (2) found undiagnosed language problems in 40% of their
Edel Brenne,
Tormod Rimehaug
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 7 , 3–12
Research Article | 15-February-2020
Walid Elgenaidi,
Thomas Newe
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5
Research Article | 01-March-2017
In this fast moving world, the number of fatal accidents is increasing day by day and this leads to the requirement of the availability of the traffic condition and road conditions related data to the users. Therefore, to support Vehicle-to-vehicle (V2V) communication in high speed mobility condition, it is required to have reliable and secure of communication. Here, the performance of multiple input and multiple output (MIMO) system as a combination of nonlinear decision feedback receiver (DFE
Samarendra Nath Sur,
Rabindranath Bera,
Bansibadan Maji
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 1, 50–68
Report | 24-March-2020
The Mayo Clinic, in Rochester, Minnesota, recently set forth a directive to develop a Mayo Emergency Incident Command System (MEICS) plan to respond to major disasters. The MEICS plan that was developed interfaces with national response plans to ensure effective communication and coordination between our institution and local, state, and federal agencies to establish a common language and communication structure. The MEICS plan addresses multiple aspects of dealing with resource
Kevin L. Bundy,
Mary L. Foss,
James R. Stubbs
Immunohematology, Volume 24 , ISSUE 3, 93–101
Research Article | 13-December-2017
Distributed wireless sensor networks often suffer problems on detecting malicious nodes, which always bring destructive threats. Thus, sensor networks have to supply authentication services for sensor identity and data communication. As matter of fact, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. This paper provides adaptive security modules to improve
Meng-Yen Hsieh,
Yueh-Min Huang
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 70–86
Article | 01-September-2016
Critical Infrastructures (CIs) are physical assets and organizations responsible for the production and distribution of society’s vital goods and services. The increasing interconnection of CIs has resulted in interdependencies which might lead to propagation of failure from one infrastructure to another. Most of current critical infrastructures are equipped with data collection and communication capabilities that can be used to inform and warn other CIs about such events and alarms. In this
Titus Okathe,
Shahram Shah Heydari,
Vijay Sood,
Orane Cole,
Khalil El-Khatib
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1261–1286
research-article | 27-March-2019
contraceptive use is no exception (Ali et al., 2004; Shattuck et al., 2011; Drennan, 1998). Furthermore, fertility transition challenges gender roles in itself (McDonald, 2000; Wang and Pillai, 2001), creating space for new identities to emerge. Falling fertility rates have been shown to strengthen gender equality, which further drive changes in preferences that lead to renegotiations about family size (McDonald, 2000). It is, therefore, not surprising that communication and the power dynamics within a
Bhanu Bhatia
Journal of Social Structure, Volume 20 , ISSUE 2, 1–19
Research Article | 27-December-2017
The advent of wireless communication and networking in the last two decades has led to the need of modification in the regular graphs used as spanners. The spanner is a sub graph of the original graph which connects the essential nodes for transmission of the message. For this purpose the Omni directional antennas are usually used and the “spanner-graph” performance metric is a constant multiplied by the same of the original graph. This constant is known as the “stretch factor”. One of the most
Anindya Nag,
Rajarshi Roy
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 2, 740–761
Article | 30-November-2018
I.
THE PROBLEM BACKGROUND
With the rapid development of mobile communication network, various mobile terminal devices and applications affect every aspect of people’s life. However, the current network information construction faces some problems: the acceleration of urban construction makes the urban environment more and more complex, which leads to the formation of many wireless signal black spots and weak coverage areas in densely populated urban areas; Some urban residents misunderstand the
Weixia Yang,
He Li,
Yuan Chen,
Fei Xu
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 61–68
Article | 30-November-2018
addresses of IPv4, IPv6 and IPV9 can be used simultaneously on the Internet.
A.
The hierarchy of IPV9
IPV9 system adopts the mixed network architecture of three-layer circuit/four-layer grouping, adopts the rules of verify first and then communication, address encryption, the address length could alter from 16-bie to 2048-bit, resource reservation, and adopts character direct route transmission mode, which apply virtual and real circuit to ensure the transmission security. The architecture diagram is
Jianguo Wang,
Zhongsheng Wang,
Jianping Xie,
Wei Zhong
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 1–13
Research Article | 02-November-2017
. Toward this end, we exploit random set theory, a statistical tool based on Bayesian framework, for establishing generalized likelihood and Markov density functions to yield an iterative filtering procedure. We conduct a study regarding how the design of distributed detection has impact on the result of system level information fusion. The sources of analyzed data include (a) simulation-based sensor readings through bi-directional sensing/communication; and (b) practical images taken by multiple
Juo-Yu Lee,
Kung Yao
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 4, 842–857
research-article | 30-November-2019
The evolution of LTE has been steady over the last decade (5GAmericas, 2017; Kumar et al., 2019) to meet user demands, which in part are twofold-increase data utilization and second a growth in the amount of “connect devices” (Gamboa et al., 2017). The legacy mobile networks were designed to provide services to the cell-to-cell (C2C) communication that predominantly was for voice services (Teyeb et al., 2017). By the year 2022, it is predicted that there will be about 29-billion connected
Vuyo Pana,
Vipin Balyan,
Ben Groenewald
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–9
Research Article | 14-February-2019
This article describes a way of synchronization of communication lines in urban public transport. In the literature, no comprehensive methods have been presented to ensure the regularity of running public transport vehicles, except specific cases of this problem, which have little practical application. It demonstrates how this problem is difficult. In the article, the problem was presented more broadly – running of vehicles in different intervals, in lots of common fragments of routes, and
Jakub OZIOMEK,
Andrzej ROGOWSKI
Transport Problems, Volume 13 , ISSUE 4, 91–102
Article | 06-April-2018
The tree-based tags anti-collision algorithm is an important method in the anti-collision algorithms. In this paper, several typical tree algorithms are evaluated. The comparison of algorithms is summarized including time complexity, communication complexity and recognition, and the characteristics and disadvantages of each algorithm are pointed out. Finally, the improvement strategies of tree anti-collision algorithm are proposed, and the future research directions are also prospected.
Su Xiaohao,
Liu Baolong
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 1–13
Article | 01-December-2016
. Sensing architecture based on IPv6 can help AMI be aware of communication network topology and the access time of electrical devices, and calculate real-time electricity billing. Smart meter data is collected using cognitive architecture so that it would be more accurate and meaningful. In this paper, we firstly introduce the basic architecture of AMI, including master station system, smart meters and the key technologies of communication network. And then, for the existing AMI architecture, we
Wang Peng,
Su Fei,
Hu bohong,
Luan wenpeng
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 2111–2130
Article | 30-November-2018
document specifies version 10 of the Internet Protocol (IPv10), sometimes referred to as IP Mixture (IPmix).
IP version 10 (IPv10) is a new version of the Internet Protocol, designed to allow IP version 6 [RFC-2460] to communicate to IP version 4 (IPv4) [RFC-791] and vice versa. Internet is the global wide network used for communication between hosts connected to it. These connected hosts (PCs, servers, routers, mobile devices, etc.) must have a global unique address to be able to communicate through
Khaled Omar Ibrahim Omar
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 80–87
Article | 05-September-2013
Zhao Jindong,
Fan Baode,
Lu Yunhong,
Mu Chunxiao
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, –
Research Article | 12-December-2017
We are proposing a self deploying mobile sensor network which is empowered with event based relocation of redundant sensors for enhancing the quality of event sensing. Energy efficient Cell quorum based protocol is used for communication between event location and redundant sensors. Computationally light cascaded reorganization of sensor is suggested for relocation of sensors. The proposed method provides good coverage as it dynamically relocates the sensors either for avoiding coverage hole or
S. Indu,
Venu Kesam,
Santanu Chaudhury,
Asok Bhattacharyya
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 1, 53–74
Article | 07-April-2018
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.
Yang Bing,
Liu Baolong,
Chen Hua
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 72–82
Article | 11-April-2018
Wireless sensor network is composed of many wireless sensor nodes with the same or different functions. A typical sensor node consists of four parts: sensor unit, information processing unit, wireless communication unit and energy supply unit. In this paper, the existing ant colony algorithm is analyzed, and an improved ant colony optimization algorithm is proposed. The paper presents design of routing protocol and node structure in wireless sensor network based on improved ant colony
Yan Song,
Xiaomei Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 168–172
Research Article | 14-February-2019
Igor TARAN,
Vadim LITVIN
Transport Problems, Volume 13 , ISSUE 4, 158–171
research-article | 30-November-2018
have suggested that mothers are key influential figures in family networks (Koehly et al., 2003). Additionally, past studies have identified parents and older adults as key figures, often serving in the role as gatekeepers for communication and decision-making (Ashida, Kaphingst, Goodman, & Schafer, 2013; Koehly et al., 2009). The close involvement of extended family members (i.e. non-first degree) is a uniquely important aspect of the African American family structure and function (Hecht, Jackson
Sula M. Hood,
Elizabeth H. Golembiewski,
Hadyatoullaye Sow,
Kyle Benbow,
Jeremy Prather,
Lisa D. Robison,
Elisabeth Martin-Hagler
Journal of Social Structure, Volume 20 , ISSUE 3, 96–118
Research Article | 01-September-2017
In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to cloud centre. When the identities of user information are forged by spoofing or masquerade as another computing system. Whether the basic protocol for sending data in the Internet communication are based on the Internet Protocol ("IP"). In network communication header of each IP packet consist of
Divakar V,
Vijayarangam S
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 136–146
Article | 05-June-2013
The paper mainly discusses design and implementation of key functions such as transceiver unit, MCU control unit, Data acquisition module and Background monitoring unit. Furthermore, the corresponding software platform is implemented according to hardware architecture. Finally the solution is applied into Loess landslide at Luoshan County in China. The experimental results show that bit error rate remains between at 10-5~ 10-6. This range coincides with communication standards of wireless
He Yueshun,
Zhang Wei
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 867–887
Research paper | 31-July-2017
Autism is characterized by impairment in reciprocal communication and speech, repetitive behaviors, and social communication. The genetic and environmental factors play roles in the pathogenesis of autism. It was recently shown that the genes involved in the folate/homocysteine pathway may be risk factors for autistic children. One of the genes that may be the risk factor for autism is Methionine synthase (MTR). MTR is responsible for the regeneration of methionine from homocysteine. The aim of
Rosa Haghiri,
Farhad Mashayekhi,
Elham Bidabadi,
Zivar Salehi
Acta Neurobiologiae Experimentalis, Volume 76 , ISSUE 4, 318–323
Article | 05-June-2013
Software based efficient lossless Electrocardiogram compression and transmission scheme is proposed here. The algorithm has been tested to various ECG data taken from PTB Diagnostic ECG Database. The compression scheme is such that it outputs only ASCII characters. These characters are transmitted using Global System for Mobile Communication based Short Message Service system and at the receiving end original ECG signal is brought back using the reverse logic of compression. It is observed that
S. K. Mukhopadhyay,
S. Ghosh,
S. Chakraborty,
S. Das,
M. Mitra,
S. Mitra
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 888–909
Article | 01-March-2015
Coverage and connectivity are two important problems in wireless sensor network. This paper focuses on the wireless sensor network communication radius in the high density of sensor nodes deployed randomly and two times smaller than the sensing radius; put forward a distributed k coverage multi connected node deployment algorithm based on grid. Simulation results show that the algorithm in this paper while guaranteeing the wireless sensor network coverage and connectivity can reduce the number
Yin Zhouping
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 272–290
Article | 01-September-2016
Wireless sensor networks (WSNs) are prone to various kinds of threats and are subjected to several constraints like energy, communication overhead and lifetime. Application of bio-inspired algorithms based trust models has shown significant improvement in the security mechanism of the wireless sensor networks. This paper presents a brief survey on application of Ant Colony Optimization (ACO) and significance of trust models in WSNs. ACO application in routing, increase in lifetime, energy
G. Edwin Prem Kumar,
K. Baskaran,
R. Elijah Blessing,
M. Lydia
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1243–1260
Article | 01-September-2014
platform, and wireless communication is achieved by 2.4 GHZ XBEE, and CC2500 based wireless module. Various intelligent power management protocols have been implemented on the detachable sensors. This is a flexible cost effective smart system ideal for distributed environment monitoring application.
D. Bhattacharjee,
R. Bera
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1239–1253
Research Article | 03-September-2018
intersection. A model is obtained to calculate the probability of success of the communication based on the speed of the sensitive node and the size of the payload.
Jorge Gomez-Rojas,
Luis Camargo,
Ruben Montero
International Journal on Smart Sensing and Intelligent Systems, Volume 11 , ISSUE 1, 1–8
Article | 07-May-2018
In the recent years, the safety problem in the large stadium has concerned by the researchers. Especially during the period of the large sport, the safety problem of the stadium has become an important public event. This paper designs a multi-function monitoring and alarm system based on the mobile communication network. It could realize the smoke or combustible gas alarm, the infrared identification detection and the temperature alarm. It collects the data through the sensor and sends the data
Xiaohui Wang,
Xiaoning Dou
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 35–38
Article | 07-May-2018
The rapid development of communication technology such as big data makes the integration and application of sports resource information become the key of sports informatization construction. The construction of sports resources information big data platform is of great significance to the integration of sports resources and the sharing of sports resources. The subject explores the related theory of sports resources, studies the present situation of the application of sports resources
Wang Shuangming,
Shi Jianwei,
Fu Shiqiu,
Xu Wanlin
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 28–32
Article | 30-November-2018
I.
INTRODUCTION
In the remote ECG system, because the terminals are distributed in the vast number of families, clinics, community hospitals, etc., there are problems in the management of physical equipment. Since the ECG data is communicated through the Internet, there is a problem that the communication data packet can be intercepted and monitored. Due to the diversification of commercial channels and construction teams, there is also a risk of technical confidentiality leaks.
This paper
Liu Xin,
Wei Zhiqiang
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 31–34
Case report | 25-January-2018
Kylie M. Wright
Australasian Journal of Neuroscience, Volume 26 , ISSUE 1, 21–32
Article | 05-September-2013
results have demonstrated that compared with μTESLA, the presented method is of lower authentication delay and higher authentication rate in large broadcast data traffic transmission, meanwhile reducing considerable communication overheads in those applications.
Qianping Wang,
Ruoyu Li,
Liangli LAI,
Lei Kong
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1653–1674
Article | 16-December-2013
experimental results showed a feasibility of the proposed method. In the proposed system, only walking detection results are communicated among sensors. The proposed system with small data communication is effective for networked sensor systems like intelligent spaces.
Kazuyuki Morioka,
Fumitaka Hashikawa,
Tomoyasu Takigawa
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 2040–2054
Article | 01-June-2016
IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resource- constrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communication among the sender and receiver to establish a secure session, providing a balance between security
Mehrdad Aliasgari,
Garrett Chan,
Mohammad Mozumdar
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 598–615
Article | 09-April-2018
Based on the analysis of low voltage power line carrier network topology and the characteristics of the communication channel, the concept of splitting the data bus is proposed in streetlight monitoring system. The secondary network bus strategy is adopted to solve the problem of signal relay in the control of streetlights. Because the network topology of the streetlamp control system is a complex and strong transition diagram, the traditional bus monitoring scheme is easily invalidated in the
Zhang Liguang,
Tong Xiaolong
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 47–51
Article | 07-May-2018
This paper introduces graph and group system consistency theory and puts forward a quadrotor formation control method. The quadrotor is described as a second-order integrator dynamic system, and the relative position deviation of different quadrotors is used to describe formation. According to the communication topology relationship between quadrotors, the formation is modeled by graph theory. The fusion of the pilot-follow and graph theory method is analyzed, and a second-order coherence
Yang Sen,
Xi Leiping
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 54–61
Research Article | 15-February-2020
An autonomous, wireless and self-powered smart sensor is described, addressing the condition monitoring and diagnosis of steam traps, whose performance degradation impairs energy efficiency in most of the process industries. The diagnostic criteria in the two possible failure modes of steam traps are presented, as well as the structure and technologies of the embedded devices for sensing, communication, and power supply, special attention being paid to the capability to run the system on the
Joana R. C. Faria,
Sónia M. V. Semedo,
Francisco J. A. Cardoso,
José Oliveira
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6
Research Article | 15-February-2020
particular focus on communication platforms and their security. These parameters will be compared and contrasted, and the main components necessary to form an ideal medical WSN will be highlighted.
Avijit Mathur,
Thomas Newe
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6
Research Article | 30-November-2012
dysfunction in a wide range of non-overlapping domains and in the social and communication domains in particular.Although this study was limited by the small amount of available literature about this subject, these findings suggest that a sizeable subset of children with ADHD manifest autistic traits and that the presence of these traits is associated with increased dysfunction and social and communication deficits.
Mai Uchida,
Stephen V. Faraone,
Gagan Joshi,
Andrea Spencer,
Tara Kenworthy,
K. Yvonne Woodworth,
Joseph Biederman
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 1 , ISSUE 1, 33–40
Review | 22-August-2018
The purpose of this review is to summarize current knowledge about the gut microbiota in neuropsychiatric disorders. It is estimated that the human gut is colonized by up to 1018 microorganisms, mostly anaerobic bacteria. The gut microbiome is responsible for multiple functions, e.g. tightness of the intestine barrier, digestion and absorption. The correlation between gut dysbiosis and development of psychiatric, autoimmune and allergic diseases as well as bidirectional communication between
Marta Grochowska,
Marcin Wojnar,
Marek Radkowski
Acta Neurobiologiae Experimentalis, Volume 78 , ISSUE 2, 69–81
Research Article | 01-September-2017
Development of mobile phone communication infrastructure in the world has promoted which lead public concern over possible health effect exposure to radio frequency electromagnetic energy (RFEME) emanating from mobile phone antenna. The Micro-strip patch antenna plays an important role in electromagnetic energy transmitting and receiving phenomena in mobile phone. This paper makes an effort to assess the mobile radiation exposure effect on 4 years child, 8years child and an adult head model
M. Anto Bennet,
J. Surekha Poomathi,
C. Kalpana,
S. Sariga Priya
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 374–394
Article | 01-December-2012
Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide variety of malicious attacks. As various applications of WSN have been proposed, security has become one of the big research challenges dan is receiving increasing attention. In order to insure the security of communication in wireless sensor networks, we proposed a new ID-based signcryption scheme using bilinear pairing. Under the computational Diffie-Hellman assumption, the security of the scheme
Zhimin Li,
Xin Xu,
Zexiang Fan
International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 4, 799–810
Research Article | 15-February-2020
computer and a 3G/UMTS shield which permit the data communication with a cloud server. The data stored on the server is accessed through a mobile application that analyzes and correlates all user information and allows data visualization with a friendly graphical interface.
José Barreiro,
Octavian Postolache,
Pedro Passos
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6
research-article | 30-November-2019
Structure-free vehicular ad-hoc networks (VANETs) exchange information through roadside units (RSUs) using IEEE 802.11p at 5.9 GHz. To make the journey experience safe and secure for the user, we need to ensure real-time information to road users on the highway or city scenario (S Al-Sultan et al., 2014; Schoch et al., 2008). Figure 1 indicates the basic communication module used for the propagation of information of the cluster to the end user. Cluster is required to overcome the issue of
Rajeev Kumar,
Dilip Kumar,
Dinesh Kumar
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–9
Article | 01-March-2015
Wireless sensor networks (WSN) have limited lifetime due to on board battery. The lifetime can be improved by energy harvesting solutions. In this paper the solar energy harvester requirements for TelosB mote has been analyzed and calculated. Photovoltaic (PV) panel and battery sizing requirements are calculated by assuming that the mote follows SMAC and TDMA-MAC schedule for image communication. The calculations are validated by comparing it with the parameters calculated from the real time
R. Hemalatha,
R. Ramaprabha,
S. Radha
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 291–315
Article | 01-June-2016
Virtual Instrument technology, based on DataSocket, is the product combined with computer technology, network communication technology and instrumentation technology. The paper has described some concepts about virtual instrument and LabVIEW. Now concerning the characteristic of equipment in grassroots units that equipment have diverse models and could be widespread distributed, and it could cause increasing difficulty of repair and maintenance about equipment. Thus, the paper proposed Virtual
Wu Tao,
Liu Zhihua,
Liang Miaoyuan
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 491–508
Research Article | 11-February-2019
Abstract
Although scholars have argued that people actively shape and reshape their social networks (e.g., Parks, 2016), this aspect of relational development has received little attention. This study sought to determine if people’s self-perceptions of interpersonal communication skills translated into behavior that led to relationship formation in a new network. A 9-month longitudinal social network analysis (N = 94) of the residents of a first-year university residence hall using Facebook tie
Christopher J. Carpenter,
Xun Zhu,
Rachel A. Smith
Journal of Social Structure, Volume 20 , ISSUE 1, 1–24
Article | 24-April-2018
This paper studies the application of embedded system in water conservancy information remote monitoring, structured, modular scheme is adopted to improve the system of software and hardware design, debugging and implementation, and puts forward a set of embedded control, data acquisition and transmission, friendly interface in the integration of monitoring information management system design. This system based on the wide coverage of the GSM short message service provided mobile communication
Xiaoqing Shi,
Qianhua Huang,
Gangyu Gu
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 106–109