-
141
Ethics of Sensor-Based Surveillance of People with Dementia in Clinical Practice
Published 2025-04-01“…Sensor-based surveillance technology (SST) is increasingly employed in the care of people with dementia (PwD) in hospitals, nursing homes, and home care. …”
Get full text
Article -
142
FINGER VERSUS FOREHEAD PULSE OXIMETRY IN LITERATURE: A NARRATIVE REVIEW
Published 2025-05-01“…Conclusions: The finger pulse oximetry remains the standard in most scenarios, but forehead sensors may provide more reliable readings in critically ill patients with compromised peripheral perfusion.…”
Get full text
Article -
143
Investigation of Polymers as Matrix Materials for Application in Colorimetric Gas Sensors for the Detection of Ammonia
Published 2025-04-01“…For most sensor applications, the sensor dye must be immobilized in a sensor matrix. …”
Get full text
Article -
144
Indoor Location Based VOD Service Using Smart Phone Sensors
Published 2014-04-01“…We use a dead-reckoning indoor positioning method that determines user's location using smart phone sensors. Another necessary ingredient of ILBVS is a map that is the most important element of the LBS's user interface. …”
Get full text
Article -
145
The Potential of Wearable Sensors for Detecting Cognitive Rumination: A Scoping Review
Published 2025-01-01“…Electrodermal Activity (EDA) sensors capturing skin conductance activity emerged as both the most prevalent sensor (<i>n</i> = 5) and the most comparatively valid biomarker for detecting cognitive rumination via wearable devices. …”
Get full text
Article -
146
Survey for Sensor-Cloud System from Business Process Outsourcing Perspective
Published 2015-09-01“…Several benefits of adopting cloud computing including cost saving, high scalability, and business risk reductions also can be applied to sensor data collection. As a first investment for new technology, we analyze IT managers' feedbacks to identify the most important factors of decision making for cloud platform adoption and IT outsourcing. …”
Get full text
Article -
147
State-of-the-Art Navigation Systems and Sensors for Unmanned Underwater Vehicles (UUVs)
Published 2025-02-01“…DVL sensor is the most fully developed sensor for UUVs in recent years. …”
Get full text
Article -
148
A Mobility-Aware Efficient Routing Scheme for Mobile Sensor Networks
Published 2013-03-01“…Therefore, mobility is an important factor in the design of a routing protocol for mobile sensor networks. In this paper, we propose a mobility-aware efficient routing called MAER, in which sensor nodes make use of mobile information to select the most appropriate routing behavior. …”
Get full text
Article -
149
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks
Published 2014-06-01“…Based on a general description of the wireless sensor network (WSN), which is an important element of CPS, this paper first gives a comprehensive and deep understanding of CPS. …”
Get full text
Article -
150
Effect of luggage type on gait parameters using in-shoe motion sensors
Published 2025-07-01“…While its effects on gait and posture have been explored, most findings are based on laboratory measurements rather than real-world conditions. …”
Get full text
Article -
151
Geometry-covering based localization for Jamming attack in wireless sensor networks
Published 2010-01-01“…A geometry-covering based localization(GCL) algorithm was proposed with the purpose of localizing the jamming attacker in wireless sensor networks.The knowledge of the convex hull in computing geometry,especially the smallest circle covering,was utilized in the process of GCL.Simulation results showed that GCL is able to achieve higher accuracy than other comparable localization algorithms in most cases,and that has the time complexity of O(nlogn) which is proper for resource-constrained sensor networks.…”
Get full text
Article -
152
A Vulnerable-by-Design IoT Sensor Framework for Cybersecurity in Smart Agriculture
Published 2025-06-01“…The LSTM model performed best with drift fault conditions (0.9749 accuracy), while DDoS attacks were most consistently detectable (avg. score: 0.6886) and resource exhaustion attacks the most difficult (0.3056). …”
Get full text
Article -
153
Geometry-covering based localization for Jamming attack in wireless sensor networks
Published 2010-01-01“…A geometry-covering based localization(GCL) algorithm was proposed with the purpose of localizing the jamming attacker in wireless sensor networks.The knowledge of the convex hull in computing geometry,especially the smallest circle covering,was utilized in the process of GCL.Simulation results showed that GCL is able to achieve higher accuracy than other comparable localization algorithms in most cases,and that has the time complexity of O(nlogn) which is proper for resource-constrained sensor networks.…”
Get full text
Article -
154
An energy-efficient multi-channel MAC protocol for linear sensor network
Published 2022-12-01“…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
Get full text
Article -
155
Sensor Placement for Rupture Detection Using a Continuous Monitoring Strategy
Published 2024-09-01“…The second step regards the selection of an effective sensor placement strategy. The aim is to determine the most effective position in terms of rupture localization ability of a predetermined number of sensors using sensor sensibility within the input variables.…”
Get full text
Article -
156
Portable RF-Sensor System for the Monitoring of Air Pollution and Water Contamination
Published 2012-01-01“…In this work, we have constructed a low-cost portable RF sensor system by using 400 MHz transceiver to achieve this goal. …”
Get full text
Article -
157
COMPARISON OF DIFFERENT GLASS COMPOUNDS FOR INTRINSIC FIBER OPTIC TEMPERATURE SENSORS
Published 2001-09-01“…Different glasses suitable for temperature sensing in the fiber optic sensors were studied in this article. The phase changes for eight different glass materials were calculated and results were compared. …”
Get full text
Article -
158
Time synchronization algorithm based on mobility model for underwater sensor networks
Published 2016-01-01“…With the characteristics of high transmission delay and mobility, distributed time synchronization of underwa-ter sensor networks can be very challenging. The existing works cannot get high accuracy, because most of them ignore the long transmission latency, or dynamic changing tra ission delay caused by the mobility. …”
Get full text
Article -
159
Promising methods of prenatal diagnostics based on passive sensors and machine learning
Published 2025-03-01“…Non-peer-reviewed publications and duplicates were also excluded from the reviewed materials. The most relevant 8 articles were included in the review, which describe promising methods of prenatal diagnostics based on the use of passive sensor experimental devices.Results. …”
Get full text
Article -
160
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01“…One of the most popular research focuses of wireless sensor network is postponing the life cycle of sensor network as well as reducing energy consumption.An efficient clustering routing algorithm based on LEACH(low energy adaptive clustering hierarch)was presented,which is the representative of hierarchy based protocol in wireless sensor network.The residual energy,average energy and maximum energy are considered in this algorithm while electing the cluster header.It can also limit the number of members of each cluster.At the same time,it can produce the first cluster header among the cluster heads which will use the multi-hop mode to balance the load of network.The simulation results show that this improved algorithm can reduce the energy consumption,extend the network life cycle and ensure the load balance of the system.…”
Get full text
Article