|
|
|
Biao Wang, Haobo Zhang, Yunan Zhu, Banggui Cai and Xiaopeng Guo
Low energy consumption has always been one of the core issues in the routing design of underwater sensor networks. Due to the high cost and difficulty of deployment and replacement of current underwater nodes, many underwater applications require the rou...
ver más
|
|
|
|
|
|
|
Katerina Mazi, Antonis D. Koussis, Spyridon Lykoudis, Basil E. Psiloglou, Georgios Vitantzakis, Nikolaos Kappos, Dimitrios Katsanos, Evangelos Rozos, Ioannis Koletsis and Theodora Kopania
This paper describes HYDRONET, a telemetry-based prototype of a streamflow monitoring network in the Greek territory, where such data are sparse. HYDRONET provides free and near-real-time online access to data. Instead of commercially available stations,...
ver más
|
|
|
|
|
|
|
Zeeshan Ashraf, Zahid Mahmood and Muddesar Iqbal
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been ...
ver más
|
|
|
|
|
|
|
Abha Pragati, Debadatta Amaresh Gadanayak, Tanmoy Parida and Manohar Mishra
Considering the advantage of the ability of data-mining techniques (DMTs) to detect and classify patterns, this paper explores their applicability for the protection of voltage source converter-based high voltage direct current (VSC-HVDC) transmission sy...
ver más
|
|
|
|
|
|
|
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter...
ver más
|
|
|
|
|
|
|
Daniel Okojie, Linus Idoko, Daniel Herbert and Agha Nnachi
Protection schemes are usually implemented in the planning of transmission line operations. These schemes are expected to protect not only the network of transmission lines but also the entire power systems network during fault conditions. However, it is...
ver más
|
|
|
|
|
|
|
Jalal Sahebkar Farkhani, Mohammad Zareein, Arsalan Najafi, Rui Melicio and Eduardo M. G. Rodrigues
In recent years, power grid infrastructures have been changing from a centralized power generation model to a paradigm where the generation capability is spread over an increasing number of small power stations relying on renewable energy sources. A micr...
ver más
|
|
|
|
|
|
|
Yu-Jie (Jessica) Kuo and Jiann-Cherng Shieh
The advent and rapid rise of network technology and cloud computing have led to new opportunities for ushering in a new era in telehealth. Thanks to the Internet of Things (IoT) and advances in 5G communication, telehealth is expanding and shows no signs...
ver más
|
|
|
|
|
|
|
Angel T. S.,Neethu A. S.,Ravikumar Pandi V.,Kanakasabapathy P
Transmission lines which carries bulk amount of power from generating units to the end users are more prone to fault, since they exposed to atmosphere. Thus the protections of transmission lines are vital in maintaining the continuity in services, and to...
ver más
|
|
|
|
|
|
|
N.A. Naraliyev,D.I. Samal
Pág. 94 - 104
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare...
ver más
|
|
|
|