About the presentation Iain will explore some Machine 2 Machine (M2M) applications which could help improve quality of life as well as saving time, energy and money. “Networks” will be key to making it happen, in more ways than you…
Enhanced Security Technique For WSN Nodes
Enhanced Security Technique For Wireless Sensor Network Nodes Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security…
Efficient System And Localisation of Faulty Nodes

This gallery contains 1 photo →
Wireless Sensor Networks: Technology and Applications
Wireless sensor network encompasses the characteristics of authentication, privacy, integrity, non-repudiation, and anti-play back. The greater the dependency of information sent or received in the network, the greater the security risks. Various security issues have been considered in ad hoc…
Internet Of Things: The Bridge To Delay Tolerant Networks
The term Internet of Things was first used by Kevin Ashton in 1999. The concept of the Internet of Things first became popular through the Auto-ID Center and related market analysts publications. Radio-frequency identification (RFID) is often seen as a…
Dennis Hong: My seven species of robot
Dennis Hong introduces seven award-winning, all-terrain robots — like the humanoid, soccer-playing DARwIn and the cliff-gripping CLIMBeR — all built by his team at RoMeLa, Virginia Tech. Watch to the end to hear the five creative secrets to his lab’s…