Letterkenny Institute of Technology

Displaying 1-7 of 7 results

  • White Papers // Jun 2012

    The Capabilities and Vulnerabilities of the Cloud

    Cloud computing has been around for some time. The last number of years has seen a steady rise in the number of companies adopting the service. Cloud offers various advantages to companies, in particular to Small and Medium Enterprises (SMEs) who are attracted to the cost saving and flexibility that...

    Provided By Letterkenny Institute of Technology

  • White Papers // Apr 2012

    Developing a Secure Programming Module to Cope with Modern Vulnerabilities

    A in a society reliant on software, it is imperative that students are provided with appropriate skills in order to deal with ever increasing types of attack. Facilitators should provide students with an understanding both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern...

    Provided By Letterkenny Institute of Technology

  • White Papers // Jul 2011

    An Energy Analysis of IEEE 802.15.6 Scheduled Access Modes

    Body Area Networks (BANs) are an emerging area of wireless personal communications. The IEEE 802.15.6 working group aims to develop a communications standard optimised for low power devices operating on, in or around the human body. IEEE 802.15.6 specifically targets low power medical application areas. The IEEE 802.15.6 paper defines...

    Provided By Letterkenny Institute of Technology

  • White Papers // Nov 2010

    Analysis of the Effect of Human Presence on a Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc, which...

    Provided By Letterkenny Institute of Technology

  • White Papers // Nov 2010

    Topology Selection Schema for Wireless Body Area Networks

    Topology selection is an important part of Wireless Body Area Networks (BAN) development. It effects the operation of the entire network stack. For example a mesh topology requires all the nodes to have routing capability. In this paper the authors propose and illustrate a novel method of topology selection for...

    Provided By Letterkenny Institute of Technology

  • White Papers // Jul 2010

    The Effect of Body Shape and Gender on Wireless Body Area Network On-Body Channels

    Technological advancements have made possible the emergence of Body Area Networks (BANs). There are numerous on-body channel characterizations in the literature performed on a phantom or a single human subject. In this paper, using multiple subjects, the authors consider the effect of body shape and gender on the on-body channel....

    Provided By Letterkenny Institute of Technology

  • White Papers // May 2010

    Current Characterisation for Ultra Low Power Wireless Body Area Networks

    The emerging area of Body Area Networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, the authors propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices....

    Provided By Letterkenny Institute of Technology

  • White Papers // Nov 2010

    Analysis of the Effect of Human Presence on a Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc, which...

    Provided By Letterkenny Institute of Technology

  • White Papers // Jul 2011

    An Energy Analysis of IEEE 802.15.6 Scheduled Access Modes

    Body Area Networks (BANs) are an emerging area of wireless personal communications. The IEEE 802.15.6 working group aims to develop a communications standard optimised for low power devices operating on, in or around the human body. IEEE 802.15.6 specifically targets low power medical application areas. The IEEE 802.15.6 paper defines...

    Provided By Letterkenny Institute of Technology

  • White Papers // Jul 2010

    The Effect of Body Shape and Gender on Wireless Body Area Network On-Body Channels

    Technological advancements have made possible the emergence of Body Area Networks (BANs). There are numerous on-body channel characterizations in the literature performed on a phantom or a single human subject. In this paper, using multiple subjects, the authors consider the effect of body shape and gender on the on-body channel....

    Provided By Letterkenny Institute of Technology

  • White Papers // May 2010

    Current Characterisation for Ultra Low Power Wireless Body Area Networks

    The emerging area of Body Area Networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, the authors propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices....

    Provided By Letterkenny Institute of Technology

  • White Papers // Nov 2010

    Topology Selection Schema for Wireless Body Area Networks

    Topology selection is an important part of Wireless Body Area Networks (BAN) development. It effects the operation of the entire network stack. For example a mesh topology requires all the nodes to have routing capability. In this paper the authors propose and illustrate a novel method of topology selection for...

    Provided By Letterkenny Institute of Technology

  • White Papers // Apr 2012

    Developing a Secure Programming Module to Cope with Modern Vulnerabilities

    A in a society reliant on software, it is imperative that students are provided with appropriate skills in order to deal with ever increasing types of attack. Facilitators should provide students with an understanding both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern...

    Provided By Letterkenny Institute of Technology

  • White Papers // Jun 2012

    The Capabilities and Vulnerabilities of the Cloud

    Cloud computing has been around for some time. The last number of years has seen a steady rise in the number of companies adopting the service. Cloud offers various advantages to companies, in particular to Small and Medium Enterprises (SMEs) who are attracted to the cost saving and flexibility that...

    Provided By Letterkenny Institute of Technology