Skip to content

Wireless Communication Technology

wearable digital jewelry

Digital Jewelry

Digital jewelry is the fashion jewelry with embedded intelligence. Digital jewelry can help you solve problems like forgotten passwords and security badges. These devices have a tiny processor and unique identifiers that interact with local sensors. Digital jewelry is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information.

Stage 1 of Vehicle Monitoring and Security System

Vehicle Monitoring and Security System

The Vehicle Monitoring and Security System is a GPS based vehicle tracking system that is used for security applications. The project uses two main underlying concepts. These are GPS (Global Positioning System) and GSM (Global System for Mobile Communication).

integrated continuous speech recognition system

Speech Recognition

Speech recognition basically means talking to a computer, having it recognize what we are saying, and lastly, doing this in real time.

Jamming and anti-Jamming Techniques example

Jamming and anti-Jamming Techniques

jamming, the adversary corrupts the content of original message by transmitting radio frequency signals in the network or by blocking the message so that it cannot reach to the intended receiver.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Mobile ad hoc network

Mobile Ad Hoc Network Routing Protocols and Applications

Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently.