Message for the IEEE President
First Page of the Article
Appeal to Industry
First Page of the Article
Society Members named to Fellow Grade
First Page of the Article
Conference calendar
First Page of the Article
Carrier-grade Ethernet challenges for IPTV deployment
Carrier-grade Ethernet standardization and deployment is gaining momentum due to the ease of deployment, lower cost, and compatibility with existing networks on the access end. When Internet protocol television (IPTV) is deployed using Ethernet as the ...
CommuniCrostic Puzzle
First Page of the Article
IT839 Strategy: the Korean challenge toward a ubiquitous world
The South Korean government declared the IT839 Strategy as a new development strategy for the IT sector in 2004. Under this strategy, the introduction and development of eight (8) new IT services are expected to encourage investment in three (3) key ...
Telemedicine in the USA: standardization through information management and technical applications
In this article, we describe the need for telemedicine standards and classify various standards of telemedicine. The emerging issues in telecommunications standards, the application of these standards in the health care industry, and future development ...
Patient monitoring using ad hoc wireless networks: reliability and power management
In the health care domain, a major challenge is how to provide better health care services to an increasing number of people using limited financial and human resources. Wireless patient monitoring has the potential to support these multiple and ...
Prevailing over wires in healthcare environments: benefits and challenges
The objectives of this article are to survey the benefits and challenges posed by the deployment and operation of wireless communications in support of healthcare networks. While the main advantage of wireless communications remains to provide ...
Security and privacy in RFID and applications in telemedicine
Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However, security and ...
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
The development of the wireless body area sensor network (BASN) is imperative for modern telemedicine and m-health, but security remains a formidable challenge yet to be resolved. As nodes of BASN are expected to be interconnected on or in the human ...
Context-aware middleware solutions for anytime and anywhere emergency assistance to elderly people
The growing percentage of elderly people in society calls for novel healthcare support services to enhance elders' daily life independence in indoor and outdoor environments. Ubiquitous technologies create significant opportunities not only for indoor, ...
3G wireless communications for mobile robotic tele-ultrasonography systems
Mobile healthcare (m-health) is a new paradigm that brings together the evolution of emerging wireless communications and network technologies with the concept of 'connected healthcare' anytime and anywhere. In this article, we present the performance ...
Topics in ad hoc and sensor networks
First Page of the Article
Toward a theory of in-network computation in wireless sensor networks
Sensor networks are not just data networks with sensors being the sources of data. Rather, they are often developed and deployed for a specific application, and the entire network operation is accordingly geared toward satisfying this application. For ...
Emerging techniques for long lived wireless sensor networks
In recent years, sensor networks have transitioned from being objects of academic research interest to a technology that is frequently being deployed in real-life applications and rapidly being commercialized. However, energy consumption continues to ...
MAC protocols for wireless sensor networks: a survey
Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ...
Dynamic key management in sensor networks
Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically establish and maintain secure channels among communicating nodes. Desired features of key management in sensor networks include ...
Ad hoc innovation: distributed decision making in ad hoc networks
Mobile ad hoc networks by their nature are highly adaptive systems that can come into existence on an as needed basis. They can grow, reduce in size, fragment, and dismantle as desired. The dynamic and very flexible nature of ad hoc networks can be ...
Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors
IP telephony has been rapidly introduced to replace the traditional circuit switched infrastructure for telephony services. This change has had an enormous impact on critical-infrastructure (CI) sectors, which are expected to become increasingly ...
A primer on cryptography in communications
The secure transport of messages was the concern of many early civilizations. Since then, different methods have been developed to assure that only the sender and the addressee would be able to read a message, while it would be illegible or without ...
Advertisers' Index
First Page of the Article
Spin
First Page of the Article