Showing 801 - 820 results of 1,016 for search '"Wireless Sensor Networks"', query time: 0.07s Refine Results
  1. 801

    Distributed Voronoi-Based Self-Redeployment for Coverage Enhancement in a Mobile Directional Sensor Network by Tien-Wen Sung, Chu-Sing Yang

    Published 2013-11-01
    “…Therefore, conditions of directional sensor networks are dissimilar to those of generic wireless sensor networks for researches, especially on the sensing coverage. …”
    Get full text
    Article
  2. 802

    Adaptive duty cycle control–based opportunistic routing scheme to reduce delay in cyber physical systems by Xuemei Xiang, Wei Liu, Anfeng Liu, Neal N Xiong, Zhiwen Zeng, Zhiping Cai

    Published 2019-04-01
    “…Wireless sensor networks are the foundation of cyber physical systems. …”
    Get full text
    Article
  3. 803

    Review of Blockchain integrated WSN by Samira Torabi

    Published 2023-03-01
    “…Nowadays, we know that wireless sensor networks are being widely applied in many fields of human life such as civil and military applications. …”
    Get full text
    Article
  4. 804

    Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure by Yujin Lim, Jaesung Park

    Published 2014-04-01
    “…Generally, wireless sensor networks have been designed to support predefined application services. …”
    Get full text
    Article
  5. 805

    Finite-Time Nonfragile Dissipative Filter Design for Wireless Networked Systems with Sensor Failures by R. Sakthivel, V. Nithya, Yong-Ki Ma, Chao Wang

    Published 2018-01-01
    “…In this study, the problem of finite-time nonfragile dissipative-based filter design for wireless sensor networks that is described by discrete-time systems with time-varying delay is investigated. …”
    Get full text
    Article
  6. 806

    Energy-efficient chain-based data gathering applied to communicating concrete by Hang Wan, Michael David, William Derigent

    Published 2020-08-01
    “…Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). …”
    Get full text
    Article
  7. 807

    Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu

    Published 2014-03-01
    “…The security system is one of standards for measuring whether a wireless sensor networks is an outstanding wireless sensor network. …”
    Get full text
    Article
  8. 808

    Charging path optimization in mobile wireless rechargeable sensor networks by Quanlong NIU, Riheng JIA, Minglu LI

    Published 2023-12-01
    “…The wireless power transfer technique is promising in solving the energy bottleneck of sensor nodes in wireless sensor networks, which can thus prolong the network lifetime or even maintain sustainable network operations.Most existing works focused on optimizing the static chargers’ deployment or mobile chargers’ charging path for static sensor nodes with fixed sensor node positions, ignoring the scenario with mobile sensor nodes.Thus, design and optimize the charging path of a mobile charger was studied for dynamic wireless sensor networks with mobile sensor nodes, to maximize the charging utility within a finite time horizon, that is, the charger can encounter as more sensor nodes as possible in a limited time and charge them.Notice that the mobile charger may stop to simultaneously charge multiple nodes within its charging range during its charging tour.The proposed charging path optimization problem was proven to be an APX-hard problem.Then, based on the constructed directed acyclic graph using discretization method, a layer-wise pruning algorithm based on the backtracking method was proposed.The proposed algorithm took the solution generated by the greedy algorithm as the benchmark and searched the optimal charging path under a fixed time division by layer-wise pruning.Simulation results show that the proposed algorithm can effectively improve the charging utility .…”
    Get full text
    Article
  9. 809

    Weighted mixed regression localization method based on three-dimensional Voronoi diagram division by Fenfang LI, Xiaochao DANG, Zhanjun HAO

    Published 2022-06-01
    “…With the development of the wireless communication technology and sensing technology, various technologies based on wireless sensor networks are applied.These technologies are widely used in the fields of intelligent agriculture, intelligent transportation, fire rescue and so on.Node localization technology is one of the basic technologies of wireless sensor networks.Location information is a part of the sensing data, which determines the specific measures to be taken in the next step.Due to the complexity of the three-dimensional (3D) space localization environment, the application of the plane positioning method in 3D space will have some limitations.Aiming at above problems, the weighted hybrid regression location algorithm WMR-SKR based on a 3D Voronoi diagram was studied.The localization algorithm was divided into two stages: offline training and online testing.The 3D space was divided into Voronoi diagrams according to the anchor nodes in the network.In the offline training stage, the sequence composed of the coordinates of the anchor nodes and Voronoi cell vertices was used as the training set for training.In the online test stage, the coordinates of unknown nodes in the network were predicted through the trained localization model.Simulation results show that the WMR-SKR algorithm can effectively reduce the node localization error and improve the node localization speed in 3D space.…”
    Get full text
    Article
  10. 810

    Markov Model-Based Energy Efficiency Spectrum Sensing in Cognitive Radio Sensor Networks by Yan Jiao, Inwhee Joe

    Published 2016-01-01
    “…Cognitive Radio Sensor Network (CRSN), incorporating cognitive radio capability in wireless sensor networks, is a new paradigm of the next-generation sensor network. …”
    Get full text
    Article
  11. 811

    Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks by Anfeng Liu, Wei Chen, Xiao Liu

    Published 2018-04-01
    “…In order to solve the problem of spectrum scarcity in wireless sensor networks, cognitive radio technology can be introduced into wireless sensor networks, giving rising to cognitive radio sensor networks. …”
    Get full text
    Article
  12. 812

    A mobile localization method based on a robust extend Kalman filter and improved M-estimation in Internet of things by Nan Hu, Chuan Lin, Fangjun Luan, Chengdong Wu, Qi Song, Li Chen

    Published 2020-09-01
    “…As the key technology for Internet of things, wireless sensor networks have received more attentions in recent years. …”
    Get full text
    Article
  13. 813

    Improving Energy Adaptivity of Constructive Interference-Based Flooding for WSN-AF by Dapeng Cheng, Yanyan Mao, Yin Wang, Xiangrong Wang

    Published 2015-06-01
    “…This is a very critical problem, especially in energy-limited large-scale wireless sensor networks for agriculture and forestry (WSN-AF) system. …”
    Get full text
    Article
  14. 814

    TALK: Topology Aware LKH Key Management by Dimitris Tsitsipis, Anthony Tzes, Stavros Koubias

    Published 2014-11-01
    “…Cryptographic key management for wireless sensor networks (WSNs) and mobile ad-hoc networks (MANETs) is a particularly challenging task, as they mostly consist of high counts of resource constrained nodes, especially when group communication and dynamic network membership capabilities are required. …”
    Get full text
    Article
  15. 815

    Novel and lightweight digital signature scheme by WANG Hou-zhen1, ZHANG Huan-guo1

    Published 2010-01-01
    “…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
    Get full text
    Article
  16. 816

    Continuous Skyline Queries Based on MapReduce by Guanmin Shan, Yihong Dong, Xianmang He

    Published 2014-05-01
    “…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. …”
    Get full text
    Article
  17. 817

    Architecture to connect sensor networks with Internet and services provided by SUN Ji-min1, SHEN Yu-long2, SUN Yu3, ZHANG Si-dong1

    Published 2008-01-01
    “…Connecting wireless sensor networks (WSN) with Internet and providing effective services to the Internet us-ers are the heated research issues. …”
    Get full text
    Article
  18. 818

    Improving Rare Events Detection in WSN through Cluster-Based Power Control Mechanism by Zakia Jellali, Leïla Najjar Atallah, Sofiane Cherif

    Published 2016-02-01
    “…Rare events detection is one of the main applications in Wireless Sensor Networks (WSN) and is currently a central concern of a vast literature. …”
    Get full text
    Article
  19. 819

    Design and Research of S-Box Based on Dynamic Strategy by Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong, Zhulin An

    Published 2015-11-01
    “…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
    Get full text
    Article
  20. 820

    WSN malware infection model based on cellular automaton and static Bayesian game by Hong ZHANG, Shigen SHEN, Xiaojun WU, Qiying CAO

    Published 2019-06-01
    “…The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware infection dynamics in WSN was predicted based on the static Bayesian game,through which malware and WSN systems would determine their optimal actions by Bayesian Nash equilibrium (BEN).Then the BEN was applied to the malware infection model to study the spatiotemporal dynamics characteristics of malware infection.Research results show that the proposed model can effectively predict the infection dynamics propagation process of malware in WSN,and the evolution trend of sensor nodes in various states with time,which are of significance for people to formulate measures to reduce the propagation speed of malware.…”
    Get full text
    Article