Showing 81 - 100 results of 3,167 for search 'WJSN~', query time: 2.65s Refine Results
  1. 81
  2. 82

    A Game Theory Based Strategy for Reducing Energy Consumption in Cognitive WSN by Elena Romero, Javier Blesa, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2014-01-01
    “…Wireless sensor networks (WSNs) are one of the most important users of wireless communication technologies in the coming years and some challenges in this area must be addressed for their complete development. …”
    Get full text
    Article
  3. 83

    Deployment scheme of WSN relay nodes based on artificial bee colony optimization by Kainan LIU, Xu HAN

    Published 2016-09-01
    “…In wireless sensor network(WSN),the relay node deployment performance is one of the main factors to affect network life.Aiming at the WSN with 3-demension high density,there is no existing relay node deployment schemes enhancing the network life efficiently with the constraints of hardware cost and network connectivity.Hence,a novel deployment scheme called artificial bee colony(ABC)-based relay node deployment scheme(ABC-RNDS)was proposed based on network-grid deployment method.In ABC-RNDS,double-layer topology was adopted to build WSN,which used minimum spanning tree to construct the backbone nodes of WSN,and applied ABC to extend the network lifetime by optimizing network parameters and constraining the number of relay nodes.The simulation results show that,compared to the traditional deployment scheme,ABC-RNDS can improve network lifetime significantly under constrains of cost and connectivity.…”
    Get full text
    Article
  4. 84
  5. 85
  6. 86

    Yapay Nesne Ontolojisinin İmkânı by Şeyma Nur Tan

    Published 2024-07-01
    Subjects: “…yapay nesne…”
    Get full text
    Article
  7. 87

    Detection of sybil attacks based on periodic ultra wide band distance information in WSN by Yanzhi ZHANG, Xiaoqin YE

    Published 2016-08-01
    “…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
    Get full text
    Article
  8. 88

    Research for WSN routing algorithm based on novel multi-level minimal dominating clustering by LUO Guang-chun, LI Jiong

    Published 2007-01-01
    “…The novel mult-level minimal dominating clustering arithmetic is the reprove of the random clustering arith-metic,we discussed the arithmetic of minimal dominating set,and developed a improved predigestion arithmetic of near minimal dominating set,reduced the workload of compute the minimal dominating set.After discussed the realize of minimal dominating for WSN.The test results validate the improve in the energy consumption.…”
    Get full text
    Article
  9. 89

    WSN clustering routing algorithm based on Cuckoo Search algorithm optimized K-means by Kailei ZHU, Aijing SUN

    Published 2022-03-01
    “…In order to extend the lifetime of wireless sensor network (WSN), a clustering routing algorithm for WSN based on Cuckoo Search (CS) algorithm optimized K-means was presented.In the clustering stage, the initial cluster centers were selected by CS algorithm, which make the clustering results of the K-means algorithm more uniform to balance node energy consumption.The remaining energy of the node, the distance from the center of the cluster were comprehensively considered in the cluster election, and the weight according to the remaining energy of the node was dynamically adjusted.In the data communication stage, in order to further balance the load of the cluster head, the remaining energy of the relay node and its load, and the cluster head routing energy consumption were comprehensively considered, CS algorithm was combined to plan routing for the cluster head.The simulation results show that the proposed algorithm is better than LEACH-K, LEACH-improve and DTK-means in terms of energy consumption balance.With the death of the first node as the life cycle of the network, the network lifespan was increased by 173%, 21%, and 6% respectively.The proposed algorithm effectively extending the network life cycle.…”
    Get full text
    Article
  10. 90

    Improving Rare Events Detection in WSN through Cluster-Based Power Control Mechanism by Zakia Jellali, Leïla Najjar Atallah, Sofiane Cherif

    Published 2016-02-01
    “…Rare events detection is one of the main applications in Wireless Sensor Networks (WSN) and is currently a central concern of a vast literature. …”
    Get full text
    Article
  11. 91

    Energy Balanced Scheduling for Target Tracking with Distance-Dependent Measurement Noise in a WSN by Xiaoqing Hu, Ming Bao, Yu-Hen Hu, Bugong Xu

    Published 2013-12-01
    “…Energy efficient collaborative target tracking in a wireless sensor network (WSN) is considered. It is assumed that the distance estimates of range sensors are contaminated by distance-dependent multiplicative observation noises. …”
    Get full text
    Article
  12. 92

    Low power data fusion for sensor node constrained by real time management in WSN by WANG Qin, LI Chong, WAN Ya-dong, LI Lei

    Published 2008-01-01
    “…Compared with general data fusion algorithms that fuse different space characteristics of data generated at the same time, a time series based node level data fusion algorithm constrained by real time management was proposed to study the different time features of the same space in industrial WSNs, which can meet real time management and is a ef- ficient management way to these requirements. …”
    Get full text
    Article
  13. 93

    Distributed real-time localization algorithm based on sparse observation and asynchronous transmission in WSN by Yong MA, Yuchun LIU

    Published 2016-10-01
    “…For the issues that the existing centralized multi-dimensional scaling(MDS-MAP)localization algorithms in wireless sensor network (WSN)have localization accuracy and distributed problem, a distributed real-time localization algorithm based on sparse observation and asynchronous transmission in WSN was proposed. …”
    Get full text
    Article
  14. 94

    Integrated Positioning for Coal Mining Machinery in Enclosed Underground Mine Based on SINS/WSN by Qigao Fan, Wei Li, Jing Hui, Lei Wu, Zhenzhong Yu, Wenxu Yan, Lijuan Zhou

    Published 2014-01-01
    “…To realize dynamic positioning of the shearer, a new method based on SINS/WSN is studied in this paper. Firstly, the shearer movement model is built and running regularity of the shearer in coal mining face has been mastered. …”
    Get full text
    Article
  15. 95
  16. 96

    A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN by Liping Liu

    Published 2015-12-01
    “…For the issues that the user remote security authentication for wireless sensor network(WSN), and the defects of the existing schemes, a remote user security authentication scheme of using smart card for WSN was proposed. …”
    Get full text
    Article
  17. 97

    Design of a Circularly Polarized -Slot Antenna with Isotropic Pattern for the UHF RFID Reader of WSN by Jongan Park, Jonghun Chun, Gwangwon Kang, Sungkwan Kang, Youngeun An

    Published 2014-06-01
    “…In an antenna for a UHF RFID reader of wireless sensor networks (WSN), receiver sensitivity in sensing multitags from remote distances is an important performance index. …”
    Get full text
    Article
  18. 98
  19. 99
  20. 100

    Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN by Wumaier HENIGULI

    Published 2016-04-01
    “…For the Sinkhole attack problem of wireless sensor network(WSN),a detection algorithm based on fusion of ant colony optimization(ACO)and P2P trust model was proposed.Firstly,ant colony optimization algorithm was used to detect the existence of a Sinkhole attack in route and generate the alarm information of sensor nodes. …”
    Get full text
    Article