The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Technology plays a significant role in current world. Many applications use wireless sensor network for health monitoring. One of the examples is the application to measure muscle response or electrical activity in response to a nerve's stimulation of the muscle. The development of wireless Electromyography (EMG) for remote monitoring of muscle activities is one of many vital parts in the...
Industrial environments are typically characterised by high levels of interference. Therefore, standards for industrial wireless sensor networks (WirelessHART, ISA 100.11a, and IEEE 802.15.4e) have defined a time division and multichannel-based mode of operation, in which time slots and channel pairs are assigned to links representing communication between nodes. In IEEE 802.15.4e this mode of operation...
In the latest communication system protocols, the Error Vector Magnitude (EVM) become the most significant measurement for evaluating power amplifier performance. It determines the modulator performance and how much error free signal is modulated, represented by the transmit signal phase and amplitude [1]. The main focus of this work is to design a transmission chain for Wireless Sensor Network (WSN)...
This paper investigates the ergodic capacity of a multi-input multi-output (MIMO) wireless powered communication system with partial channel state information at the power beacon (PB). Employing time splitting protocol, the PB first transmit energy-bearing signals to the energy constrained source S through beamforming, and then S uses this energy to transmit information to the destination. Unlike...
According to the prior knowledge used in the algorithms, NMF-based speech enhancement can be categorized into supervised (NMF) one and semi-supervised (SNMF) one. In the supervised version, speech is estimated with the prior knowledge of both speech and noise. For the semi-supervised version, speech bases are learned on clean speech data in advance and adapted to different noise conditions. With the...
The article presents an analysis of correlation-based clustering procedure in cooperative spectrum sensing. The motivation is to assess if it is more beneficial in terms of energy efficiency to group nodes according to the received signal-to-noise ratio (SNR) on the link between Primary User and node or according to the distance between nodes. To this end, a merged clustering measure is introduced...
We consider the scheduling problem for Aggregated ConvergeCast in wireless sensor networks with a physical interference model. Previous work consists of either heuristics without performance guarantees, or approximation algorithms which do not perform well in practice. We propose here a first scalable mathematical SINR (Signal to Interference plus Noise Ratio) model that outputs an optimal Aggregated...
High density deployment of wireless sensor networks in a same monitoring area may result in strong channel interference from different networks. In order to address the interference of co-channel or adjacent channels, we investigate the problem of channel allocation to improve the system performance for multiple wireless sensor networks. In this study, we first derive a channel interference model...
Various clustering protocols for ad hoc networks have been proposed in order to optimise the networks energy efficiency. These protocols rely on the formation of highly dense clusters which resulted in a large variation of cluster size and thus suffers from a poor load balancing. This paper introduce a novel distributed clustering algorithm using fuzzy logic for the formation of uniform size clusters...
A method for 3D passive localization based on indoor wireless channel model and fingerprinting location is presented through analyzing various kinds of indoor localization algorithms. The fingerprinting location and propagation model could respectively locate the planimetric and height position, hence the indoor three-dimensional location could be obtained. The system design and structure are presented...
Wireless SAW resonant sensors have been widely used in many applications, especially in harsh environment. The sensor is detected when the echo signal spectrum processed by Fourier transform exceeds a threshold. Because of complicated noise and electromagnetic interference in wireless channel, the threshold should be adaptive to interference in order to detect the sensor accurately. However, few researches...
An electric network frequency (ENF) signal can be found in multimedia recordings due to propagation from the power grid. There a variety of applications based on ENF signal use, such as video and audio stream synchronization, and origin determination of multimedia recordings. In this paper, we propose the use of ENF to synchronize real-time audio streams from different, non-synchronized sound devices,...
Underwater wireless sensor networks (UWSNs) can provide a promising solution to underwater target tracking. However, due to the limited energy and bandwidth resources of UWSNs, only a small part of nodes are allowed to track underwater target at each time step. As far as we know, almost all the existing node selection schemes assume the communication channel between a node and the fusion center is...
We propose a diffusion expectation-maximization algorithm with adaptive combiner for distributed estimation over sensor networks. Due to the spatial distribution of the nodes, variation of node profile across the network is a common phenomena in real applications. The unreliable nodes exist and provide inaccurate estimates, which may be caused by high levels of noise or malicious attacks. Instead...
Multi-Hop Wireless Network (MHWN) can be easily attacked by the jammer for its shared nature and open access to the wireless medium. The jamming attack may prevent the normal communication through occupying the same wireless channel of legal nodes. It is critical to localize the jammer accurately, which may provide necessary message for the implement of antjamming mechanisms. However, current range-free...
As a virtual backbone structure, connected dominating sets (CDSs) play an important role in topology control for wireless networks. In this paper, we develop a distributed self-stabilizing CDS construction algorithm under the SINR model (also known as the physical interference model), a more practical yet more challenging interference model for distributed algorithm design. Specifically, we propose...
In this paper, we investigate the relay nodes (RNs) deployment optimization to improve the energy efficiency in wireless sensor networks (WSNs). First, the energy dissipation model of multi-hop relay transmission scheme with random RNs deployment under a given BER requirement is established. Then, we present the optimal RNs deployment to minimize the energy dissipation, which the position of RNs,...
In this paper, we consider the problem of admission control of wireless virtual network (VN) service requests in a multi-service network with service-specific service function chains (SFC). SFC imposes traversal constraints on flows, i.e., each flow must visit certain service-specific nodes in a specific order. We leverage the fact that all flows within a service have common traversal constraints...
It is well-known that wireless channel reciprocity together with fading can be exploited to generate a common secret key between two legitimate communication partners. This can be achieved by exchanging known deterministic pilot signals between both partners from which the random fading gains can be estimated and processed. However, the entropy and thus quality of the generated key depends on the...
Since more than a decade, wireless sensor networks is a very attractive field in computer science and networking. Battery management is a crucial issue in the area of wireless sensor networks. The communication between a source node and a destination one may fail if both nodes are located inside a deep shadow-fading zone. Relay-selection strategy has been used in order to extend amplify-and-forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.