The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances have witnessed the success and popularity of three dimensional (3D) wireless sensor network (WSN) applications. The majority of existing works however consider a 2D plane and the results can not be applied to the 3D cases directly due to the addition of a new dimension. In this paper, we investigate the deployment efficiency problem in a random 3D WSN in term of over-provisioning rate...
Although most research in lattice wireless sensor networks are focus on determining the optimal deployment pattern to provide full sensing coverage while maximizing the deployment efficiency, we study the partial sensing coverage problem and the corresponding node saving rate in 3D lattice WSNs. Two popular 3D deployment patterns including cube and triangular prism are considered. The partial sensing...
In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a malicious moving object in the area of interest. With uniform sensor deployment, the detection probability is the same for any point in a WSN. However, some applications may require different...
For a wireless sensor network (WSN) to operate successfully in an application of detecting a mobile intruder, the sensor's sensing of the intruder and the communication between the tasking sensor(s) and the base station should be jointly considered for effective intrusion detection. Most related work either treats the two tasks separately or considers both tasks for general-purpose WSN applications...
Considering the data-centric feature of wireless sensor networks and different data has the different requirement of real-time. A new data aggregation algorithm- Miscellaneous data aggregation algorithm based on timeliness of data in wireless sensor networks (MDA) is proposed. This algorithm can adaptability adjusts the data fusion strategy according to the results of the analysis of data time-lines...
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). It is defined as the mechanism to detect moving intruder(s) by single-sensing or jointly-sensing detection. To date, related works focus on the problem of network configuration for detecting intruder(s) within a pre-specified time/distance threshold by assuming a straight line intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.