The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new geographic holebypassing routing algorithm based on virtual convex model in Wireless Ad hoc Networks (WANETs). Our method is to convert an actual hole into a basic virtual convex first and then use line segments that are parallel to the basic virtual convex to find candidates of anchor points. Later, among these candidates, we choose appropriate anchor points to be...
In recent years, playing somatosensory game is one of popular home entertainments. Many game companies design and develop lots of somatosensory games such as fitness games, sport games, and fighting games. We observe that to play somatosensory games, players have to buy specific devices or equipment (e.g., Kinect/XBOX or Wii). These devices and equipment are expensive, and a vast space is needed when...
Using the mobile robot to carry static sensors and deploy sensors at proper positions is an efficient method to solve the sensor deployment problem in wireless sensor networks (WSNs). In this paper, we assume a more practical environment compared to most studies of this problem. The goal of the proposed algorithm is to plan a shorter traveling path for the robot to relocate the redundant sensors in...
In some applications, the moving path of the mobile sink is unpredictable. For sensors that have detected an event of interest, it is necessary to find the location of the mobile sink first before they can report the data. In this paper, we will discuss how source sensors can locate the constantly moving mobile sinks and send data packets through a less number of forwarding hop counts. The effectiveness...
A wireless ad-hoc network system may suffer from various types of hardware failure. In order to enhance the fault-tolerance and reliability of the wireless ad-hoc networks, we revisit the Byzantine Agreement problem in the zone-based wireless ad-hoc network in this paper. The proposed protocol is called as the Zone-Oriented Agreement Protocol (ZOAP) which can make each fault-free mobile processor...
Barrier coverage of sensor networks is to provide sensor barriers guarding boundaries of critical infrastructures. In order to increase the Quality of Monitor (QoM) of Wireless Visual Sensor Networks (WVSNs), we revisit the barrier coverage problem with the consideration of Importance of Image (IoI). With the consideration of IoI, we can ensure that if any intruder crosses the barrier, important portions...
The consensus problem is an important topic in modern networked systems. The goal of the consensus protocol is to make each non-faulty processor agree on a common value without influence from faulty processors. However, if the initialvalue proposed by the processor is shared by only a small number of other processors, this initial-value will not become the consensus value. In order to increase the...
The Sensor Relocation (SR) problem is an important issue in Wireless Sensor Networks (WSNs). For WSNs with an ongoing surveillance task, it is necessary to follow a strict response time requirement when relocating redundant sensors to the requesting places. In this study, we revisit the SR problem in mobile WSNs. The proposed algorithm can find the redundant sensor nearest to the requesting place...
Convergecast is a fundamental operation in wireless sensor networks. This paper uses ZigBee tree-based, beacon-enabled networks to support convergecast. In the network, ZigBee routers form a tree backbone and ZigBee end devices connect to routers. Some previous works have discussed to use ZigBee tree networks to support regular data reporting. In this work, we further consider the event data reporting...
In a cooperative network, we need a mechanism that allows all correct processors to reach a common agreement. Hence, more and more attention has been drawn on the agreement related problems (Byzantine Agreement (BA) problem and Consensus problem). In previous results, the goal of BA and Consensus is obtaining a common value no matter this value is good or bad. To address this problem, Correia, Bessani...
Previous research of barrier coverage did not consider breadth of coverage in Wireless Visual Sensor Networks (WVSNs). In this paper, we consider breadth to increase the Quality of Monitor (QoM) of WVSNs. The proposed algorithm is called Distributed β-Breadth Belt-Barrier construction algorithm (D-TriB). D-TriB constructs a belt-barrier with β breadth to offer β level of QoM, we call β-QoM. D-TriB...
In previous results, most existing Byzantine agreement (BA) protocols are designed for pure wired or pure wireless networks. In practice, most current networks are combined wired and wireless environments. In this paper, we extend the BA problem over combined wired/wireless network, consisting of both powerful computing processor and low-power mobile processor. Furthermore, the communication overhead...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.