The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network connectivity is a critical property that provides communication foundation for most wireless sensor network (WSN) applications to operate successfully. Existing results on the WSN connectivity analysis are primarily based on a uniform distribution of sensors in a bounded field of interest. However, the sensor distribution can be non-uniform in practice due to diverse deployment strategies,...
Random sensor deployments following Poisson or Gaussian distribution are the most widely adopted deployment strategies for hostile and unpredictable application scenarios such as environment surveillance and malicious mobile target detection. In the literature, researchers assume either Poisson distributed or Gaussian distributed sensors in modeling wireless sensor networks for performance evaluation...
This paper researches the features of pornographic videos sensitive body videos, and presents a method to recognize and shield the sensitive content automatically. Skin color is one of important cues for pornographic video's detection. Firstly, transform the color space, calculate Gaussian probability distribution, definite threshold value, analyze texture and noise to extract skin message from a...
This paper introduces a novel deployment strategy to leverage the advantages of both Poisson and Gaussian distributions in random sensor deployment for intrusion detection. The basic idea is to employ multiple deployment points in the area of interest. How to choose the number and locations of the k deployment points for optimizing the network performance under given network investment is therefore...
Object tracking is one of the fundamental applications in Wireless Sensor Networks (WSNs). To detect and track the appearance and movement of malicious object(s), a number of sensors are usually deployed randomly in the area of interest specially for hostile application scenarios. Following random deployment strategy, the resulting WSNs conform to Poisson or Gaussian distribution, depending on specific...
Intrusion detection is one of the fundamental applications in wireless sensor networks (WSNs). Some applications require different detection capabilities at different areas in the deployment field. Gaussian distributed WSNs can fulfill such requirements and are widely deployed in practice. In addition, the presence of some high capability sensors leads to performance enhancement in term of intrusion...
Intrusion detection in a Wireless Sensor Network (WSN) is of significant importance in many applications to detect malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a unusual environmental change in a chemical industry etc. With uniform distribution, the detection probability is the same for any point in a WSN. However, some applications may require different degrees...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.