The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Bounding Cube algorithm used in wireless sensor networks depends greatly on the known nodes. When the number of known nodes is limited, the communication range of the unknown node is only decided by the intersection range of known nodes, which will reduce the positioning precision. This paper presents an improved algorithm. After acquiring the communication range of unknown nodes, you can use...
Despite recent theory development, methods of calibration that accurately recover signals from biased sensor readings remain limited in their applicability. Acoustic sensors, for instance, which have been popular in low power wireless sensor networks, are difficult to calibrate in this manner, given their significant hardware variability, large dynamic range, sensitivity to battery power level, and...
In wireless sensor network(WSN), intrusion detection systems(IDSs)can be placed on all of nodes to make a network safer. But the always-on strategy is not an efficient choice because of wasting the source of system. The paper describes an intrusion detection way using a non cooperative game theoretic framework, which can help each cluster head node decide the probability of starting up IDS service...
Energy efficiency is widely understood to be one of the dominant considerations for wireless sensor networks. Based on historical data and technology trends, the receiver energy consumption will dominate all energy, to the point that for the majority of applications, power management research must focus on receiver efficiency. By modeling several popular MAC layer protocols, we derive bounds on performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.