The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, wireless sensor networks (WSN) have a wide application prospects. So it has attracted great interests in several related research fields and industries. Based on the characteristics of DV-Distance and centroid location algorithm, a novel hybrid localization algorithm based on DV-Distance and the twice-weighted centroid in wireless sensor network is proposed. The main principle of...
For the increasing demand on campus network, IPv6 (Internet protocol version 6) is going to replace the IPv4 protocol. IPv6 is playing an important role in many fields. Wireless sensor networks (WSNs) are undergoing rapid progress and attracted the attention of both the academic and the industrial research community in the last few years. This paper reports on the development of these protocols at...
In this paper, based on a web page to determine similarity is proposed which is based on semantic web similarity judgments. First on the web page of text extraction, is text segmentation, also taking stop words to go out, Similarity judgments for the Web page provides a basis. Then based on Vector Space Model using TF-IDF method similar to the Chinese website text judgment, In the process of judging,...
LEBKM for Wireless Sensor Networks (WSN) is proposed in this paper, which employs the localized strategy. The key for each node is integrated from two keys separately provided by other two key managements. Once the nodes have been deployed, the localized strategy is adapted to update the pre-distributed keys in nodes within the same cluster. The resilience of the network is significantly enhanced...
Sensor networks are consisting of sensor nodes with limited battery power and wireless communication modules on it. They are deployed to collect the useful information from the field. Topology control is very critical to operate the sensor network for a long period of time. When being deployed, ad-hoc and sensor networks are unstructured and lack an efficient and reliable communication scheme. For...
Faulty components in a wireless sensor network need to be localized and repaired to sustain the normal operation of the network. Due to the inherent stringent bandwidth and energy constraints, we consider only use end-to-end measurement to infer lossy links in sensor network. In this paper, we formulate the problem of lossy links localization as a Bayesian inference problem, and use max-product algorithm...
Sensor node localization is a basic and key problem in sensor network work and management, and the self-localization of the sensor node is the basis for sensor network applications. This paper classifies and compares with several localization algorithms currently used, presents a node localization algorithm based on mobile anchor node, to reduce the communications and computing cost of the wireless...
Currently, in the MAC protocol of wireless sensor network, the sender mote sends data with or without receiving acknowledgements (ACK). Although in some applications, people enable the ACK function, they just use the fixed repeat times. In such scenarios, the sender mote does not care about the quality of the channel when they have to send the data. However, in the real world, the channel may not...
Target localization and tracking is the canonical application of Wireless Sensor Networks. Unlike a centralized system, a sensor network is subject to a unique set of resource constraints such as limited on-board battery power and limited network communication bandwidth. So the traditional tracking algorithm can be directly used in WSN. Therefore efficient localization algorithms that consume less...
Along with the infiltration of wireless sensor network in every field of our life, sharing sensor network resources in Internet environment is one of key problems which must be solved by wireless sensor network application. This paper expounds Web Service technology and uses Web Service technical framework for reference to design a new kind of service-oriented sensor network structure. And finally,...
Localization is one of the most important issues in wireless sensor networks, especially for the applications requiring the accurate position of the sensed information. As one of the well known range-free localization algorithms DV-Hop can be simply implemented in real wireless sensor networks without any range measurement tools, but it has bad localization accuracy in asymmetry distributed wireless...
Video is an important medium for the observation of a variety of phenomena in the physical world such as for water conservancy engineering. Video sensor networks (VSN) consists of a large number of sensor nodes with cheap CMOS cameras, therefore, it has the ability of large scale visual monitoring. However, a kind of powerful and scalable platform is urgent for simulation and development of VSN. This...
The data collected through high densely distributed wireless sensor networks is immense. The asymmetry between the data acquisition and information processing makes a great challenge to the restriction of energy and computation consumption of the sensor nodes, and it limits the application of wireless sensor networks. However, the recent works show that compressed sensing can break through this limitation...
Multiple targets tracking is one of the challenging applications in a wireless sensor network due to targets' movement in different directions, targets' speed variations and frequent connectivity failures of low powered sensor nodes. If all the low-powered sensor nodes are kept active in tracking multiple targets' coming from different directions of the network, there is high probability of network...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
Some problems about the connectivity of wireless sensor networks (WSNs) are always important and difficult topics in research, especially the trade-off between connectivity and energy control. In this paper, we present a novel and effective method to calculate nearest neighbor nodes in three-dimensional WSNs using Poisson point field theory, which enables each node to find the kth nearest neighbor...
Routing is the process to distribute and send the packets from one node to another so as to reach the desired node in the network. In static wireless networks, the routing does not get affected by the energy constraints. We focus on the static networks and discuss the constrained multipath, distributed and load balancing routing algorithm by considering a undirected graph G(V,E) and trace the algorithm...
The watershed algorithm is the method of choice for image segmentation in the field of mathematical morphology, which is run simple, good performance and can better extract the contour of moving object. This paper used the watershed algorithm definition by immersion, and modify it, achieved good results after apply to core particles image segmentation. Experiments show that the method of watershed...
The coal mine detect and rescue robot is used for detecting the explosion environment of coal mine and rescuing miners who are trapped in the underground coal mine after gas explosion. Coal mine is a dangerous place in which many fatal factors menace miners' life, especially when blasts occurred. Rescue crews usually don't know the actual situation of the mine tunnel under such circumstances. Therefore...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.