The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are composed of a large number of geographically distributed sensor nodes. The goal of deployment is to optimize the number of sensors involved in coverage task while keeping preserving area coverage c. This paper addresses Areas Covered with Probability Bound. Given the system parameters, this paper provides a probability bound that estimates the likeliness of the uncovered...
Recently years research on wireless sensor networks (WSN) paid more attention to solve the localization of the wireless sensors, different algorithms had been applied, one of them is DV-Hop, which still need to be improved to obtained better position accuracy. In this paper, we propose a strategy to get accurate location from the unknown sensor using the average hopsize and average error reducing...
The high energy consumption in the local network often leads to energy hole problem in wireless sensor networks (WSNs), It easy to make the WSNs dying prematurely. The effective way is the evenness of energy consumption of each node. Unlike other existed schemes, we sliced the circular field into concentric circular bands of fixed width. By combining the direct transmission protocol and hop-by-hop...
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. This paper discusses about digital watermarking technique in vehicle acoustic signals for vehicle identification using Wireless Sensor...
Energy efficiency has been known as the most significant problem in all facets of the wireless sensor network operations. For large scale WSN deployed in the battlefield it is necessary to consider energy depletion imbalance, extra overhead and delay brought by the increase of the hop number when designing energy-aware routing scheme. This paper presents a novel routing scheme (Cooperative Robust...
RS485 is an important communication protocol during CPU and external communication device, which is widely used in monitor-control system and project application. DS18B20 is used to test temperature in the sensor of temperature and humidity based on 89S52 MCU. ADC0831 is extended to convert the output signal of humidity sensor-NKHT, from which humidity value can be got. The value of temperature and...
As one kind of new technology, wireless sensor network has a wide application area such as military, environment monitoring, object tracking, science observing and forecasting. Resource optimization is the important problem in the development of the wireless sensor networks. Through the deep analysis of existing resources optimization algorithm, the paper used method to mesh the continuous wireless...
In order to improve the energy cost of data transmission in wireless sensor network (WSN), we propose a new method to construct wireless sensor network topology based on small world concept. We add some certain high energy nodes (H-sensor) in the network and create a few of long-range links between the sink and H-sensors, called shortcuts which act as the long links required in small world network...
Wireless sensor networks usually operate in open and unattended environments without infrastructure; hence, they are vulnerable to physical attacks. In false report injection attacks, adversaries inject false reports into networks by using compromised nodes in these networks. Such attacks cause not only false alarms, but they also shorten the network's life. The statistical en-route filtering scheme...
High dense dust and gas in the underground environment or in the long distance tunnel is harmful and dangerous to the workers and drivers. Based on wireless sensor network we use a hybrid monitoring system to realize real-time and unmanned guard monitoring and lowering the potential safety hazard. We analyze the energy efficiency of S-MAC, T-MAC and B-MAC. The simulation results show that B-MAC is...
In order to better meet the demand of monitoring indoor environmental quality in some applications, this paper presents a scheme of design and implementation of indoor environmental monitoring system based on JN5139 SOC. The system takes full advantages of ZigBee technology of JN5139 SOC chip in wireless sensor network design and implementation to realize the hardware design of wireless sensor nodes...
Energy is a key concern in sensor networks as sensor nodes have a limited battery power and can not be replaced. In order to conserve energy efficiently, we proposed a sink movement scheme by traversing the whole network region to gather data from sensors within one or two hops along an Archimedean spiral trajectory. As the trajectory has a constant linear velocity and angular velocity, the sink can...
It is widely known that in wireless sensor networks (WSN), energy efficiency is of utmost importance. WSN need to be energy efficient but also need to provide better performance, particularly latency. A common protocol design guideline has been to trade off some performance metrics such as throughput and delay for energy. This paper presents a novel MAC (Express Energy Efficient Media Access Control)...
M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large...
Sensor Networks are deployed in many fields for its convenience and feasibility, while the limited energy and the uncertain topology bring a difficult problem to provide QoS guarantees in real applications. There are less widely valid and accepted methodology for modeling and estimating the performance of sensor networks. Some approaches have been proposed to provide a worst-case performance analysis...
The paper summarized the routing protocol of wireless sensor network, and then compared the opportunistic routing protocol with traditional routing protocol. The paper proposed an improved method for transmitting candidacy set and collaboration process in the opportunistic routing protocol.
A wireless sensor node is often powered by battery which is not easily replaced, so researching how to use its limited energy effectively is the meaningful thing for wireless sensor networks (WSNs). Dynamic voltage scaling (DVS) has become a promising way for wireless sensor networks to exploit multiple voltage and frequency levels and prolong the sensor node's life. However, pure DVS for embedded...
Wireless sensor networks (WSN), as a cutting-edge techniques in information acquisition and processing, can be widely used in many areas. WSN used in fault localization system on power grid cables is the research focus of intelligent power grid. We improve the traditional DV_Hop algorithm and propose a feasible method of failure localization which can be applied on power grid cables.
Data integrity in wireless sensor network is very important. Recent research has indicated that, due to its conservative CSMA/CA channel access scheme and RTS/CTS mechanism, it is not suitable to achieve data integrity in wireless networks. In our paper we propose a mechanism to achieve information completeness. We address this challenge by applying a search information model that associates information...
This article studies the classical MDS and dwMDS location algorithm. On this basis, the relaxation iteration method is introduced to replace SMACOF algorithm as optimization objective function. The results showed that the network connectivity increases with the increased communication radius, and it has a good effect that the relaxation method of positioning results in the node density from 2 to 4...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.