The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks can be used to improve both safety critical and unsafety critical aircrafts systems. Using wireless sensor networks can help to increase the number of sensors as well the system redundancy and also helps to reduce the aircraft system weight and complexity, improving the fuel efficiency and maintenance costs. Supporting standard protocols in all wireless sensor nodes simplifies...
The usage of wireless sensor networks (WSNs) to monitor a region is an important functionality in defense and security applications. In these applications, a fundamental issue is to determine the minimum degree of coverage in the concerned region. The past researches focus on the binary disk sensing model, where sensors are assumed to be accurate in detecting targets within their sensing ranges. In...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
An important characteristic in trust management frameworks is how nodes obtain information about the trustworthiness of other nodes. Some trust management models are based on local information, while others use both information of neighbors and remote nodes. Despite the wide of information used, the existing trust monitoring approaches are mainly based either on passive monitoring mechanisms or on...
Powered by digital transmission advances in recent years, wireless sensor networks (WSNs) are beginning to experience a boom in different areas. Of special interest are those applications offering real-time tracking and monitoring of objects in motion, both indoors and outdoors. A WSN can have a large number of nodes, each with multiple neighbor nodes. These nodes work together to create a self-configuring...
Exposure problem, which corresponds to the quality of coverage, is a fundamental problem in wireless sensor networks. In this paper, we exploit a cellular computing model in the physarum for solving the minimal exposure problem. We first use the road-network among all points of interesting (PoIs) in the monitoring filed to formulate the minimal exposure problem, and then convert it into the Steiner...
Wireless sensor networks have been used for a variety of purposes such as habitat monitoring, malicious target detection, and climate observation. Conventionally, stationary sensors are used to carry out sensing tasks in a region of interest. However, if the region is much larger than the sensing range of a single sensor, stationary sensor networks could incur many problems such as the complicated...
Wireless Visual Sensor Networks (WVSNs) consist of a set of camera sensor nodes each of which equips with a camera and is capable of communicating with the other camera sensors within a specific distance range. As an extension of wireless sensor networks (WSNs), the WVSNs can provide richer information such as image and picture during executing targets monitoring and tracking tasks. Since the sensing...
We design new cellular automaton based algorithms to improve coverage in a network with mobile sensors. The algorithms can be useful in applications where sensors are initially deployed in one place and need to disperse to the environment autonomously, or in situations where in certain areas sensors may be destroyed (e.g. due to a natural disaster), and the sensors need to use their mobility in order...
In IEEE 802.16 e/m mobile broadband wireless systems, mobile subscriber stations (MSSs) are encouraged to enter the sleep mode for energy saving when end users do not have downstream or upstream traffic. To avoid service disruption of an MSS which stays in the sleep mode, IEEE 802.16 e/m specifies a two-way handshake protocol between the base station (BS) and an MSS. After performing the handshake...
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. The operation of V2G networks is based on continuously monitoring the status of individual EVs as well as a designed incentive scheme to attract sufficient participating EVs. However, the close monitoring might raise privacy...
In trust-based models for MANETs, it is often assumed that the trust value between two nodes decays proportional to the time these nodes are out of transmission range of each other. We present in this paper an analysis of the trust decay rate for some general networking and trust computation models. Our analysis allows for the consideration of the subjective trust values assigned by present and past...
Previous research of barrier coverage did not consider breadth of coverage in Wireless Visual Sensor Networks (WVSNs). In this paper, we consider breadth to increase the Quality of Monitor (QoM) of WVSNs. The proposed algorithm is called Distributed β-Breadth Belt-Barrier construction algorithm (D-TriB). D-TriB constructs a belt-barrier with β breadth to offer β level of QoM, we call β-QoM. D-TriB...
Body Area Networks (BANs), targeting everywhere anytime health monitoring, operate in license-exempt frequency bands. They require a cross layer design that jointly considers the requirements of (1) access delay to the medium and (2) packet delivery ratio (PDR). In this paper, we experimentally evaluate the PDR of a BAN under static and dynamic scheduling schemes. Investigations show that static multi-hop...
In this paper, we explore the use of wireless mesh networks (WMN) for the purpose of exchanging GPS raw data within GPS stations in a WMN to support real-time in-network processing of low-cost single-frequency GPS devices. A proof of concept deployment with a small number of GPS stations was studied. This experiment validates the feasibility of using WMN to enable real-time in-network processing in...
To enhance the capacity of patients supported by wireless in-hospital monitoring systems, a bandwidth allocation scheme for the transmission of medical data in the wireless local area network (WLAN) is proposed. The problem of bandwidth allocation, subject to limited wireless bandwidth, quality of service (QoS) requirements of medical data transmission, as well as electromagnetic interference, is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.