Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As High Frequency token protocol (HFTP) doesn't take the air node into consideration, a new High Frequency token protocol with reserve (HFTP-R) for multiple access (MAC) layer of the High Frequency (HF) ground-to-air IP network is put forward and its access and control process is described. HFTP-R lets air node join in the cluster organized by ground node randomly during initialization period, meanwhile...
In order to resolve the problems of reducing the data transmission and prolonging the network lifetime of the wireless sensor network (WSN) in the case of the nodes deployed randomly, this paper puts forward a cluster compressive data gathering (CCDG) method based on pretreatment. The method can be realized through the following two steps: Firstly, the original sensor readings received from all nodes...
Self-organizing desynchronization in wireless sensor networks leads to near-optimal time-division multiple access (TDMA) behavior in the network's steady-state, without requiring a coordinator node. In order to increase bandwidth utilization, desynchronization can be extended to multi-channel MAC protocols. In this paper, we proposed a new protocol for the medium access control layer of IEEE 802.15...
Because of different characteristics, the performance of traditional mobile ad hoc networks (MANETs) routing protocols is demonstrated poor in vehicular ad hoc networks (VANETs). Therefore, many routing protocols have been designed for VANETs during past few years. Most of these protocols utilized vehicular traffic to find optimal routing paths in urban environments. Although choosing the road segments...
A multi-channel approach for MAC protocols is one of the most significant issues in recent research trend of WSNs. Numerous studies on multi-channel MAC protocols have focused on how to select and allocate channels efficiently to links or nodes. However, existing studies do not consider interferences from different communication technologies in the same band such as IEEE 802.11 in ISM band. In addition,...
In this paper the nodes in a WSN are considered as the sinks dealing with different applications, which hieratically make up the network application. Ontology is used to semantically describe the application, so that nodes directly process and transmit application rather than data. Based on application semantics, a new hybrid application semantic MAC (AS-MAC) is put forward. Nodes send sub-tasks containing...
This paper examines the efficiency of a simple distributed algorithm, called Round-2, for further decreasing the size of connected dominating set (CDS) in ad hoc networks and evaluates its performance based on neighbors-covered and neighbor-pair-connected algorithms under two categories of local static priority information: node-identifier-based and node-degree-based. The Round-2 algorithm decreases...
Due to the limitation of the energy, the performances and applications were constrained of the pure batteries powered wireless sensor networks (WSNs). WSNs with energy harvesting extracting energy from the surrounding environment, supplement energy to the sensor nodes, can be significant prolong the lifespan of WSNs, or even make WSNs running for perpetual. In order to determine the node energy harvesting...
LEACH based routing protocol is a mature technology in the environment of tiny and static wireless sensor network. In most study of mobile WSN, the improved LEACH protocol only considered the mobility of member nodes. TLEACH protocol proposed in this paper implemented the establishment and maintenance of hierarchical topology in an environment that all nodes are mobile. The protocol using tree routing...
Wireless sensor network (WSN) applied on bridge health monitoring has attracted considerable attention for its advantages such as self-organization, micro-structure, low cost and high flexibility. The performances of WSNs are extremely correlated with application scenarios and even the same protocol may results in an obvious performance difference on various applications. However, no one has studied...
Industrial Wireless Sensor Networks (IWSNs) consist of a central manager, gateways and field devices with sensing, signal processing and wireless communication capabilities. Convergecast is a many-to-one industrial communication paradigm which is used for process measurement and control applications. Convergecast scheduling in IWSNs is to determine the smallest length conflict-free assignment of timeslots...
Energy efficiency (EE) is an important factor for the deployment of wireless sensor networks. Cooperative communication can help to reduce energy consumption for long distance data transmission. This paper mainly presents the optimal power allocation scheme for cooperative communication in wireless sensor networks. We formulate the EE maximization problem with power constraint, and show that this...
A wireless sensor network is composed of randomly dispersed nodes capable of collecting and transmitting physical data to a central node. Communication protocols are responsible for maintaining the routs in the network as well as for ensuring reliable inter-node communication. The main focus of this work is to analyze the performance of both reactive routing protocols mainly Ad hoc On Demand Distance...
As wireless sensor networks are constituted of nodes with limited life batteries, energy efficiency is a very important metric at all levels of system design. Therefore, performing optimal modulation schemes is a crucial task at the physical layer of this class of networks. This paper investigates the best modulation strategy to minimize the total energy consumption required to send a given number...
In recent years, the Android operating system for mobile terminals has developed very quickly. A variety of mobile devices which are using Android operating system are more than 60% in the domestic market share. With the number of Android application raising fast, a variety of information leakage, malicious chargeback, failure of operating system events occurred frequently; the safety of Android system...
Mobile devices have become high-value attacked targets since they contain numerous private or business information. Android, the most popular mobile computing platform, also known for its openness, is facing various threats from system vulnerabilities to malicious applications. After analyzing Android's security model and threat, we summarize the technic possibility for remote or physical attacks,...
With the gradual research on authentication issues, many researchers began to apply chaotic maps. Chaos theory has many good properties. It can achieve fast computing, and the time of encryption and decryption can be shortened to ensure smooth communication. Meanwhile, smart card technology is becoming a more practical technology. It has capabilities of security, confidentiality and identification,...
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode...
It analyzed three troposphere mapping functions, Niell Mapping Function (NMF), Vienna Mapping Function 1 (VMF1) and Global Mapping Function (GMF), and its parameters selection and characteristics paralleled. Also it presented the thumb rule in troposphere mapping function and designed a two way time transfer method based on troposphere mapping functions. Besides it studied the station height errors...
In the recent days, the exponential growth in functionality of mobile devices leads the manufacturers to develop more and more sophisticated microprocessors and microcontrollers. The power requirements of the microprocessors are increasing day by day along with the processing speed and chip area. So, rather than traditional number systems, Residue Number System (RNS) is becoming attractive for their...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.