The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent times have seen an exponential increase in the use of artificial intelligence in numerous regions. Fields like education, transport, finance, and health have made drastic improvements in the last decade; from predicting the stock market prices and driverless cars to predicting cancer cells in human body. Artificial intelligence and Machine learning combined, have shaped the world to be a better...
In this paper we propose event goodput, i.e., the fraction of events which may be successfully managed by a system, as a relevant metric to describe the performance of battery powered real-time sensor networks. Unlike other performance metrics as response, completion, maximum lateness times, all representing fundamental, but different, figures of merit for the description of the behavior of real-time...
Cross Technology Interference (CTI) is a prevalent phenomenon in the 2.4 GHz unlicensed spectrum causing packet losses and increased channel contention. In particular, WiFi interference is a severe problem for low-power wireless networks causing a significant degradation of the overall performance. We propose here a proactive approach based on WiFi interference modeling for accurately predicting transmission...
Sensor networks have been widely used in environment monitoring. Although there are some related works about water pollution monitoring and water pollution source localization using sensor networks, there are many problems which have not been solved so far. In this paper, the current research status on water pollution monitoring and water pollution source localization in sensor networks is illustrated...
The collaborative recommendation mechanism is beneficial for the subject in an open network to find efficiently enough referrers who directly interacted with the object and obtain their trust data. The uncertainty analysis to the collected trust data selects the reliable trust data of trustworthy referrers, and then calculates the statistical trust value on certain reliability for any object. After...
Designing a group key management scheme for group communication in wireless sensor network is a challenging task given the limited energy, computational power and memory of the sensor nodes. A group key management scheme should satisfy backward secrecy and forward secrecy security requirements in case of sensor revocation and new sensor join respectively. All the existing schemes are analyzed for...
Tasks to be carried out in maritime are usually expensive due to the use of the manned vessels with large operational crews that includes the safety of life and property at sea environment. Utilization of drones has potential to significantly improve the efficiency and safety of marine and offshore operations. Examples include remotely operated inspection for navigation, surveillance or monitoring...
Using the channel utility factor, in this work an analytical model for wireless networks IEEE 802.11 is proposed to calculate the delay experienced while serving a request in the scheduler part. The proposed delay sensitive scheduling algorithm considers the nature of the data. The delay incurred due to scheduling overhead is analyzed in order to address unfair treatment of users. The motivation behind...
In disaster situations, the coordination of rescue missions is a difficult task. The person in charge makes decisions under pressure, which could lead to inappropriate instructions to rescuers and could cost many lives. The aim of DisVis 2.0 approach is to release pressure from those responsible by providing decision support using predictive human-centric disaster simulations for infrastructure-less...
Many protocols have been emerged for facing the problem of energy consumption in the wireless sensor network (WSN). Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is one of these protocols, which achieved a lot of spreading. In this paper, a dynamic multi-hop technique (DMHT-LEACH) protocol is proposed based on the LEACH protocol. The DMHT-LEACH protocol suggests a dynamic technique for...
Current Nyiragongo Volcano observatory systems yield poor monitoring quality due to unpredictable dynamics of volcanic activities and limited sensing capability of existing sensors (seismometers, acoustic microphones, GPS, tilt-meter, optical thermal, and gas flux).The sensor node has limited processing capacity and memory. So if some tasks from the sensor nodes can be uploaded to the server of cloud...
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to...
Device-free localization (DFL) is an emerging wireless network target localization technique that does not need to attach any electronic device with the target. It is remaining as a challenging research problem due to the weak wireless signals and the uncertain wireless communication environment. In this paper, a novel Gaussian Process (GP) based wireless propagation model is proposed to describe...
The paper addresses the problem of efficiently monitoring environmental fields in a smart building by the use of a network of wireless noisy sensors that take discretely-predefined measurements at their locations through time. It is proposed that the indoor environmental fields are statistically modeled by spatio-temporal non-parametric Gaussian processes. The proposed models are able to effectively...
With the arrival of big data era, data mining techniques have been widely used to build models for cyber security applications such as spam filtering, malware or virus detection, and intrusion detection. This project proposes a novel approach that uses randomness to improve robustness of data mining models used in cyber security applications against attacks that try to evade detection by adapting...
In this paper, the Discrete Controller Synthesis (DCS) technique is applied in order to obtain a correct-by- construction automatic distributed scheduling of Wireless Sensor Network (WSN). Our approach starts from an abstract formal model considering that communication between nodes are instantaneous. Then, a refined model is obtained by adding a realistic communication mechanism while preserving...
Sensor data is extremely important to monitor machines at the shop-floor level and its environmental surrounding conditions for condition-based monitoring, machine diagnosis and process adaptation to new requirements. Based on the described scope, self-diagnostics and self-organizing capabilities are core functionalities of any Industrial Wireless Sensor Network (IWSN). In the present work, a simulated...
In the Era of the Internet of Things (IoT) the validity of sensing coverage is of utmost importance as it affects the reliability of sensing services. The presence of anchor misplacement poses a challenge on the validity of sensing coverage. This kind of challenge has generally been overlooked in sensing coverage research. In this paper, we investigate the sensing validity under several scenarios...
In this paper we consider Underwater Sensor Networks (UWSNs) employing nodes that move freely with water currents. Localization of nodes in UWSNs depends on collaborative work of nodes in the network since GPS signals fade quickly underwater. Using the concept of probabilistic graphs to capture node location information, we formalize a problem called the Probabilistic Localization Problem (P-LOC)...
Science and technology are progressing with the speed which seems to be unfamiliar to us. What seems to be science-fiction some 30 years ago is now becoming our everyday reality. 3-D printing, O-led technology, modern communication, smart materials, mind recognition etc. How to follow the progress and all novelties and what is more, how to integrate them into the educational systems of high schools...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.