The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, several studies have considered the use of mobile sink (MS) for data gathering in wireless sensor networks. As, it can enhance lifetime of the sensor network by distributing load among the sensors. In some delay-critical applications, a mobile sink is allowed to move along a predefined path. However, due to the predefined path and relatively slower speed of mobile sink, data gathering from...
Time series prediction techniques reduce the number of messages generated at the application level, saving energy spent in the communication and, consequently, extending the network lifetime. Trickle is a well-known time series prediction mechanism commonly used to decrease the number of transmitted messages in Wireless Sensor Networks (WSN) and thus save energy. This paper presents the Space-Time...
Since our research to study mobility, we noted that the best way to represent the mobility of sensor nodes is to follow a mobility model. Numerous models have been proposed in the literature, they are commonly used as a data source in all kinds of studies, including motion in several networks. To this end, we propose to exploit this mobility, which results in the proposal of a new approach based on...
Data reduction is one of the most attractive way to conserve the limited energy resources of wireless sensor networks (WSNs). It aims to remove unnecessary data transmission. Therefore, data prediction and reduction mechanisms must be deployed at the source node in order to eliminate the redundant sensed data before sending them to the sink. In this paper, an energy efficient periodic distributed...
Multi-level clustering offers the scalability that is essential to large-scale ad hoc and sensor networks in addition to supporting energy-efficient strategies for gathering data. The optimality of a multi-level network largely depends on two design variables: 1) The number of levels, and 2) The number of nodes operating at each level. We characterize these variables within a multi-hop, multi-level...
Although there are several tools available to simulate a Wireless sensor networks (WSN), few of them allow on-line simulation as WebShawn does. The tool can be considered as a complement of the existing experimental platforms allowing focus on implementation, collection, and analysis of data, in a relatively simple manner. The adopted software architecture is based on the remote simulation and visualization...
In wireless sensor networks, sensor nodes are often deployed intensively within the sensing area in order to achieve effective monitoring, resulting in a high degree of correlation between them. There is a certain variation rule between node acquisition data and time. The current time correlation will result in an abundance of redundant data within the sensing area, so eliminating data redundancy...
In order to improve the accuracy of laser radar for dynamic obstacle detection, and ensure the safety of autonomous vehicles, the method of dynamic obstacle method of wireless sensor and 3 dimensional laser radar Velodyne based on information fusion of vehicle identification and a multi feature detection and tracking are put forward. A preliminary model of mobile obstacle is established by using lidar,...
In this paper we present a new approach to reduce the amount of required data transfers in wireless sensor networks by distributed in-network processing of spatial sensor data. The measurements of local clusters are described by a model consisting of a set of Virtual Sensors (V S). Quasi optimal positions of the VS in-between real sensors are calculated on sensor nodes, which act as cluster heads...
Wireless sensor networks query processing is useful for sensing systems, such as environmental monitoring. Innetworks query processing is attracted by researchers to develop user-friendly sensing systems. Due to the sensors considered as a limited resource and battery powered devices, more robust features are recommended to limit the communication access to the sensor nodes for maximizing the sensor...
This paper focuses on cyber infrastructures composed on sensor networks and conventional host-based systems and applications. In such an infrastructure, assuring data trustworthiness is critical and requires the acquisition and recording of provenance information. This paper discusses research directions to be addressed towards the development of effective provenance management systems. Directions...
Infrastructure monitoring is an important class of wireless sensor network (WSN) applications. When the topology of a WSN designed for infrastructure monitoring is linear in nature, such as bridges, highways and pipelines, this kind of WSN is known to be linear WSN (LWSN). To achieve the high-reliable infrastructure monitoring services, hybrid LWSN has been designed where a limited number of support...
this paper introduces a new generation an error modelling of wireless indoor localization. A newly designed algorithm modelling by using Kalman Filter is developed to optimize the wireless indoor localization system based on iBeacon sensors. It is designed to detect and minimize the errors. Matlab simulations, implementation, and validation are presented in the paper.
Wireless sensor networks (WSNs) are installed in the terrain for observing the physical and environmental parameters. The nodes in the network are resource constrained in nature and faces several challenges for producing the data from the unfriendly environment. Large amount of data is generated from WSN and suffers from data fault, inaccuracy and inconsistency. To increase the reliability of application,...
In disaster situations, the coordination of rescue missions is a difficult task. The person in charge makes decisions under pressure, which could lead to inappropriate instructions to rescuers and could cost many lives. The aim of DisVis 2.0 approach is to release pressure from those responsible by providing decision support using predictive human-centric disaster simulations for infrastructure-less...
In recent years, the research about energy waste and CO2 emission reduction has gained a strong momentum, also pushed by European and national funding initiatives. The main purpose of this large effort is to reduce the effects of greenhouse emission, climate change to head for a sustainable society. In this scenario, Information and Communication Technologies (ICT) play a key role. From one side,...
This article proposes a novel data gathering scheme for wireless sensor networks to reduce energy consumption for a prolonged network lifetime. Data gathering is modeled as random node sampling method, where fusion center collects data from arbitrarily deployed randomly selected nodes and takes the global decision. We evaluate performance of our method with metrics: energy consumption and error performance...
The instability of wireless links makes the choice of forwarding nodes have too many possibilities in opportunistic routing. In this paper, the Markov decision process (MDP) is used to model the whole packet forwarding process from the source node to the destination node, which facilitates making reasonable decisions when the sender selects the forwarding nodes. By solving a finite-state MDP problem,...
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to...
With the arrival of big data era, data mining techniques have been widely used to build models for cyber security applications such as spam filtering, malware or virus detection, and intrusion detection. This project proposes a novel approach that uses randomness to improve robustness of data mining models used in cyber security applications against attacks that try to evade detection by adapting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.