The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Twitter is a pervasive technology, with hundreds of millions of users serving as sensors that provide eyewitness accounts of events on the ground. In case of popular events, these sensors start to broadcast news by tweeting to their followers, and to the world. Within minutes these tweets can attract attention and also serve as a primary information source for traditional media. Given a huge set of...
Understanding where to place static sensors such that the amount of information gained is maximized while the number of sensors used to obtain that information is minimized is an instance of solving the NP-hard art gallery problem (AGP). A closely-related problem is the watchman route problem (WRP) which seeks to plan an optimal route by an unmanned vehicle (UV) or multiple UVs such that the amount...
Under the influence of the lighting condition and some character of water media, the underwater images have low contrast, unbalance gray scales, fuzzy edge of objects and large quantity of noise which will appear with the movement of vehicle. For the mentioned above factors, when traditional methods are used to dispose underwater images, the regions of objects can’t be located exactly, details of...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Many real-time communication protocols have been studied to guarantee the communication requirements of distributed real-time systems. But, current techniques lack all or most of these requirements specially bounded message delivery time. In this paper we have proposed a Mac layer protocol called RDM+ with concepts similar to Round Data Mailer multi layer protocol. Our simulation results show that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.