The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The identification of vessel collision risk for a Maritime Intelligent Transport System (MITS) is crucial for maritime safety and management. This paper considers the identification of the Systematic Collision Risk (SCR) for an MITS based on AIS data, which is obtained by wireless communication among vessels and between vessels and shore-based stations. SCR is modeled as a function of the collision...
Multihop communication mechanism has been widely employed in wireless sensor networks (WSNs) for its practicability and high energy efficiency. However, hot spots emerge as locations, in which nodes die quickly because of heavy relay load, leading to disruption in network service. Balancing energy consumption of nodes so as to mitigate the hot spot issue in the network is very important for prolonging...
The energy limitation of a wireless sensor network is an important factor which restricts its function. Therefore, how to use the energy efficiently as well as to prolong network's service lifetime becomes a hot issue in this field. Based on the analysis that cluster-head nodes distribution of the LEACH algorithm is uneven in the space, a new corrective method named LEACH-NEW algorithm has been put...
Organizing wireless sensor networks into clusters enables the efficient utilization of the limited energy resources of the deployed sensor nodes. Oftentimes the network is organized into clusters of equal size, but such equal clustering results in an unequal load on the cluster head nodes. Instead, we propose an Unequal Clustering Method (UCM) for network organization, which can lead to more uniform...
This paper presents our work in solving one of the weakest links in 802.11-based indoor-localization: the training of ground-truth received signal strength data. While crowdsourcing this information has been demonstrated to be a viable alternative to the time consuming and accuracy-limited process of manual training, one of the chief drawbacks is the rate at which a system can be trained. We demonstrate...
Data sending model in cluster has great impact on life of wireless sensor networks. In this paper, the data sending models were researched and a novel CIBT (Confidence Interval Banding Taboo-level) of data aggregation in cluster was formally described, designed, implemented and evaluated. The algorithm includes two stages. In first stage, the sampling data is used to set confidence interval to compare...
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.