Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Based on the Bounded Delaunay Triangulation, Sink nodes' optimal mobile path was designed using Calculating Algorithm of Collecting Blind Area. And there movement is optimized by Hierarchical Clustering Algorithm. Sink nodes' movement is controlled in dominant regions to partially receive information from S nodes, which can reduce the expense of maintenance transmission path, and guarantee the reliability...
One of the fundamental design issues in mobile wireless sensor networks is how to design efficient movement-assisted sensor deployment algorithms that relocate the sensor nodes in order to meet the desired performance goals. This survey focuses on a variety of movement-assisted sensor deployment algorithms that have been proposed and studied by researchers and highlights their strengths and limitations...
Deployment problem is how to deploy a number of nodes in the area of the network so that the covered area is maximized. In this paper we consider the problem of self-deployment of a mobile sensor network. Such networks with locomotion capability are able of self-deployment; i.e., starting from some random initial configuration, the nodes in the network can distribute such that the area `covered' by...
Security plays an important role in the ability to deploy and retrieve trustworthy data for a wireless sensor network. Secure coverage is an effective defense against attacks which take advantage of a lack of deployment information. In this work, on the basis of improved genetic algorithm, a novel algorithm is proposed to guarantee the effect of secure surveillance. Comparison and simulation results...
The recent advances in radio and embedded system technologies have enabled the proliferation of wireless microsensor networks. Such wirelessly connected sensors are released in many diverse environments to perform various monitoring tasks. The effectiveness of these networks is determined to a large extent by the coverage provided by the sensor deployment. The positioning of sensors affect coverage,...
Wireless sensor networks (WSNs) is always consist of stationary and mobile sensor nodes, sensor node deployment is one of the key topics addressed in the researches of WSNs, traditional virtual force (VF) algorithm is presented. This paper proposes a method of improved particle swarm optimization to solve the problem. The simulation results show that the improved particle swarm optimization has better...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.