The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with the infiltration of wireless sensor network in every field of our life, sharing sensor network resources in Internet environment is one of key problems which must be solved by wireless sensor network application. This paper expounds Web Service technology and uses Web Service technical framework for reference to design a new kind of service-oriented sensor network structure. And finally,...
The massively growing demand for bandwidth-consuming real-time applications such as voice and video, added to the need of QoS being guaranteed are the main motivation of this work. In this paper we propose a new medium access mechanism that improves the performance of IEEE 802.11e EDCA wireless networks by minimizing the collision probability while maintaining high transmission probability. This was...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
System capacity is an important factor that affects the performance of WiMAX system where the amount of data that can be delivered to the end user is determined based on the system capacity and users QoS requirements. This scenario is even more complex when multi-hop relays are introduced into the network whereas the user access capacity decreases with the increase of hop number. In order to maintain...
Call admission control schemes are crucially important concepts in researches on cellular mobile networks. One of them is the new thinning scheme. In this study we define a confidence interval for threshold and the numerical results show the performance of the scheme in defined interval. Also we discuss the sensitivity of the scheme (in sample-based sensitivity method) at different thresholds. The...
The main objective of this proposal is to automate control and communication systems of the train using High Performance Multi-core Embedded Processors (MCEP). This method will overcome the difficulties faced by the existing methods such as detecting cracks at rails, monitoring distance between rails, compartments monitoring, fire and smoke monitoring in compartments, and controlling of motors, transformers,...
In this paper, we briefly describe the wireless sensor network(WSN), and highlight the design of RF antenna with a gain based on nRF905 chip, then complete an intelligent greenhouse monitoring system for agricultural greenhouse temperature based on WSNs. Finally, we confirm the feasibility of the system design through some tests.
Combining with the characteristics of Underwater Acoustic (UWA) channel, this paper puts forward an improved MACA protocol. Based on the Multiple Access with Collision Avoidance (MACA) used for wireless communication networks, we review MACA with some related literatures at first and then analyze and improve the performances of MACA respectively from three aspects including presenting an effective...
Mobile ad hoc networks are self organizing multi-hop wireless networks with no fixed infrastructure. All the users in these networks are mobile. The mobiles communicate either directly or via other nodes of the network by establishing routes. The mobility of nodes causes the existing links to be break frequently. So if we can predict future movement, the resources reservation can be made before be...
Recent advances in Wireless Sensor Networks (WSNs) make them more important to apply. Therefore, security issues are more significant in WSNs. WSNs are susceptible to some types of attacks since they are consisted of cheap and small devices and are deployed in open and unprotected environments. In this research, an Intrusion Detection System (IDS) created in cluster head is proposed. The proposed...
There is a large number of serial data in the actual industrial production. It is common knowledge that the dependence on the length of the serial line of data transmission constrained optimization of production control. In order to make a more intelligent and flexible industrial production, we studied how to receive serial data wirelessly via mobile devices using the methods provided by the .Net...
A standard security feature in any wireless network is user identity confidentiality. In Universal Mobile Telecommunication System (UMTS), there are circumstances where this important security feature is compromised due to transmission of the International Mobile Subscriber Identity (IMSI) in clear-text over the radio interface. Such situations defy anonymity of users. In addition, it is assumed that...
Routing protocol as one key technologies of wireless sensor networks has been a hot research. Because the applications of wireless sensor networks everywhere, it is impossible that there is a routing protocol suitable for all applications. In this paper, the applications are divided into five categories and illustrated respectively. Then the common routing protocols that DD, LEACH, SPEED, GEAR and...
In recent years, greenhouse technology in agriculture is to automation, information technology direction with the IOT (internet of things) technology rapid development and wide application. In the paper, control networks and information networks integration of IOT technology has been studied based on the actual situation of agricultural production. Remote monitoring system with internet and wireless...
As China's continuous improvement in the degree of information, the wireless communication network has covered all regions of the country, and information has also brought a great deal of information network security issues. In this paper, firstly, the information security emergency response procedures and disposal system are proposed according to the comprehensive analysis of weak links in information...
Object or region based image processing can be performed more efficiently with information pertaining locations that are visually salient to human perception with the aid of a saliency map. The saliency map is a master topological map having the possible locations of objects or regions which a human perceived as important/salient. In this paper, a method to compute the saliency map in the wavelet...
The main objective of this paper is to implement a precoded Zadoff-Chu OFDM to reduce the Peak to Average Power Ratio (PAPR) and for frequency offset estimation in Wireless Local Area Networks. High PAPR and Carrier Frequency Offset are major disadvantages to the Orthogonal Frequency Division Multiplexing (OFDM) systems and can significantly degrade the power efficiency at the transmitter and performance...
One of the most important problems in wireless sensor networks is Energy-efficiency Routing Protocol Design. In This Work We propose a hierarchical Clustering Method For energy conservation in Wireless Sensor Networks. first, we divide the sensor nodes to Small Size clusters and determine a cluster head for each cluster in the network. The residual energy and distance to BS are parameters for CH election...
According to the current key management scheme exist large computation, trusted centre and key update cycle size is difficult to determine problems, we proposed a scheme that is based on ECC fully self-organization Ad hoc key management in this paper. The scheme use ECC instead of RSA for large computation; in order to solve trusted centre, we use fully self-organization; by using a double key update...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.