The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we consider an IEEE 802.15.4-based Wireless Body Area Network, where wearable sensor devices are distributed on a body and have to send the measured data to a coordinator. The Carrier Sense Multiple Access with Collision Avoidance algorithm defined by the standard is used as Medium Access Control protocol, whereas different modulation schemes are assumed to be available at the physical...
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms to improve the reception of a signal. For receive collaboration, the transmission power during intra-cluster transmissions decreases at the expense of increasing the inter-cluster communications. It is shown that, as a result of using receive collaboration, the destination...
Due to the severe resource constraints of sensor hardware, energy efficiency is one of critical factors for monitoring the movement of the large-scale phenomena such as wild fire and hazardous bio-chemical material, denoted by continuous objects. In order to save energy, most of existing research on tracking the continuous objects focuses on finding the ways to minimize the communication cost through...
In this paper, inspirations from behavioral ecology are applied for mobile agent assisted data collection in a Wireless Sensor Networks (WSNs). With the help of the marginal value theorem based strategy (MVTS), each observation (Λ), which is gathered by a given sensor node, is considered as a marginal information source with a relative entropy H(Λ). The mobile agent exploits the correlation and chooses...
In this paper we discuss the application of multiple-wireless technology to a practical context-enhanced service system called ViewNet. ViewNet develops technologies to support enhanced coordination and cooperation between operation teams in the emergency services and the police. Distributed localisation of users and mapping of environments implemented over a secure wireless network enables teams...
In this paper, we study the problem of random field estimation with wireless sensor networks. We adopt a Quantize-and-Estimate encoding scheme and focus our attention on two scenarios of interest: delay-constrained networks, in which the observations collected in a particular timeslot must be immediately encoded and conveyed to the Fusion Center (FC); and delay-tolerant (DT) networks, where the time...
In wireless sensor networks, with respect to a desired time deadline real-time data dissemination schemes achieve that by a spatiotemporal communication approach forwarding data from a source to a destination with a delivery speed. The delivery speed is typically obtained from both the static distance from the source to the destination and the interval of the time deadline. However, in case of real-time...
There have been many routing protocols proposed for data dissemination to multiple mobile sinks in Wireless Sensor Networks (WSNs), and the protocols regard each sink as an individually distributed single entity without relationship of each other. Recently, mobile group entities have been introduced in WSNs. A number of mobile sinks move together in a group manner, and mobile sinks in the group stay...
Mobile sink brings new challenges to densely deployed and large wireless sensor networks (WSNs). When the sink moves, frequent location updates from the sink can generate excessive power consumption of sensors. In this paper, we propose IAR, an Intelligent Agent-based Routing protocol that provides efficient data delivery to mobile sink. Proposed algorithm reduces signal overhead and improve degraded...
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist in...
In recent years, wireless sensor networks (WSN) have a wide application prospects. So it has attracted great interests in several related research fields and industries. Based on the characteristics of DV-Distance and centroid location algorithm, a novel hybrid localization algorithm based on DV-Distance and the twice-weighted centroid in wireless sensor network is proposed. The main principle of...
In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may seriously hinder this operation. In the paper, we perform a practical evaluation of an existing randomized consensus protocol that is resilient to...
For the increasing demand on campus network, IPv6 (Internet protocol version 6) is going to replace the IPv4 protocol. IPv6 is playing an important role in many fields. Wireless sensor networks (WSNs) are undergoing rapid progress and attracted the attention of both the academic and the industrial research community in the last few years. This paper reports on the development of these protocols at...
In this paper, based on a web page to determine similarity is proposed which is based on semantic web similarity judgments. First on the web page of text extraction, is text segmentation, also taking stop words to go out, Similarity judgments for the Web page provides a basis. Then based on Vector Space Model using TF-IDF method similar to the Chinese website text judgment, In the process of judging,...
LEBKM for Wireless Sensor Networks (WSN) is proposed in this paper, which employs the localized strategy. The key for each node is integrated from two keys separately provided by other two key managements. Once the nodes have been deployed, the localized strategy is adapted to update the pre-distributed keys in nodes within the same cluster. The resilience of the network is significantly enhanced...
Sensor networks are consisting of sensor nodes with limited battery power and wireless communication modules on it. They are deployed to collect the useful information from the field. Topology control is very critical to operate the sensor network for a long period of time. When being deployed, ad-hoc and sensor networks are unstructured and lack an efficient and reliable communication scheme. For...
Faulty components in a wireless sensor network need to be localized and repaired to sustain the normal operation of the network. Due to the inherent stringent bandwidth and energy constraints, we consider only use end-to-end measurement to infer lossy links in sensor network. In this paper, we formulate the problem of lossy links localization as a Bayesian inference problem, and use max-product algorithm...
Sensor node localization is a basic and key problem in sensor network work and management, and the self-localization of the sensor node is the basis for sensor network applications. This paper classifies and compares with several localization algorithms currently used, presents a node localization algorithm based on mobile anchor node, to reduce the communications and computing cost of the wireless...
Currently, in the MAC protocol of wireless sensor network, the sender mote sends data with or without receiving acknowledgements (ACK). Although in some applications, people enable the ACK function, they just use the fixed repeat times. In such scenarios, the sender mote does not care about the quality of the channel when they have to send the data. However, in the real world, the channel may not...
Target localization and tracking is the canonical application of Wireless Sensor Networks. Unlike a centralized system, a sensor network is subject to a unique set of resource constraints such as limited on-board battery power and limited network communication bandwidth. So the traditional tracking algorithm can be directly used in WSN. Therefore efficient localization algorithms that consume less...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.