The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with the infiltration of wireless sensor network in every field of our life, sharing sensor network resources in Internet environment is one of key problems which must be solved by wireless sensor network application. This paper expounds Web Service technology and uses Web Service technical framework for reference to design a new kind of service-oriented sensor network structure. And finally,...
Localization is one of the most important issues in wireless sensor networks, especially for the applications requiring the accurate position of the sensed information. As one of the well known range-free localization algorithms DV-Hop can be simply implemented in real wireless sensor networks without any range measurement tools, but it has bad localization accuracy in asymmetry distributed wireless...
Video is an important medium for the observation of a variety of phenomena in the physical world such as for water conservancy engineering. Video sensor networks (VSN) consists of a large number of sensor nodes with cheap CMOS cameras, therefore, it has the ability of large scale visual monitoring. However, a kind of powerful and scalable platform is urgent for simulation and development of VSN. This...
The data collected through high densely distributed wireless sensor networks is immense. The asymmetry between the data acquisition and information processing makes a great challenge to the restriction of energy and computation consumption of the sensor nodes, and it limits the application of wireless sensor networks. However, the recent works show that compressed sensing can break through this limitation...
Multiple targets tracking is one of the challenging applications in a wireless sensor network due to targets' movement in different directions, targets' speed variations and frequent connectivity failures of low powered sensor nodes. If all the low-powered sensor nodes are kept active in tracking multiple targets' coming from different directions of the network, there is high probability of network...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
Some problems about the connectivity of wireless sensor networks (WSNs) are always important and difficult topics in research, especially the trade-off between connectivity and energy control. In this paper, we present a novel and effective method to calculate nearest neighbor nodes in three-dimensional WSNs using Poisson point field theory, which enables each node to find the kth nearest neighbor...
Routing is the process to distribute and send the packets from one node to another so as to reach the desired node in the network. In static wireless networks, the routing does not get affected by the energy constraints. We focus on the static networks and discuss the constrained multipath, distributed and load balancing routing algorithm by considering a undirected graph G(V,E) and trace the algorithm...
The watershed algorithm is the method of choice for image segmentation in the field of mathematical morphology, which is run simple, good performance and can better extract the contour of moving object. This paper used the watershed algorithm definition by immersion, and modify it, achieved good results after apply to core particles image segmentation. Experiments show that the method of watershed...
The coal mine detect and rescue robot is used for detecting the explosion environment of coal mine and rescuing miners who are trapped in the underground coal mine after gas explosion. Coal mine is a dangerous place in which many fatal factors menace miners' life, especially when blasts occurred. Rescue crews usually don't know the actual situation of the mine tunnel under such circumstances. Therefore...
Despite many of the same properties between standard median filter (SM) and Pseudo-median filter (PM), SM can remove impulses completely but PM not. However, PM can be more efficiently calculated which is very important for processing data online in WSN. In order to synthesize the advantages of performance of PM and SM, an improved method combined the advances of PM and SM is proposed in this paper...
Call admission control schemes are crucially important concepts in researches on cellular mobile networks. One of them is the new thinning scheme. In this study we define a confidence interval for threshold and the numerical results show the performance of the scheme in defined interval. Also we discuss the sensitivity of the scheme (in sample-based sensitivity method) at different thresholds. The...
The main objective of this proposal is to automate control and communication systems of the train using High Performance Multi-core Embedded Processors (MCEP). This method will overcome the difficulties faced by the existing methods such as detecting cracks at rails, monitoring distance between rails, compartments monitoring, fire and smoke monitoring in compartments, and controlling of motors, transformers,...
This paper studies a communicated architecture of Wireless Sensor Network. And the hardware design of the sink node which could be responsible for transmission data or instructions between sensor nodes and data terminal is discussed in detail. The sink node, which uses ZigBee, GPRS, and Ethernet techniques on ARM7 microcontroller, is capable of bridging the user terminal with sensor nodes for information...
Flooding is a kind of broadcast technology in wireless sensor networks. And it is used in many occasions, such as routing, time synchronization and so on. But large-scale and intense flooding may cause broadcast storm, which aggravates the resource consumption in wireless sensor networks and leads to network congestion. In this paper, we propose a cross-layer flooding strategy for wireless sensor...
Employing clustering techniques in routing protocols can increase the scalability of wireless sensor networks. Based on the fact that all the current routing protocols mainly cater to the network in which all the nodes are equipped with the same amount of initial energy, a kind of double cluster-head topology control algorithm based on the energy threshold which cater to heterogeneous wireless sensor...
In this paper, we briefly describe the wireless sensor network(WSN), and highlight the design of RF antenna with a gain based on nRF905 chip, then complete an intelligent greenhouse monitoring system for agricultural greenhouse temperature based on WSNs. Finally, we confirm the feasibility of the system design through some tests.
Due to uncertainties in target motion and limited sensing regions of sensors, collaborative target tracking in wireless sensor networks (WSNs) suffers from low tracking accuracy and lack of reliability when a target cannot be detected by a scheduled sensor. Generally, actuating multiple sensors can achieve better tracking performance but with high energy consumption. Tracking accuracy, reliability,...
In this paper, based on LEACH protocol, improvement is made and the improved protocol DCDA-LEACH is proposed. DCDA-LEACH makes improvements to LEACH with data correlation and data aggregation as the core, introducing the thinking of regionalization. It divides the nodes into regions in accordance with the relevant characteristics of the data to improve the data correlation level within the clusters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.