The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a hierarchical decision fusion scheme to improve network wide detection probability for wireless sensor networks. In the proposed scheme, each sensor first makes its own local decision, and then adjusts its decision based on the decision results of its neighbors. Finally, a network wide decision fusion is applied to obtain the final decision result. Our simulation results...
This paper addresses some aspects of the general problem of information transfer and distributed function computation in wireless networks. Many applications of wireless technology foresee networks of autonomous devices executing tasks that can be posed as distributed function computation. In today's wireless networks, the tasks of communication and (distributed) computation are performed separately,...
In this paper, we study the global clock synchronization and ranging problem for wireless sensor networks in the presence of unknown exponential delays using the two-way message exchange mechanism. Based on the Alternating Direction Method of Multipliers (ADMM), we propose a fully-distributed synchronization and ranging algorithm which has low communication overhead and computation cost. Simulation...
In the matter of detecting clone attacks, we bring in a novel solution called Single Stage Memory Random Walk with Network Division (SSRAND) to circumvent the problems of simple random walk as exploited by both RAND and RAWL protocols. SSRAND combines the single stage memory random walk with network division for clone detection and simulation results verify that it not only reduces the communication...
This article deals with a case study of application of wireless sensor networks for control of emergency situations in an automated manufacturing. The control design approach of manufacture, which is using as self-energy production solutions and municipal utility services, is discussed. The correlation of manufacturing processes with emergency situations in critical infrastructure is taken in the...
Camera sensors can collect visual information from regions of interest (RoI) and provide more information to classify the intruder. In practice, randomly deployed camera sensors can not guarantee that the barrier is full-view covered, and lead to a waste of sensing resources. Our work takes the first attempt to explore the deployment strategy to achieve full-view barrier coverage with rotatable camera...
Wireless Sensor Network as an important technology of Internet of things' development, is more and more widely used in various research fields. This paper mainly researches the part of localization application based on wireless sensor network, focuses on DV-Hop localization algorithm, and gives its algorithm simulation and analysis of the simulation results. Also this paper improves the algorithm...
The interoperability between various automation systems is considered as one of the major character of future automation systems. Service-oriented Architecture is a possible interoperability enabler between legacy and future automation systems. In order to prove the interoperability between those systems, a verification framework is essential. This paper proposes a configurable cloud-based validation...
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. Routing protocols represent an essential aspect of the performance of mobile wireless networks. This paper presents a comparative analysis between several routing algorithms and their impact on the performance of WSN. The performance...
Any common methodology for functionality research in the field of communication systems engineering is network simulation. There is always the overriding worry when utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is important to recognize the particular strengths and also flaws of such simulators. There are a variety of network simulators, as an illustration,...
Wireless communication technologies together with physiological signals sensing provide a wide range of capabilities for monitoring, recording and analysis of the physical and health status of individuals. This paper describes two systems using wireless transmission of information designed to measure physiological signals. The first system is system for automatic cardiopulmonary examination measuring...
Energy consumption is an important issue in the design of Wireless Sensor Networks (WSNs) which typically are powered by limited energy. A suitable clustering algorithm for grouping sensor nodes can raise energy efficiency for WSNs. However, there exist some overheads for clustering, such as cluster-head selection, assignment, and cluster construction. In this paper, we propose a new regional energy...
As the demand for large-scale wireless multimedia sensor networks increases, so does the need for well-designed protocols that optimize the utilization of available networks resources. This requires experimental testing for realistic performance evaluation and design tuning. However, experimental testing of large-scale wireless networks using hardware testbeds is usually very hard to perform due to...
IEEE 802.15.4 defines a duty cycle based medium access control (MAC) protocol to reduce the energy consumption for devices in wireless sensor networks (WSNs). A low duty cycle significantly improves the energy efficiency but reduces the available transmission time, thereby increases end-to-end delay. In this paper, we solve an adaptive duty cycle control problem for beacon-enabled IEEE 802.15.4 networks,...
Recently, sweep coverage, which is the problem of scheduling mobile sensors to periodically visit a certain number of points of interests (POIs) such that the number of mobile sensors is minimized and each of POIs can be visited periodically within a given time period, has received a great deal of attention in the wireless sensor networks. Many methods have been proposed for the sweep coverage to...
Control processes and the communication between them must be scheduled appropriately, such that the I/O data is correlated. Here, we illustrate the design and realization of a Wireless HART system development tool, meant to support design decisions in communication and processing scheduling.
This paper proposes a procedure based on time-difference of arrival measurements to localize a blind node in an asynchronous network where a set of nodes with known position is present. The proposed method computes the time-difference of arrival of each transmitted signal to any pair of receiving nodes in order to get rid of the unknown transmission time. A range-based localization procedure is implemented:...
Coverage control is one of the fundamental problems in WSN (wireless sensor network) and determines the ability to monitor the entire WSN system. Based on the Voronoi diagram and the CVT (Centralized Voronoi Tessellation) theory, and combined with the Lloyd's algorithm, we propose a dynamic covering algorithm of WSN to achieve a dynamic coverage among different areas by adjusting the geometric boundaries...
Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key management protocol. Most of the reported key management protocols follow either a centralized approach where a single node has the authority of distributing the global shared key, or a partially collaborative approach where key distribution is...
We evaluate a routing metric, called TXPFI, which captures the expected number of frame transmissions needed for successful delivery of data in Wireless Sensor Networks (WSNs) featuring non-fully cooperative nodes and unreliable links. The study, which addresses the exploitation of the TXPFI in routing protocols of distance-vector type, assesses the impact of different network settings on the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.