The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several thousand sensors hard-wired to data acquisition units may be used to instrument a gas turbine engine during its development phase. This process of hard-wiring is time-consuming, expensive, and inflexible. A wireless sensor network (WSN) is proposed as a solution for selectively replacing wired sensors with wireless sensors and for adding new sensors. The WSN shall operate between the engine...
We consider the problem of reliable and minimal delay transmission in a wireless sensor network that uses time division in order to schedule its node-to-node communication in time-bounded manner. We propose an algorithm that uses the message acknowledgment method and solves this problem. We show bounds for its expected value of message delivery time. Moreover, our algorithm is based on simple state...
Efficient broadcast in wireless sensor networks can exploit backbone structures, in relation to connected dominating sets in graphs. This paper proposes the construction of a backbone for broadcast in heterogeneous wireless sensor networks having minimum energy consumption and a delay bounded by a predefined constant ℎmax. For the purpose of the paper, we assume the sensors composing the network have...
Mobile Crowd Sensing and Computing (MCSC) is a replacement of static sensing infrastructure by user's mobile sensor-enhanced devices. MCSC collects user's local knowledge such as local information, ambient, and traffic conditions using sensor-enabled devices. The collected information is further aggregated and transferred to the cloud for detailed analysis. In this paper, we propose a Smartphone-based...
The channel allocation and power control problem for multiple control loops over interference channels is investigated. A scheduler allocates the wireless channels and controls transmitting power based on observed channel conditions. The strategy can guarantee a QoS performance and minimize the average transmitting power simultaneously. The problem is formulated as an optimization problem and is solved...
Energy efficiency and reliability are a pair of the most important factors in wireless sensor networks (WSNs). Recent research results have demonstrated that the previously suggested scheme of the joint network-coding-compressive-sensing can greatly improve the energy efficiency and the communication reliability of WSNs. In this paper, we propose a practical scheme, Non-Binary Joint Network-Coding...
In three-dimensional space, the traditional algorithm of virtual force applies to continuous target tracking process is prone to problems of distraction and short time in keeping tracking of the target in the process of. This paper proposed a three-dimensional space deployment algorithm applies to continuous target tracking to solve these problems. The combine virtual force in this algorithm is generated...
Enormous amounts of data are growing because of the continuous and increasing use of smart devices which connect, collect, exchange and transfer these large amounts of data. With the convergence of new technologies like Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Cloud Computing (CC) many sectors are benefited. Our research has to do with Big Data Delivery over the IoT. Specifically,...
Wireless Sensor Networks (WSNs) based on RSSIbased localization techniques have been widely used in various applications, such as intrusion detection, battlefield surveillance, and animal monitoring. One fundamental performance measure in those applications is the sensing coverage of the target field. Most existing works on coverage assume that the sensing area of a sensor node is a disc. However,...
In this paper, the Discrete Controller Synthesis (DCS) technique is applied in order to obtain a correct-by- construction automatic distributed scheduling of Wireless Sensor Network (WSN). Our approach starts from an abstract formal model considering that communication between nodes are instantaneous. Then, a refined model is obtained by adding a realistic communication mechanism while preserving...
This paper considers phase-dependent probabilistic failure competitions in reliability analysis of wireless sensor network (WSN) applications. Particularly, a WSN can experience probabilistic functional dependence (PFD) behavior where operations of some sensors (referred to as probabilistic-dependent components) rely on functions of relay nodes (referred to as trigger components) with certain probabilities...
Data muling using UAVs/drones is currently emerging as an alternative to the traditional traffic engineering techniques used in wireless sensor networks, when wireless communication is not an option or the least cost-efficient solution. This paper revisits the issue of traffic engineering in Internet-of-Things (IoT) settings, to assess the relevance of using UAVs for the persistent collection of sensor...
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints...
Node authentication is essential in wireless body area network (WBAN), as the data collected in the WBAN is important and closely related to the personal privacy especially in the health applications. Traditional authentication solutions usually require priori knowledge, advanced hardware or out-of-band channels, which are impractical for the WBAN, and the data-based authentication scheme has been...
Wearable and connected health is a dominant field in the era of the Internet of Things (IoT). Indeed, Body Sensor Networks (BSNs) have been widely used for enabling many connected health applications in diverse areas including: activity recognition, elder care, sports, and rehabilitation. Although the number of transistors in an integrated circuit follows Moore's law, it does not apply to batteries...
Distributed channel estimation (DCE) is one of the core research topics in wireless sensor networks (WSNs). Under the hypothesis that channel parameters can be modeled as a sparse system, DCE based on compressed sensing (CS) is an effective approach to channel estimation. Among all the existing CS-DCE schemes, every node must store a sensing matrix whose size will increase with the number of channel...
The optimal sensor selection for scalar state parameter estimation in wireless sensor networks is studied in the paper. A subset of N candidate sensing locations is selected to measure a state parameter and send the observation to a fusion center via wireless AWGN channel. In addition to selecting the optimal sensing location, the sensor type to be placed in these locations is selected from a pool...
The simple structure of compressed sensing (CS) lead to low complexity encryption, which is fascinating for nodes with limited resources in the wireless network. In this paper, we analyze the performance of the encryption method based on compressed sensing, and prove that the encryption can achieve the information theory security. The effect of the sparsity and the signal noise ratio (SNR) on the...
Introducing compressive sensing theory to solve multiple targets localization problem is a promising method by only considering received signal's power. In previous researches, the targets are assumed to be positioned into an regular mesh grid and restoration model according to compressive underdetermined equation is built to recover the positions of unknown targets. However, it is inconvenient to...
The cognitive radio positioning system requires a distributed localization algorithm, since the secondary uses (SUs) can not communication with primary users (PUs) directly. The localization algorithm should also be robust to the topology changes of SUs due to the opportunistic access nature. In this paper, we propose a distributed particle filtering method to locate the PU's position. The ranging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.