Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
To guarantee fault tolerant system, checkpointing protocols are usually run to save the last consistent state of the system. This information will be recovered whenever a node failure occurs, thereby making it possible to resume the execution of the system. In the context of MANETs, checkpoints need to be saved in a safe and a stable storage to avoid data loss. Due the the specific constraints of...
This paper focuses on the performance of wireless sensor networks characterized by a hybrid topology composed of mobile and static sensor nodes. The Routing Protocol for Low power and lossy networks (RPL), which is standardized as an IPv6 routing protocol for low power and lossy networks, uses the trickle timer algorithm to handle changes in the network topology. However, this algorithm is not well...
This paper studies the problem of scheduling sensors for target coverage in a surveillance environment. In this problem, coverage of target areas must be guaranteed during the system timeframe. First, we formulate an independent scheduler of sensors, where scheduling at each time epoch is independent from the sensing patterns among all sensors during the timeframe. Then, we formulate a cooperative...
Wireless Sensor Networks (WSNs) become one of the most common technologies that can be deployed in various domains. However, the networks suffer from many problems caused by the limited sensor resources and the harsh environments where these networks are deployed. Many algorithms have been proposed to manage data routing while respecting the specificity of such networks. One of the known proposed...
Wireless sensor networks are emerging technology with increasing number of applications, and consequently an active research area. One of the problems pertinent to wireless sensor networks is the coverage problem with number of definitions, depending on the assumed conditions. In this paper we consider hard optimization area coverage problem with the goal of finding optimal sensor nodes positions...
The wide proliferation of wireless sensor networks in various domains has lead to the emergence of numerous applications with different requirements to satisfy for the well functioning. It is imperative to develop different approaches and communication protocols to meet these diverse and specific requirements while considering the most critical constraint, network lifetime. Adopting duty cycling is...
Indoor localization is an important primitive that can enable many ubiquitous computing applications. In this paper, we choose the iBeacon as landmark and improve the localization scheme of iBeacon and inertial navigation through crowd sensing. Specifically, we use crowd sensing to design a parameter learning algorithm for device diversity. Furthermore, we take advantage of crowd sensing to collect...
We present here a fundamental understanding of the capacity of wireless ad hoc networks. Under the assumption that all interference is essentially regarded as noise, we try to answer the question: “What is the lower bound on network capacity under a certain power assignment and nodal distribution?” We give two quantitative lower bounds: one is measured in bps (bits per second), the other is measured...
Jamming emits white Gaussian noise that causes interference to both the legitimate receiver and eavesdropper. It has been an effective method for improving physical-layer security in wireless communication. In this paper, cautious jamming strategy based on optimal jammer selection method is proposed. More specifically, by using perfect channel state information, cautious jamming strategy selects an...
Modern vehicles incorporate dozens of sensors to provide vital sensor data to the system, where GNSS (global satellite navigation system) gives the localization, navigation, and time synchronization that can improve the safety factor of the vehicles. However, the GNSS signal is very vulnerable to jamming especially spoofing attacks that have great influence on safety and financially critical applications...
Fingerprint localization algorithm is widely used in indoor scenario positioning. Received Signal Strength (RSS) is commonly used as the signal feature of fingerprint algorithm. But RSS could be changed due to the temperature or environment reason, which makes it an unreliable signal feature. This paper proposes a novel positioning algorithm based on the formal K Nearest Neighbor (KNN) algorithm....
A rotor temperature monitoring system corresponds to a wireless communication between a transmitter module, fixed inside the electrical machine, and a fixed receiver located outside the electrical machine. Nowadays wireless communication for rotating electrical machines is interesting for both real time monitoring and diagnosis objectives. However, applying this technology can lead to some problems...
Zigbee is widely used in WSN because of its low power consumption and high reliability. A control and information collection system based on ZigBee is designed in this paper. It can be visit anywhere via gateway. A testbed is set up and its transmission performance is tested. Then an improvement is made on environment information collection cycle to meet the requirement of energy saving.
Fingerprint positioning is considered to be one of the most promising indoor positioning technique. The most significant technological bottleneck of fingerprint positioning technology is the high labor cost of the radio map establishing process. Many radio map fast establishing algorithms were proposed to solve this problem. There is no evaluation norm for these algorithms but positioning accuracy,...
Ensuring connectivity among mobile nodes is significantly important to the success of many critical applications, like military, where the loss of connectivity can lead to the failure of the mission and also proved to be challenging in particular when mobiles nodes have heterogeneous mobility pattern i.e., they are moving in several directions at different speeds. In this paper, we propose a new Heterogonous...
Fountain codes are a type of erasure codes which are characterized by their global acknowledgement and used as a solution to reduce the use of feedback channel as well as the number of transmissions and then minimize the energy consumption. With the multi-hop transmission, fountain codes raise the problem of overflow leading to a waste of energy, the most critical issue and the big challenge in the...
The need for energy-efficient routing and data gathering protocols in large-scale environments becomes very challenging. Hierarchical routing in WSNs is a very important topic. It has been widely investigated relative to energy efficiency based routing protocols. LEACH (Low Energy Adaptive Clustering Hierarchy algorithm) is the pioneering cluster routing protocol in WSNs. However, it is not suitable...
Wireless Sensor Networks (WSNs) constitute a very dynamic research area. The constraints related to deployment, topology, and energy motivates much of the research activities related to the WSNs. In a network of thousands of sensor nodes, routing management and data exchange are expensive in terms of energy consumption and storage capacity. In fact, a sensor needs to store a lot of information to...
One of the critical issues in a Wireless Sensor Network (WSN) is the design of a proper routing protocol. While the requirement of low latency and low-energy consumption is getting more and more importance in emerging applications, the WSN should be capable of fulfilling its mission in a timely manner and without loss of energy. In this paper, we focus on multi-hop flat routing. A mathematical model...
Compressed Sensing (CS) has been successfully applied within Wireless Sensors Networks (WSN). We consider the problem of data recovery from a subset of few sensor readings collection at a fusion center in the case of spatially correlated large WSN. We exploit the data spatial correlation to derive a sparse representation of the signal and consider 1-D reading of the WSN. To this end, we propose a...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.