intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Wireless sensor networks

Xem 1-20 trên 423 kết quả Wireless sensor networks
  • This study proposes a Hybrid Genetic algorithm (HGA) to solve SPG. This study is the binary string representation for a set of chosen edges. To increase the diversity of the population and avoid falling into local optimization, we use a 2-longest Distance strategy, dynamic crossover rate, and chosen solutions must differ by at least 5%.

    pdf5p vialicene 19-07-2024 2 0   Download

  • In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.

    pdf10p vithomson 02-07-2024 0 0   Download

  • High quality of service (QoS) requirements in multi-priority wireless sensor networks pose new challenges to the Internet of Things (IoT). In a multi-event wireless sensor network (MWSN), nodes generate different types of data packets with different priority such as urgent (high priority) or normal (low priority), with different traffic proportion.

    pdf10p vithomson 02-07-2024 0 0   Download

  • This paper addresses the challenge of fault detection in Wireless Sensor Networks (WSNs), commonly used in fields like environmental monitoring and healthcare. WSNs, prone to various faults due to their deployment in unpredictable environments, require effective solutions for fault detection. Traditional machine learning approaches show limitations such as unsuitability for streaming data and the detection of a single fault type.

    pdf10p visergeyne 18-06-2024 1 0   Download

  • In this article, the authors introduce the "Cooperative WBANs" model, wherein sensors communicate directly with Access Points (APs) without a coordinator. They also present a power control algorithm for downlink data transmission from APs to sensors.

    pdf9p visergeyne 18-06-2024 0 0   Download

  • This paper proposes using a non-linear system to generate chaos-based coefficient sequences applied in the sensor nodes of a landslide warning system. The experimental study demonstrated that the sensor node utilizing pseudo-random sampling is faster and less complex in comparison to the sensor node employing random sampling.

    pdf8p visergeyne 18-06-2024 0 0   Download

  • The study "Optimizing broiler house management to reduce costs and reduce losses with the internet of things technology and wireless sensor network" primary objectives encompass cost reduction, loss mitigation and performance evaluation of feeding and watering devices. This proactive approach significantly reduces potential losses. Furthermore, the research evaluates cost implications. IoT technology’s ability to regulate variables like feed utilization and energy consumption aids cost reduction. The study’s findings offer practical insights for efficient resource allocation.

    pdf7p tukhauquantuong1011 22-04-2024 6 2   Download

  • In this article, we explore the operation of the LEACH (Low Energy Adaptive Clustering Hierarchy) protocol - a protocol compatible with low-energy sources and propose a solution to improve efficiency in wireless sensor networks. The simulation results show that our solution is better in terms of the number of packets reaching the base station and the average lifetime of the sensor nodes.

    pdf9p vibego 02-02-2024 1 0   Download

  • The remaining paper is divided into the following primary sections: Section 2 highlights the WSN concepts and structures. Section 3 presents our proposed algorithm design and implementation. Section 4 describes system testing and results. Section 5 mentions our future development. Finally, the paper concludes in Section 6.

    pdf11p vimarillynhewson 02-01-2024 3 2   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • In this paper, we present such a cyber-physical system integration which has been developed and deployed in an office space. It is capable of acquiring environmental conditions of the occupants, their personal energy consumption, human interaction with the system, etc. Correlations of these information are analyzed before making any decision on adjusting the building operation. A few cases of data analyses are presented to provide the understanding of the system behaviour.

    pdf6p vijeff 01-12-2023 5 4   Download

  • Part 1 of ebook "Sensor technologies: Healthcare, wellness and environmental applications" provides readers with contents including: sensing and sensor fundamentals; key sensor technology components - hardware and software overview; sensor network topologies and design considerations; processing and adding vibrancy to sensor data; regulations and standards - considerations for sensor technologies; the data economy of biosensors;...

    pdf155p tieulangtran 28-09-2023 4 3   Download

  • Continued part 1, part 2 of ebook "Sensor technologies: Healthcare, wellness and environmental applications" provides readers with contents including: sensor deployments for home and community settings; body-worn, ambient, and consumer sensing for health applications; wellness, fitness, and lifestyle sensing applications; environmental monitoring for health and wellness; summary and future trends;...

    pdf166p tieulangtran 28-09-2023 6 2   Download

  • Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.

    pdf196p haojiubujain06 05-09-2023 10 3   Download

  • Ebook Security in distributed, grid, mobile, and pervasive computing: Part 1 includes contents: Chapter 1 security for content distribution networks — concepts, systems and research issues; chapter 2 key management and agreement in distributed systems; chapter 3 securing design patterns for distributed systems; chapter 4 pragmatic security for constrained wireless networks; chapter 5 authentication in wireless networks; chapter 6 intrusion detection in wireless sensor networks; chapter 7 false data detection and secure data aggregation in wireless sensor networks; chapter 8 privacy and anon...

    pdf217p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Security in distributed, grid, mobile, and pervasive computing: Part 2 includes contents: Chapter 10 state-of-the-art security in grid computing; chapter 11 unifying grid and organizational security mechanisms; chapter 12 grid security architecture: requirements, fundamentals, standards and models; chapter 13 a trust-based access control management framework for a secure grid environment; chapter 14 distributed computing grids — safety and security; chapter 15 security solutions for pervasive healthcare; chapter 16 wireless sensor network security: a survey.

    pdf219p haojiubujain06 05-09-2023 3 3   Download

  • The purpose of study is to propose a task selection algorithm that both keeps information quality and saves power consumption in IoT energy harvesting devices. The proposed algorithm not only keeps stable information quality but saves power loss also.

    pdf9p viisac 15-09-2023 9 5   Download

  • Ebook Security in wireless mesh networks: Part 2 includes contents: Chapter 11 security in wireless PAN mesh networks; chapter 12 security in wireless LAN mesh networks; chapter 13 security in IEEE802.15.4 cluster-based networks; chapter 14 security in wireless sensor networks; chapter 15 key management in wireless sensor networks.

    pdf191p haojiubujain06 06-09-2023 6 5   Download

  • Ebook Wireless network security: Part 2 includes contents: Chapter 8: Intrusion detection in cellular mobile networks; Chapter 9: The spread of epidemics on smartphones; Chapter 10: Cross-domain mobility-adaptive authentication; Chapter 11: AAA architecture and authentication for wireless LAN roaming; Chapter 12: An experimental study on security protocols in WLANs; Chapter 13: Security issues in wireless sensor networks used in clinical information systems; Chapter 14: Key management schemes in sensor networks; Chapter 15: Secure routing in ad hoc and sensor networks.

    pdf236p haojiubujain06 06-09-2023 6 4   Download

  • The book is organized into four major parts. Part I consists of two chapters, one of which is devoted to the main tenets of wireless ad hoc networks, and wireless personal area networks and wireless sensor networks in particular. Part II, most voluminous by far, models and analyzes the performance of single-cluster networks. Part III deals with performance-related aspects of multi-cluster networks utilizing hierarchical, tree-like topologies. Part IV introduces security issues in the context of both single- and multi-cluster networks.

    pdf318p haojiubujain06 06-09-2023 11 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2