• Nenhum resultado encontrado

[PDF] Top 20 3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach

Has 10000 "3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach" found on our website. Below are the top 20 most common "3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach".

3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach

3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach

... delays, in the communication process, and ...plane in a harsh environment, despite of a short distance between two deployed sensors, they can be unable to communicate due to obstacles or ... See full document

72

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

... distributed localization algorithms for cooperative 3-D wireless sensor networks (WSNs) in a more realistic ...estimates in addition to converging in few ... See full document

85

Target Localization and Tracking in Wireless Sensor Networks

Target Localization and Tracking in Wireless Sensor Networks

... life). In such settings, only some targets can directly communicate with anchors; therefore, cooperation between any two sensors within the communication range is required in order to acquire ... See full document

168

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

... distributed localization algorithms for cooperative 3-D wireless sensor networks (WSNs) in a more realistic ...estimates in addition to converging in few ... See full document

85

Distributed RSS-Based Localization in Wireless Sensor Networks Based on Second-Order Cone Programming

Distributed RSS-Based Localization in Wireless Sensor Networks Based on Second-Order Cone Programming

... RSS-based localization algorithm for WSNs was ...authors in [10] found the position update of each node by minimizing a local objective function over the candidate set using direct ...distributed ... See full document

23

Distributed Algorithm for Target Localization in Wireless Sensor Networks Using RSS and AoA Measurements

Distributed Algorithm for Target Localization in Wireless Sensor Networks Using RSS and AoA Measurements

... target localization problem in a cooperative 3-D wireless sensor network ...a hybrid system that fuses distance and angle measurements, extracted from the received signal ... See full document

35

3-D Target Localization in Wireless Sensor Network Using RSS and AoA Measurements

3-D Target Localization in Wireless Sensor Network Using RSS and AoA Measurements

... IRELESS sensor networks (WSNs) generally refer to a wireless communication network that is composed of a number of devices, which are called sensors, allocated over a monitored region to measure some ... See full document

5

An approach for localization in underwater wireless sensor network

An approach for localization in underwater wireless sensor network

... a localization technique, Dive ‘N’ Rise (DNR) positioning for underwater acoustic sensor ...networks. Localization is one of the main challenges of ...scale, 3-D space ...by ... See full document

8

Intrusion Detection in Wireless Body Sensor Networks

Intrusion Detection in Wireless Body Sensor Networks

... Wireless sensor network (WSN) consists in utilizing homo- geneous or heterogeneous sensor nodes, capable of communi- cating wirelessly in order to forward packets to a ... See full document

6

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

... differences in the simulation results we noticed that for Manhattan and RPGM mobility models the results for each GMLA version was quite ...well with the results of 98% for GMLA (6, 8) and 96% from GMLA (10) ... See full document

6

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

... on wireless sensor networks and their ...potential in these networks most of the nodes are categorized as distinct groups named cluster and the node which is selected as cluster head or ... See full document

10

Service Oriented Sensor Networks for Mobile Computing

Service Oriented Sensor Networks for Mobile Computing

... execute in an environment characterized by scarce and dynamically varying ...executes in the wired network to support the ...communicates with a standard client ...network). Wireless ... See full document

7

Increasing Wireless Sensor Networks Lifetime with New Method

Increasing Wireless Sensor Networks Lifetime with New Method

... (E-LEACH): in this protocol[10], choosing the cluster-head (CH) improves through considering the remained energy, and it is believed that the number of cluster heads is equal to the square root of the sum of the ... See full document

16

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

... directions in wireless sensor networks (WSN). In this paper, we proposed a new contention reserve MAC protocol, named CRMAC, under the inspiration of IEEE ...CRMAC in detail and ... See full document

8

Mobile platform-independent solutions for body sensor network interface

Mobile platform-independent solutions for body sensor network interface

... devices in four different ...Taking in the account that on a interval of three hundred seconds an average of six streams are not fully correct, let us assume that the overall results are very ...acceptable. ... See full document

120

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

... interested in the security and relia- bility concerns of large-scale networks (in the magnitude from hundreds to thousands of sensor nodes), as two complementary dimensions of dependability ... See full document

144

Optimal Power Control with Overhearing Avoidance for Wireless Sensor Networks

Optimal Power Control with Overhearing Avoidance for Wireless Sensor Networks

... Wireless sensor network is the wireless network of tiny devices which has both sensing and communication ...power in this battery operated tiny sensor nodes is a key challenge ... See full document

5

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

... consumption in the network. Using this technique, the remaining energy in the nodes becomes more evenly balanced throughout the network by varying the path to the sink(s), leading to a longer lifetime of ... See full document

16

Data storage system for wireless sensor networks

Data storage system for wireless sensor networks

... special-purpose networks have been built for the IoT. However, dif- ferences in the protocol stack beyond the physical and link layers required protocol translation at gateway ... See full document

73

Identity-based Trusted Authentication in Wireless Sensor Networks

Identity-based Trusted Authentication in Wireless Sensor Networks

... attacks. In other words, there are two different modes in ARM ...region in the scatter ...run in a secured environment by calling the monitor switch function prior to ... See full document

10

Show all 10000 documents...