• Nenhum resultado encontrado

[PDF] Top 20 A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor Networks

Has 10000 "A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor Networks " found on our website. Below are the top 20 most common "A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor Networks ".

A Novel Solitude Conserving Location Monitoring Approach for  Wireless Sensor Networks

A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor Networks

... “A Novel Solitude Conserving Location Monitoring approach for Wireless Sensor ...quality location monitoring services for end users, while ... See full document

8

DISTRIBUTED VERTEX COVER ALGORITHMS FOR WIRELESS SENSOR NETWORKS

DISTRIBUTED VERTEX COVER ALGORITHMS FOR WIRELESS SENSOR NETWORKS

... for wireless sensor networks such as monitoring link failures, facility location, clustering, and data ...in wireless sensor ...greedy approach that finds a vertex ... See full document

16

Range Free Localization Schemes for Wireless Sensor Networks

Range Free Localization Schemes for Wireless Sensor Networks

... Wireless sensor networks have become a hot research area due to their numerous applications in monitoring inaccessible areas, which are difficult to be monitored by conventional ...of ... See full document

15

Power Consumption Reduction for Wireless Sensor Networks Using A Fuzzy Approach

Power Consumption Reduction for Wireless Sensor Networks Using A Fuzzy Approach

... of Wireless Sensor Networks (WSNs) is leading towards the deployment of complex networked systems and the optimal design of WSNs can be a very difficult task because several constraints and ... See full document

13

Implementing Preserving Location Monitoring System for Wireless Sensor Networks

Implementing Preserving Location Monitoring System for Wireless Sensor Networks

... privacy-preserving location monitoring (PPLM) system, implemented for wireless sensor networks without disturbing the privacy of the individual persons or ...in-network location ... See full document

8

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

... College of Engineering. He received his Masters degree in Computer Science and Automation from Indian Institute of Science Bangalore. He was awarded Ph.D. in Economics from Bangalore University and Ph.D. in Computer ... See full document

8

3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach

3-D Hybrid Localization with RSSAoA in Wireless Sensor Networks: Centralized Approach

... of sensor nodes, from a few to a large number of these small ...The sensor nodes, generally spatially distributed trough a large area, are used to monitor different conditions such as temperature, sound, ... See full document

72

Service Oriented Sensor Networks for Mobile Computing

Service Oriented Sensor Networks for Mobile Computing

... network). Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNs´s middleware is able to offer field data in real-time by user ...service-oriented ... See full document

7

Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks

Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks

... Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery ...this approach, ... See full document

10

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

... Recently, it emerged an eminent need for using Wireless Sensor Networks (WSN) in scenarios dealing with mobility. A typical scenario could be robots moving through a factory while communicating with ... See full document

6

A Location Service Protocol for mobile Underwater Sensor Networks

A Location Service Protocol for mobile Underwater Sensor Networks

... The large-scale aquatic applications demand us to build large-scale Underwater Ad hoc Networks (UANET) and Underwater Sensor Networks (UWSN) to explore the uninhabited oceans. The difference between ... See full document

9

Intrusion Detection in Wireless Body Sensor Networks

Intrusion Detection in Wireless Body Sensor Networks

... Wireless sensor network (WSN) consists in utilizing homo- geneous or heterogeneous sensor nodes, capable of communi- cating wirelessly in order to forward packets to a centralized base station ...A ... See full document

6

Wireless biomedical sensor networks: the technology

Wireless biomedical sensor networks: the technology

... healthcare monitoring is performed on a periodic check basis where patients are constantly updated on their symptoms; the physician checks and makes a”diagnosis, then when possible monitors the patient’s progress ... See full document

8

Kerberos Authentication in Wireless Sensor Networks

Kerberos Authentication in Wireless Sensor Networks

... the wireless sensor architecture. The sensor network transfer the information to the base station the based station is directly connected to the user or the middleware and in the pervious ... See full document

14

Data storage system for wireless sensor networks

Data storage system for wireless sensor networks

... In this section the use of aggregation and scheduling in a M2M application context, where the source and sink of notifications are both internal WSN networks (not edge routers), is analysed. The subject being ... See full document

73

Localização no tempo e no espaço em redes de sensores sem fio

Localização no tempo e no espaço em redes de sensores sem fio

... A WSN an be omposed of n nodes, with a ommuni ation range of r , and distributed in a two-dimensional squared sensor eld Q = [0, s] × [0, s] . For the sake of simpli ation, we on- sider symmetri ommuni ation ... See full document

121

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

... With the above characteristics in mind, WSNs can be developed in many application do- mains.For example, in the agriculture business, WSNs can be used to monitor the humidity of the land near the plantations so it can ... See full document

114

Realization of 3D Underwater Wireless Sensor Networks and Influence of Ocean Parameters on Node Location Estimation

Realization of 3D Underwater Wireless Sensor Networks and Influence of Ocean Parameters on Node Location Estimation

... In order to find the position of sensor node, minimum of three RN are needed. The distance between these RN are used to calculate the exact position of unknown node. In our proposed technique, distance estimation ... See full document

16

Evolutionary design of wireless sensor networks based on complex networks

Evolutionary design of wireless sensor networks based on complex networks

... This complex network strategy is important in WSNs be- cause a high cluster coefficient avoids the data delivery delay and unnecessary energy consumption by concentrating the data sensing in a given hub node. ... See full document

6

Performance assessment of real-time data management on wireless sensor networks

Performance assessment of real-time data management on wireless sensor networks

... cloud-based wireless body area Networks ...distributed approach allows performing in-network query processing that diminishes the data communication activities, which cause the most energy depletion ... See full document

165

Show all 10000 documents...