• Nenhum resultado encontrado

[PDF] Top 20 Target Tracking In Wireless Sensor Networks

Has 10000 "Target Tracking In Wireless Sensor Networks " found on our website. Below are the top 20 most common "Target Tracking In Wireless Sensor Networks ".

Target Tracking In Wireless Sensor Networks

Target Tracking In Wireless Sensor Networks

... of target tracking in wireless sensor ...object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its ...movements. ... See full document

10

Security Attacks and its Countermeasures in Wireless Sensor  Networks

Security Attacks and its Countermeasures in Wireless Sensor Networks

... • Using synchronized clocks [46]. With the assumption that all nodes are tightly synchronized, each packet includes the time at which it is sent out. When receiving the packet, the receiver compares this value to the ... See full document

12

AUTOMATIC RECOVERING NODE FAILURE IN WIRELESS SENSOR ACTOR NETWORKS

AUTOMATIC RECOVERING NODE FAILURE IN WIRELESS SENSOR ACTOR NETWORKS

... observed in the network and restores the network connectivity through controlled relocation of the movable ...nodes in advance that will cause partitioning in the ...vertices in the network, ... See full document

10

A Multi-Agent System for Outliers Accommodation in Wireless Sensor Networks

A Multi-Agent System for Outliers Accommodation in Wireless Sensor Networks

... Regarding the message payload (see Table 1) it consists of Message Type: the message can be originated from the system's application or from a local agent; Node JD: denoting t[r] ... See full document

12

TinyCO – A Middleware Model for Heterogeneous Nodes in Wireless Sensor Networks

TinyCO – A Middleware Model for Heterogeneous Nodes in Wireless Sensor Networks

... development in distributed ...activity in a service-oriented WSN application, like discovering, sensing and aggregation, is implemented as a separate service ...the sensor nodes and allows data ... See full document

9

Review of Security Issues in Mobile Wireless Sensor Networks

Review of Security Issues in Mobile Wireless Sensor Networks

... obile Wireless Sensor Network is a collection of tiny sensor nodes having mobile nature ...These sensor nodes have limited amount of memory and limited energy source associated with ...utility ... See full document

6

A Review on Congestion control Mechanisms in Wireless Sensor Networks

A Review on Congestion control Mechanisms in Wireless Sensor Networks

... Recently, Wireless Sensor Networks (WSNs) have been in many applications and systems with vastly varying requirements and ...same wireless sensor network with the aid of modern ... See full document

6

Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks

Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks

... these networks provides three essential functions. Firstly they are used in real time system to monitor physical and environmental conditions such as humidity, temperature, pressure ...these networks ... See full document

10

Monitoring of urban transportation networks using wireless sensor networks

Monitoring of urban transportation networks using wireless sensor networks

... (DARP). In the classical VRP the concern is to find a set of optimal routes for a fleet of vehicles, based at the depot, to satisfy the demand of geographically dispersed customers at the minimum total travelling ... See full document

59

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

... N sensor nodes that are uniformly and randomly distributed within an area of meter ...considered in this paper is to gather data generated from sensor nodes every ...homogenous in that ... See full document

12

An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

An Intelligent Energy Efficient Clustering in Wireless Sensor Networks

... Particle swarm optimization is one of the latest population based evolutionary optimization techniques which is based on the behaviors of bird flocking and fish schooling [11]. PSO is based on this scenario: there is a ... See full document

5

Security Issues in Wireless Sensor Networks: Attacks and Countermeasures

Security Issues in Wireless Sensor Networks: Attacks and Countermeasures

... deployed in mission-critical applications such as military surveillance, or medical applications, ...residing in the cloud. These BANs could be deployed in hospitals or at homes for ambient and ... See full document

6

Energy Efficient Routing Protocol for Wireless Sensor Networks

Energy Efficient Routing Protocol for Wireless Sensor Networks

... A wireless sensor network consists of a large number of sensor nodes and a base station as a controller, which interfaces the sensor network to the outside ...network. Sensor nodes are ... See full document

6

Lightweight Intrusion Detection Scheme for Wireless Sensor Networks

Lightweight Intrusion Detection Scheme for Wireless Sensor Networks

... The proposed scheme uses anomaly detection based on SVM technique and a set of attacks represented by fixed signature rules, they are designed to validate the malicious behavior of a target identified by the ... See full document

8

DISTRIBUTED VERTEX COVER ALGORITHMS FOR WIRELESS SENSOR NETWORKS

DISTRIBUTED VERTEX COVER ALGORITHMS FOR WIRELESS SENSOR NETWORKS

... In this study, we designed and implement three different distributed vertex cover approximation algorithms and measure the performances of them. The first algorithm is a greedy approach that is adapted from Parnas ... See full document

16

Range Free Localization Schemes for Wireless Sensor Networks

Range Free Localization Schemes for Wireless Sensor Networks

... essential in most of the WSN applications, where, the sensed data is meaningless without the knowledge of precise location from where it is ...obtained. In addition, location awareness plays an important ... See full document

15

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

... that in mind, using techniques like multi-path routing to augment its ...even in a fully synchronous system, no deterministic solution is possible if n-1 messages can be lost per round of ... See full document

114

Route planning in wireless sensor networks for data gathering purposes

Route planning in wireless sensor networks for data gathering purposes

... Since sensor nodes are limited in processing capabilities, local data analysis may not be a viable option and, therefore, it becomes crucial to forward the data to a device with higher capabilities for ... See full document

78

A bounded heuristic for collection-based routing in wireless sensor networks

A bounded heuristic for collection-based routing in wireless sensor networks

... ABSTRACT Wireless sensor networks are used to monitor and control physical phenomena and to provide interaction between clients and the physical ...generation wireless sensor ... See full document

7

Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks

Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks

... step). In our case, the types considered are the sensing received from the application and the infrastructure received from other ...sink. In the processing step, real-time requirements are ...qualities”. ... See full document

23

Show all 10000 documents...