Availability Issues in Wireless Visual Sensor Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Availability Issues in Wireless Visual Sensor Networks

Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar senso...

متن کامل

mac protocols in underwater wireless sensor networks: issues and simulations

underwater acoustic wireless sensor network (uawsn) use acoustic signalsto transmit data. acoustic signals in underwater environment have high bit errorrate, long propagation delay and limited bandwidth. another constraint in uwasnis energy. due to these constraints, design of energy and bandwidth efficient andpropagation delay aware mac protocol is a great challenge in uwasn.underwater sensor ...

متن کامل

Wireless Sensor Networks: Issues & Challenges

Wireless Sensor Networks (WSN) are highly distributed self organized systems. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, spread over a specific geographic area for some specific purposes like environmental monitoring, surveillance, target tracking etc. By combining ...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2014

ISSN: 1424-8220

DOI: 10.3390/s140202795