نتایج جستجو برای: sensors network

تعداد نتایج: 750789  

Journal: :journal of algorithms and computation 0
s. saadatmand university of new south wales, college of engineering, department of computer science, sydney, australia. d. moazzami university of tehran, college of engineering, faculty of engineering science a. moeini university of tehran, college of engineering, faculty of engineering science

in this paper we proposed a cellular automaton based local algorithm to solve the autonomously sensor gathering problem in mobile wireless sensor networks (mwsn). in this problem initially the connected mobile sensors deployed in the network and goal is gather all sensors into one location. the sensors decide to move only based on their local information. cellular automaton (ca) as dynamical sy...

In this paper we proposed a Cellular Automaton based local algorithm to solve the autonomously sensor gathering problem in Mobile Wireless Sensor Networks (MWSN). In this problem initially the connected mobile sensors deployed in the network and goal is gather all sensors into one location. The sensors decide to move only based on their local information. Cellular Automaton (CA) as dynamical sy...

Journal: :journal of advances in computer research 2015
javad aramideh homayun motameni

in recent years wireless sensor networks have attracted researchers' attention due to vast applications. one of the most prominent issues regarding these networks is coverage which is considered as a quality of service parameter. in this study, we try to address energy shortage in wsns through finding a set of optimal coverage nodes in a specific environment. this is performed utilizing effecti...

M. Jahanshahi M. Maddah N. Najafizadegan

 Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...

Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...

Advances in medical sciences with other fields of science and technology is closely casual profound mutations in different branches of science and methods for providing medical services affect the lives of its descriptor. Wireless Body Area Network (WBAN) represents such a leap. Those networks excite new branches in the world of telemedicine. Small wireless sensors, to be quite precise and calc...

In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt itself against possible changes. The protocol developed, will integrate the artificial potential ...

Journal: :international journal of smart electrical engineering 2012
mozhgan toulabi shahram javadi

a sensor network is made up of a large number of sensors with limited energy. sensors collect environmental data then send them to the sink. energy efficiency and thereby increasing the lifetime of sensor networks is important. direct transfer of the data from each node to the central station will increase energy consumption. previous research has shown that the organization of nodes in cluster...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید