نتایج جستجو برای: sensor networks

تعداد نتایج: 577515  

Body area networks is one of the types of wireless area networks which has been created to optimize utilizing hospital resources and for earlier diagnosis of medical symptoms, and ultimately to reduce the cost of medical care. This network like most of the wireless networks is without infrastructure and the embedded sensor nodes in the body have limited energy. Hence, the early power completion...

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

Journal: :international journal of smart electrical engineering 2013
mohsen jahanshahi shaban rahmani shaghayegh ghaderi

an efficient cluster head selection algorithm in wireless sensor networks is proposed in this paper. the implementation of the proposed algorithm can improve energy which allows the structured representation of a network topology. according to the residual energy, number of the neighbors, and the centrality of each node, the algorithm uses fuzzy inference systems to select cluster head. the alg...

Journal: :journal of computer and robotics 0

0

Journal: :journal of advances in computer engineering and technology 2015
zahra kamaei hamidreza bakhshi behrooz masoumi

wireless sensor networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as wireless. the main goal of these networks is collecting data from neighboring environment of network sensors. since the sensor nodes are battery operated and there is no possibility of charging or replacing the batteries, the lifetime of ...

In recent years, wireless sensor networks have drawn great attention. This type of network is composed of a large number of sensor nodes which are able to sense, process and communicate. Besides, they are used in various fields such as emergency relief in disasters, monitoring the environment, military affairs and etc. Sensor nodes collect environmental data by using their sensors and send them...

Wireless sensor networks(WSN) have unique properties that distinguished them from other wireless networks and have special challenges. Not-chargeable, not-changeable and limited power supplies of sensor nodes is the most important challenge of this networks, and if the power supply of node expired, a part of data maybe lost. Because of the importance of covers in wireless sensors, in this work ...

Journal: :international journal of smart electrical engineering 0
iman khandani electrical engineering department, islamic azad university, central tehran branch reza sabbaghi-nadooshan electrical engineering department, islamic azad university, central tehran branch fardad farokhi electrical engineering department, islamic azad university, central tehran branch

wireless sensor networks(wsn) have unique properties that distinguished them from other wireless networks and have special challenges. not-chargeable, not-changeable and limited power supplies of sensor nodes is the most important challenge of this networks, and if the power supply of node expired, a part of data maybe lost. because of the importance of covers in wireless sensors, in this work ...

Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید