نتایج جستجو برای: sensors network

تعداد نتایج: 750789  

Journal: :IEEJ Transactions on Electronics, Information and Systems 2008

Journal: :International Journal of Electronics and Telecommunications 2010

2014
Benoît ESCRIG

Context: in many sensor systems, the information collected by sensors is transmitted to ground receivers via a satellite link: emergency communication systems, control and acquisition systems [1]. When the sensor network is a cognitive network, secondary sensors can use network resources when primary sensors, i.e., high priority sensors, do not use them. One of the major concerns in this contex...

A. Movaghar M. R. Meybodi M. S. Kordafshari

Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

2012
Y. M. Patil

Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a highperformance network intrusion detection system that com...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

2002
Seung-Hee Oh Taekyong Nam Sungwon Sohn

As network has become more distributed, more global, and more complex, it has simultaneously become more exposed to threats and cyber terrors. In this paper, we suggest active security technology using sensors in active network, and sensor management mechanism using managing sensors. Also, we manage requirements for managing sensors in active security technology. It can be distinguished active ...

2015
Mrs. Geetha

Data-gathering wireless sensor networks (WSNs) are operated unattended over long time horizons to collect data in several applications such as those in climate monitoring and a variety of ecological studies. Typically, sensors have limited energy (e.g., an on-board battery) and are subject to the elements in the terrain. In-network operations, which largely involve periodically changing network...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید