Showing 441 - 460 results of 1,016 for search '"wireless sensor network"', query time: 0.07s Refine Results
  1. 441

    A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks by Xingpo Ma, Jianliang Gao, Weiping Wang, Jianxin Wang

    Published 2012-11-01
    “…In-network data storage and retrieval is one of the most important problems in wireless sensor networks. Many schemes have been proposed to solve this problem. …”
    Get full text
    Article
  2. 442
  3. 443

    Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis by Ruwaida M Zuhairy, Mohammed GH Al Zamil

    Published 2018-03-01
    “…Wireless sensor networks have become integral components of modern and smart environments. …”
    Get full text
    Article
  4. 444

    Concurrent transmission mechanism to mitigate pan-exposed-node problems in wireless sensor networks by Xuejian Zhao, Siguang Chen, Jing Guo, Han Hu, Zhixin Sun

    Published 2017-03-01
    “…Power control technology is widely used in wireless sensor networks to improve network performance. The asymmetric transmission power strategy used in power control technology causes the re-emergence of hidden-node problems and more serious exposed-node problems. …”
    Get full text
    Article
  5. 445
  6. 446

    Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks by Vinod Namboodiri, Abtin Keshavarzian

    Published 2011-01-01
    “…Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
    Get full text
    Article
  7. 447

    Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption by Yong ZHANG, Tao WEN, Quan GUO, Feng-kun LI

    Published 2012-10-01
    “…An attack on the permutation-based multi-polynomial scheme exposed in the paper of Guo was proposed.The scheme couldn’t frustrate the large-scale node capture attack was proved.A pair-wise key establishment scheme was proposed by introducing homomorphic encryption thought,which was used to protect polynomials and made all keys be established in encrypted state.Therefore,the large-scale node capture attack was thwarted because adversaries couldn’t get any information about polynomials from the encrypted data used to establish keys.A method was presented to achieve fully homomorphic encryption indirectly,which used much less storage and computation resource than existing fully homomorphic encryption.The analysis and experiment show our pair-wise key establishment scheme has very good performance in terms of storage,computation as well as communication and is suitable to wireless sensor networks with limited capability.…”
    Get full text
    Article
  8. 448
  9. 449

    ASMT: An augmented state-based multi-target tracking algorithm in wireless sensor networks by Kejiang Xiao, Rui Wang, Lei Zhang, Jian Li, Tun Fun

    Published 2017-04-01
    “…Due to the resource limitation and low performance of sensor node, research works of multi-target tracking became a hot spot in the applications of wireless sensor networks. Here, we propose an algorithm named augmented state-based multi-target tracking algorithm. …”
    Get full text
    Article
  10. 450
  11. 451

    Time-selective data fusion for in-network processing in ad hoc wireless sensor networks by Jaanus Kaugerand, Johannes Ehala, Leo Mõtus, Jürgo-Sören Preden

    Published 2018-11-01
    “…This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. …”
    Get full text
    Article
  12. 452

    Node Selection Algorithms with Data Accuracy Guarantee in Service-Oriented Wireless Sensor Networks by Hongju Cheng, Ronglie Guo, Yuzhong Chen

    Published 2013-04-01
    “…The service-oriented architecture is considered as a new emerging trend for the future of wireless sensor networks in which different types of sensors can be deployed in the same area to support various service requirements. …”
    Get full text
    Article
  13. 453
  14. 454

    Novel Energy-Efficient Miner Monitoring System with Duty-Cycled Wireless Sensor Networks by Peng Guo, Tao Jiang, Kui Zhang

    Published 2012-01-01
    “…Target monitoring is an important application of wireless sensor networks. In this paper, we develop an energy-efficient miner monitoring system with sensor nodes. …”
    Get full text
    Article
  15. 455

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…Clustering technology is one of the crucial technologies to prolong the lifetime in wireless sensor networks. However, most cluster schemes choose cluster head randomly to send data without considering load balancing and security. …”
    Get full text
    Article
  16. 456

    EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM by T Devapriya, V Ganesan, S Velmurugan

    Published 2024-12-01
    Subjects: “…malicious node detection, wireless sensor networks, rabin-karp algorithm, data integrity, energy efficiency…”
    Get full text
    Article
  17. 457

    Energy-Efficient Clustering and Localization Technique Using Genetic Algorithm in Wireless Sensor Networks by Junfeng Chen, Samson Hansen Sackey, Joseph Henry Anajemba, Xuewu Zhang, Yurun He

    Published 2021-01-01
    “…Localization is recognized among the topmost vital features in numerous wireless sensor network (WSN) applications. This paper puts forward energy-efficient clustering and localization centered on genetic algorithm (ECGAL), in which the residual energy, distance estimation, and coverage connection are developed to form the fitness function. …”
    Get full text
    Article
  18. 458
  19. 459
  20. 460