This paper considers a sensor deployment problem of a hierarchical cluster-based Wireless sensor Network (WSN), which consists of sensor clusters scattered over a sensing region. We formulated the sensor deployment as...
详细信息
ISBN:
(纸本)9780769529943
This paper considers a sensor deployment problem of a hierarchical cluster-based Wireless sensor Network (WSN), which consists of sensor clusters scattered over a sensing region. We formulated the sensor deployment as a network optimization problem called the OSCDP (Optimum sensor Cluster Deployment Problem). Given a fixed quantity of total energy power of sensors for deployment and a static routing scheme, the OSCDP aims to determine the amount of energy deployed in each cluster such that the network lifetime expectation will be maximized. We propose an exact algorithm to provide the optimum solution to the OSCDP. The simulation results show that this solution performed better in prolonging the network lifetime of a WSN, compared to other conventional deployment schemes.
Thermocouple sensor for temperature measurement has been widely used, however, the increase of precision is constrained due to the shortcoming of hardware based or table look up method, especially with nonlinear adjus...
详细信息
The main concern dealing with Content-based Image Retrieval (CBIR) is to bridge the semantic gap. The high level query posed by the user and low level features extracted by the machine illustrates the problem of seman...
详细信息
ISBN:
(纸本)9781424415014
The main concern dealing with Content-based Image Retrieval (CBIR) is to bridge the semantic gap. The high level query posed by the user and low level features extracted by the machine illustrates the problem of semantic gap. To solve the problem of semantic gap, this paper presents a hybrid technique using an emergence index and fuzzy logic for efficient retrieval of images based on the colour feature. Emergence Index (EI) is proposed to understand the hidden meaning of the image. Fuzzy Similarity Measure is developed to calculate the similarity between the target image and the images in the database. The images were ranked based on their similarity along with the fuzzy similarity distance measure. The preliminary experiments conducted on small set of images and promising results were obtained.
Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact o...
详细信息
ISBN:
(纸本)9781424451807
Physical layer security has recently attracted an increasing attention in wireless networks. While existing work on physical layer security focuses on the information theoretic aspects, this paper studies the impact of the presence of eavesdroppers on the topology and dynamics of wireless multi-hop networks. In this context, we investigate the problem of the distributed formation of a hierarchical tree topology among a number of nodes that seek to send data in the uplink to a central base station through multi-hop in the presence of multiple eavesdroppers. We model the problem as a network formation game where the nodes engage in pairwise negotiations to form the path that connects them to the central base station, while maximizing their utility in terms of the minimum secrecy capacity achieved. For forming the topology, we propose a myopic best response algorithm that enables the wireless nodes to self-organize into a Nash tree structure. Simulation results show that the proposed algorithm presents significant gains in terms of average achieved expected utility per node compared to a best-neighbor algorithm.
For increasing demands on transceiving coverage, reliability and high resolution of sensing data in modem wireless sensor network applications, a novel digital transceiver scheme for wireless sensor node with integrat...
详细信息
ISBN:
(纸本)9781424418343
For increasing demands on transceiving coverage, reliability and high resolution of sensing data in modem wireless sensor network applications, a novel digital transceiver scheme for wireless sensor node with integration of WiMAX PHY QoS, and low-density parity check (LDPC) code had been proposed. It will be 67% energy saving to support high gain sensing amplifier thus to provide high resolution digitization of sensing data. With WiMAX based regulation, 30 mile transmission range and 74Mbps data rate for long range and high data rate wireless sensornetworks can be achieved.
With the implementation of European Union39;s restriction of hazardous substances directive, there is a sharp decline on electronic equipment corrosion resistance. The reason is that gaseous contaminations cause cre...
详细信息
ISBN:
(纸本)9781509030712
With the implementation of European Union's restriction of hazardous substances directive, there is a sharp decline on electronic equipment corrosion resistance. The reason is that gaseous contaminations cause creep corrosion on printed circuit boards. Based on wireless sensornetworks, three-dimensional space model, environmental information and computational fluid dynamics theory, an evaluation method is proposed to calculate the wind speed, temperature, relative humidity and corrosive gas concentration around each equipment in internet data centre. To evaluate the performance of this method, a wireless sensors system is set up. Test results show that the real-time evaluation method can effectively guarantee equipment in safe environment.
In order to improve the status monitoring and management ability of wireless sensornetworks, a dynamic data compression method based on grid deduplication is proposed. Grid-based sensor node spatial positioning and b...
详细信息
User authentication and secret session key exchange between a user and a sensor node are important security requirements of wireless sensornetworks for retrieving the important, confidential and real time information...
详细信息
ISBN:
(纸本)9783319229157;9783319229140
User authentication and secret session key exchange between a user and a sensor node are important security requirements of wireless sensornetworks for retrieving the important, confidential and real time information from the sensor nodes. In 2014, Choi et al. proposed a elliptic curve cryptography based user authentication protocol with enhanced security for wireless sensornetworks and after security analysis of their protocol we find that their protocol has some security drawbacks such as (1) no resilient against node capture attack, (2) insecure against stolen smart card attack (3) vulnerable to sensor node energy exhausting attacks. Based on the security analysis we propose a scheme to withstand the various security weaknesses of WSNs. Furthermore, the comparative security and computational performance analysis indicate that our proposed scheme is relatively more secure and efficient.
This paper presents the application of reinforcement learning-an unsupervised learning technique-to sensor scan optimisation for the purpose of multi-target tracking from helicopter platforms. The sensor considered in...
详细信息
ISBN:
(纸本)9781424415014
This paper presents the application of reinforcement learning-an unsupervised learning technique-to sensor scan optimisation for the purpose of multi-target tracking from helicopter platforms. The sensor considered in this paper is the forward looking IR (FLIR) sensor The potential for reinforcement learning based optimisation techniques to provide improved performance over deterministic scan pattern search methods is illustrated by way of simulation examples. Ground targets to be tracked by FLIR are modelled as Markovian processes. The optimisation problem is cast into a "sensor scheduling" framework to facilitate the use of reinforcement learning. Prioritisation of targets in multiple-target detection problems and targets of different threat levels are also considered and illustrated with simulation examples.
The proceedings contains 142 papers. Topics discussed include risk and reliability, uncertainty analysis, control, fuzzy data analysis, civil engineering applications in Japan, structural engineering applications, pat...
详细信息
The proceedings contains 142 papers. Topics discussed include risk and reliability, uncertainty analysis, control, fuzzy data analysis, civil engineering applications in Japan, structural engineering applications, patterns and fuzzy reasoning, uncertainty in engineering designs, fuzzy decision analysis, neural networks, genetic methods, approximate reasoning, fuzzy informationprocessing, optimization, uncertainty in logic, transportation and scheduling, fuzzy sets and systems in signal processing, numerical methods, uncertainty in databases, uncertainty in information, knowledge bases, and complexity.
暂无评论