In this paper, we propose a new control method to cover the "holes" in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are disabled from the collaboration d...
详细信息
this paper addresses the optimal rate allocation (ORA) problem as follows: given a target bit rate constraint, determine an optimal rate allocation among sensors such that the overall distortion of the reproduction da...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
this paper addresses the optimal rate allocation (ORA) problem as follows: given a target bit rate constraint, determine an optimal rate allocation among sensors such that the overall distortion of the reproduction data is minimized. Optimal rate allocation algorithms are proposed to determine the coding bit rate of each sensor in single hop and multi-hop sensor networks, given a target rate constraint. Extensive simulations are conducted by using temperature readings of the real world dataset. the results show that at low bit rates the optimal rate allocation improves about 2.745 dB on the uniform rate allocation in terms of SNR, and improves nearly 7.602 in terms of MSE. Spatial-temporal range queries are also evaluated to confirm that our approach is often sufficient to provide approximate statistics for range queries.
Energy efficiency of the MAC protocol is a key design factor for wireless sensor networks (WSNs). Due to the importance of the problem, a number of energy efficient MAC protocols have been developed for WSNs. Preamble...
详细信息
ISBN:
(纸本)9781424425747
Energy efficiency of the MAC protocol is a key design factor for wireless sensor networks (WSNs). Due to the importance of the problem, a number of energy efficient MAC protocols have been developed for WSNs. Preamble-sampling based MAC protocols (e.g., B-MAC and X-MAC) have overheads due to their preambles, and are inefficient at large wakeup intervals. SCP-MAC, a very energy efficient scheduling MAC protocol, minimizes the preamble by combining preamble sampling and scheduling techniques;however, it does not prevent energy loss due to overhearing;in addition, due to its synchronization procedure, it results in increased contention and delay. In this paper, we present an energy efficient MAC protocol for WSNs that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes. To validate our design and analysis, we implement the proposed scheme on the MicaZ platform. Experimental results show that AS-MAC considerably reduces energy consumption, packet loss and delay when compared with SCP-MAC.
Congestion in a Wireless sensor Network (WSN) can lead to buffer overflow, resource waste and delay or loss of critical information from the sensors. In this paper, we propose the Priority-based Coverage-aware Congest...
详细信息
In wireless sensor networks, the data aggregation is an essential paradigm for routing, through which the multiple data from different sensors can be aggregated into a single data at intermedial nodes enroute, in orde...
详细信息
ISBN:
(纸本)9780769532875
In wireless sensor networks, the data aggregation is an essential paradigm for routing, through which the multiple data from different sensors can be aggregated into a single data at intermedial nodes enroute, in order to eliminate data redundancy and achieve the goal of saving energy. Some existed medium access protocols and algorithms can effectively prolong the lifetime of the sensor network by determining when each sensor should transmit its data, and when it should sleep. In this paper, we focus on applying multiple spanning trees to organize the data aggregation, which is different from these existed single spanning tree methods. At first, the problem of constructing multiple spanning trees is transformed into a linear programming problem of the data flow network. Based on the solved optimal rate between the two adjacent sensors, the two constructing algorithms of the spanning tree are presented. Experimental results indicate that the method of multiple spanning trees can be of benefit to energy saving for wireless sensor networks, and the corresponding appropriate constructing algorithm can prolong the lifetime of the sensor network.
In Wireless sensor Networks (WSNs), sensors gather information about the physical world and base station makes appropriate decision upon the environment. this technology enables users to effectively sense and monitor ...
详细信息
In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected with secure communication in distributed authentication en...
详细信息
ISBN:
(纸本)9780769530994
In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected with secure communication in distributed authentication environments were briefly described. In this work a concept of enhancement of biometric authentication system by application of quantum protocols was formulated. Two quantum protocols were analyzed. Obtained experimental results enable further development of research work in chosen area.
A statement of the status quo of the PV power systems in Greece, as well as their possible contribution towards the enhancement of power distribution reliability, is the scope of the present paper. Siting and installa...
详细信息
ISBN:
(纸本)9781424417438
A statement of the status quo of the PV power systems in Greece, as well as their possible contribution towards the enhancement of power distribution reliability, is the scope of the present paper. Siting and installation of PV systems is performed according to a recent Greek law and by considering environmental and geographical constraints. Meteorological data about solar radiation and temperature are computed, formulated and imported to appropriate software in order to simulate the PV units and generate their power output. the above estimated power production is compared to data concerning load shedding. Assuming that a specific proportion of the eventually unsupplied power could be provided by the accessed power generation of the PV units, the reliability of the distribution system is improved. this improvement is quantified using the distribution system reliability indices SAIDI, SAIFI and CAIDI. the resulting improvement is finally expressed in financial terms through the reduction of interruption costs.
In this paper we present a new concept of distributed adaptation and P2P streaming supporting the expansion of context-aware mobile P2P systems. Here, we propose to adapt video contents in a distributed manner to addr...
详细信息
ISBN:
(纸本)9781424442362
In this paper we present a new concept of distributed adaptation and P2P streaming supporting the expansion of context-aware mobile P2P systems. Here, we propose to adapt video contents in a distributed manner to address the peer heterogeneity. It also forms an overlay network and organizes video streaming sessions among the participating peers. We have followed a master-sender-driven approach (one-to-many), withthe help of cooperative peers. the essential incentive behind this work is that withthe modem computing capabilities, a single peer can carry out sufficient adaptation operations and stream media contents to other peers. Overall design and adaptation approach along withthe performance evaluation is presented in brief.
the proceedings contain 60 papers. the topics discussed include: a dynamic window-constrained scheduling algorithm for multiprocessor real-time systems;improving the performance of heuristic searches with judicious in...
ISBN:
(纸本)9780769533483
the proceedings contain 60 papers. the topics discussed include: a dynamic window-constrained scheduling algorithm for multiprocessor real-time systems;improving the performance of heuristic searches with judicious initial point selection;on-line placement of real-time tasks on 2D partially run-time reconfigurable FPGAs;recognizing geometric path from polygon-based integrated circuit layout;the hardware/software partitioning in embedded system by improved particle swarm optimization algorithm;research on embedded surveillance platform in service environment;a rapid secret sharing scheme for resource constrained environments;a secure data aggregation algorithm based on behavior trust in wireless sensor networks;dual OS support peripheral device encapsulation;network security middleware based on USB key;a lightweight video encryption algorithm for wireless application;and a novel security scheme for video conference system with wireless terminals.
暂无评论