咨询与建议

限定检索结果

文献类型

  • 86 篇 期刊文献
  • 52 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 133 篇 工学
    • 75 篇 计算机科学与技术...
    • 64 篇 电气工程
    • 31 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 15 篇 软件工程
    • 12 篇 仪器科学与技术
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 测绘科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 船舶与海洋工程
    • 2 篇 核科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 航空宇航科学与技...
    • 1 篇 农业工程
    • 1 篇 安全科学与工程
  • 27 篇 理学
    • 11 篇 物理学
    • 6 篇 数学
    • 5 篇 化学
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 地球物理学
    • 1 篇 海洋科学
  • 6 篇 医学
    • 5 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 140 篇 distributed sens...
  • 10 篇 wireless sensor ...
  • 8 篇 security
  • 7 篇 sensor placement
  • 7 篇 target tracking
  • 5 篇 optimization
  • 4 篇 access control
  • 4 篇 key establishmen...
  • 4 篇 authentication
  • 4 篇 sensor fusion
  • 4 篇 sensor networks
  • 3 篇 internet of thin...
  • 3 篇 reliability
  • 3 篇 system on fabric...
  • 3 篇 compressed sensi...
  • 3 篇 instruction syst...
  • 3 篇 wireless communi...
  • 3 篇 distributed sens...
  • 3 篇 bayes methods
  • 3 篇 surveillance

机构

  • 5 篇 duke univ dept e...
  • 5 篇 louisiana state ...
  • 4 篇 shanghai jiao to...
  • 3 篇 int inst informa...
  • 3 篇 univ tennessee d...
  • 2 篇 fed railrd adm o...
  • 2 篇 n carolina agr &...
  • 2 篇 georgia inst tec...
  • 2 篇 indian stat inst...
  • 2 篇 univ nebraska de...
  • 2 篇 jadavpur univ de...
  • 2 篇 virginia tech | ...
  • 2 篇 loughborough uni...
  • 1 篇 china univ min &...
  • 1 篇 univ valencia va...
  • 1 篇 beijing inst ele...
  • 1 篇 ipsc joint res c...
  • 1 篇 univ virginia ch...
  • 1 篇 univ zaragoza in...
  • 1 篇 imperial coll lo...

作者

  • 6 篇 iyengar ss
  • 5 篇 chakrabarty k
  • 4 篇 dong peng
  • 4 篇 das ashok kumar
  • 4 篇 wozniak szymon
  • 4 篇 kowalczyk konrad
  • 3 篇 jing zhongliang
  • 3 篇 fateh mahmood
  • 3 篇 nelson carl a.
  • 3 篇 qi hr
  • 3 篇 chatterjee santa...
  • 3 篇 wettergren thoma...
  • 2 篇 wang jinran
  • 2 篇 shen kai
  • 2 篇 hare james z.
  • 2 篇 flint james a.
  • 2 篇 varshney pramod ...
  • 2 篇 gupta shalabh
  • 2 篇 sarabandi kamal
  • 2 篇 kandaswamy parth...

语言

  • 134 篇 英文
  • 6 篇 其他
检索条件"主题词=Distributed Sensor Networks"
140 条 记 录,以下是131-140 订阅
排序:
State feedback control aware stochastic transmitting latency in cyber-physical power system
收藏 引用
INTERNATIONAL JOURNAL OF distributed sensor networks 2018年 第9期14卷 1-9页
作者: Ji, Hao Wang, Meng Yang, Ting Zhao, Junjie Tianjin Univ Minist Educ Key Lab Smart Grid Tianjin 300072 Peoples R China State Grid Tianjin Elect Power Co Tianjin Peoples R China
distributed sensor networks with a great number of sensors realize information gathering, transmitting, and controlling, which will greatly improve the reliability and efficiency of industrial infrastructure systems, ... 详细信息
来源: 评论
On the Robustness of Quantum Algorithms for Blockchain Consensus
收藏 引用
sensorS 2022年 第7期22卷 2716-2716页
作者: Ullah, Muhammad Asad Setiawan, Jason William Rehman, Junaid Ur Shin, Hyundong Kyung Hee Univ Dept Elect & Informat Convergence Engn Yongin 17104 Gyeonggi Do South Korea
Blockchain has revolutionized many fields, such as distributed sensor networks, finance, and cryptocurrency. Consensus between distributed network nodes is at the core of such blockchain technologies. The three primar... 详细信息
来源: 评论
distributed Adaptive Estimation with Probabilistic Data Association
收藏 引用
IFAC Proceedings Volumes 1987年 第5期20卷 215-220页
作者: K.C. Chang Y. Bar-shalom Advanced Decision Systems 201 San Antonio Circle 286 Mt. View CA 94040 USA U-157 ESE Department University of Connecticut Storrs CT 06268 USA
The probabilistic data association filter (PDAF) estimates the state of a target in a cluttered environment. This suboptimal Bayesian approach assumes that the exact target and measurement models are known. However, i... 详细信息
来源: 评论
Learning Damage Event Discriminator Functions with distributed Multi-instance RNN/LSTM Machine Learning - Mastering the Challenge
收藏 引用
Procedia Manufacturing 2020年 52卷 193-202页
作者: Stefan Bosse University of Bremen Dept. of Mathematics & Computer Science 28359 Bremen Germany
Common Structural Health Monitoring systems are used to detect past damages occurred in structures with sensor networks and external sensor data processing. The time of the damage creation event is commonly unknown. N... 详细信息
来源: 评论
A Virtual Machine Platform Providing Machine Learning as a Programmable and distributed Service for IoT and Edge On-Device Computing: Architecture, Transformation, and Evaluation of Integer Discretization
收藏 引用
ALGORITHMS 2024年 第8期17卷 356页
作者: Bosse, Stefan Univ Bremen Dept Math & Comp Sci D-28359 Bremen Germany Univ Siegen Dept Mech Engn D-57072 Siegen Germany
Data-driven models used for predictive classification and regression tasks are commonly computed using floating-point arithmetic and powerful computers. We address constraints in distributed sensor networks like the I... 详细信息
来源: 评论
TOLERATING FAILURES OF CONTINUOUS-VALUED sensorS
收藏 引用
ACM TRANSACTIONS ON COMPUTER SYSTEMS 1990年 第4期8卷 284-304页
作者: MARZULLO, K Cornell University
One aspect of fault-tolerance in process control programs is the ability to tolerate sensor failure. This paper presents a methodology for transforming a process control program that cannot tolerate sensor failures in... 详细信息
来源: 评论
Localizing Stationary Targets with Cooperative Unmanned Aerial Vehicles
收藏 引用
IFAC Proceedings Volumes 2009年 第22期42卷 68-73页
作者: Dimitri V. Zarzhitsky Pedro DeLima Daniel J. Pack Department of Electrical and Computer Engineering U.S. Air Force Academy CO 80840
Unmanned aerial vehicles (UAVs) play an increasingly important role in a large number of military applications. Frequently deployed for intelligence collection (e.g., surveillance and reconnaissance), they are also us... 详细信息
来源: 评论
Intrusion Detection System using Honey Token based Encrypted Pointers to Mitigate Cyber Threats for Critical Infrastructure networks
Intrusion Detection System using Honey Token based Encrypted...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Muhammad Kamran Asif Yahya Subhi Al-Harthi Department of Electrical Engineering King Saud University
Recent advancements in cyberspace impose a greater threat to the security of critical infrastructure than ever before. The scale of damage that could be done on these infrastructures by well-planned cyber-attacks is e... 详细信息
来源: 评论
Nonlinear Diffusion Adaptation with Bounded Transmission over distributed networks
Nonlinear Diffusion Adaptation with Bounded Transmission ove...
收藏 引用
IEEE International Conference on Communications
作者: Jongmin Lee Cihan Tepedelenlioglu Mahesh K. Banavar Andreas Spanias Signal and Information Processing (SenSIP) Center School of Electrical Computer and Energy Engineering Arizona State University Department of Electrical and Computer Engineering Clarkson University
This paper introduces diffusion adaptation strategies over distributed networks with nonlinear transmissions, motivated by the necessity for bounded transmit power. Local information is exchanged in real-time with nei... 详细信息
来源: 评论
Shape Reconstruction using Instruction Systolic Array
Shape Reconstruction using Instruction Systolic Array
收藏 引用
IEEE sensors Conference
作者: Partheepan Kandaswamy James A. Flint Vassilios A. Chouliaras Wolfson School of Mechanical Electrical and Manufacturing Engineering Loughborough University Loughborough LE11 3TU UK
This paper describes a novel, 2D mesh architecture prototype based on the Instruction Systolic Array (ISA) paradigm for distributed computing on fabrics. We discuss a real-time shape sensing and reconstruction applica... 详细信息
来源: 评论