Wireless sensor networks are provided to be the key technology for Internet of Things and a medium between physical infrastructure, information and communication technologies. This requires a constantly growing necess...
详细信息
The more traditional approach towards launching a complaint is through written complaints that would be dropped into the complaint boxes available in some sectors, which has a lot of problems associated with it such a...
详细信息
Since processor speeds have plateaued in recent years, other avenues need to be explored to speed up Electronic Design Automation (EDA) applications in order to keep pace with the growing complexity of VLSI designs. T...
详细信息
The taxi GPS trace data has great potential value for the development of intelligent transportation. By analyzing the data, the social attributes of vehicles can be found, and the excavated information could play a gu...
详细信息
In the routing protocol of wireless sensor networks, the traditional LEACH algorithm is too random, and the cluster head selection of it is not ideal. To solve this problem, it proposes a WSN routing algorithm based o...
详细信息
In communication networks, if streams between two endpoints follow the same physical paths for both forward and reverse direction, they are symmetric. routing asymmetry affects several protocols, and impacts part of t...
详细信息
This paper analyzes the existing multiconstrained QoS routing methods, builds a mathematical model that satisfies multiconstrained QoS routing, and converts multiple constraints into a fitness function through a penal...
详细信息
Live migration of VM's is a common phenomenon in the cloud. It is part of load balancing of data. If one server crashes, virtual machine migration helps us, as the data would be available in the other server. Thus...
详细信息
We consider a scenario where a mobile agent is required to collect measurements from a geographically dispersed set of sensors and return them to a base. The agent faces a risk of destruction while traversing the envi...
详细信息
We consider a scenario where a mobile agent is required to collect measurements from a geographically dispersed set of sensors and return them to a base. The agent faces a risk of destruction while traversing the environment to reach the sensors, and gets the reward for gathering a sensor measurement only if it successfully returns to base. We characterize several properties of the optimal policy for the agent based on a quantity that we term the "reward-to-risk" ratio of the tasks. We provide the optimal policy when the risk of destruction is sufficiently high, and evaluate several heuristic policies via simulation.
The Internet of Things (IoT), being a network of networks, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on me...
详细信息
The Internet of Things (IoT), being a network of networks, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on mesh topologies is very attractive, thanks to their scalability and reliability (in the presence of failures). In this paper, we provide a comprehensive survey of the following relevant wireless technologies: IEEE 802.11, Bluetooth, IEEE 802.15.4-oriented, and Sub-GHz-based LoRa. Our goal is to highlight how various communication technologies may be suitable for mesh networking, either providing a native support or being adapted subsequently. Hence, we discuss how these wireless technologies, being either standard or proprietary, can adapt to IoT scenarios (e.g., smart cities and smart agriculture) in which the heterogeneity of the involved devices is a key feature. Finally, we provide reference use cases involving all the analyzed mesh-oriented technologies.
暂无评论