咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32 篇 工学
    • 18 篇 电气工程
    • 18 篇 信息与通信工程
    • 16 篇 计算机科学与技术...
    • 12 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 3 篇 交通运输工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 软件工程
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 33 篇 coverage and con...
  • 8 篇 wireless sensor ...
  • 5 篇 wireless sensor ...
  • 3 篇 security
  • 3 篇 energy efficienc...
  • 2 篇 minimum spanning...
  • 2 篇 directional wire...
  • 2 篇 critical density
  • 2 篇 iterative method...
  • 2 篇 node deployment
  • 2 篇 dynamic wireless...
  • 2 篇 steepest descent
  • 2 篇 meta-heuristic a...
  • 2 篇 continuum percol...
  • 2 篇 directional sens...
  • 2 篇 two-node coopera...
  • 2 篇 cooperative comm...
  • 2 篇 uavs
  • 1 篇 sensor nodes
  • 1 篇 internet of thin...

机构

  • 1 篇 univ south dakot...
  • 1 篇 univ manouba nat...
  • 1 篇 dongguk univ dep...
  • 1 篇 univ quebec ets ...
  • 1 篇 tsinghua univ ts...
  • 1 篇 higher institute...
  • 1 篇 bennett univ sch...
  • 1 篇 shaan xi prov el...
  • 1 篇 cornell univ sch...
  • 1 篇 natl inst techno...
  • 1 篇 fuzhou univ sch ...
  • 1 篇 indian inst tech...
  • 1 篇 univ illinois de...
  • 1 篇 nit raipur dept ...
  • 1 篇 beijing univ pos...
  • 1 篇 towson univ dept...
  • 1 篇 chitkara univ sc...
  • 1 篇 duke univ dept e...
  • 1 篇 nit raipur dept ...
  • 1 篇 univ engn & tech...

作者

  • 2 篇 khan khalid
  • 2 篇 lobiyal d. k.
  • 1 篇 xiuhua li
  • 1 篇 ma lin
  • 1 篇 hoang anh
  • 1 篇 san-um wimol
  • 1 篇 duc manh phan
  • 1 篇 he jianfeng
  • 1 篇 marwat safdar na...
  • 1 篇 sun zeyu
  • 1 篇 lu xiaolin
  • 1 篇 huy nhat minh vu
  • 1 篇 cao yuxin
  • 1 篇 park doo-soon
  • 1 篇 sun youxian
  • 1 篇 jeong young-sik
  • 1 篇 xiaolong xie
  • 1 篇 wang biao
  • 1 篇 caesar matthew
  • 1 篇 li jinlan

语言

  • 32 篇 英文
  • 1 篇 其他
检索条件"主题词=coverage and connectivity"
33 条 记 录,以下是31-40 订阅
排序:
A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks
A Chaos-Based Keyed Hash Function for Secure Protocol and Me...
收藏 引用
Science and Information Conference (SAI)
作者: Chankasame, Winai San-Um, Wimol Thai Nichi Inst Technol TNI Fac Engn Master Program Engn Technol Intelligent Elect Syst IES Res Lab Patthanakarn 37 Bangkok 10250 Thailand
The design of communication protocols in the Mobile Ad hoc Networks (MANET) is challenging due to limited wireless transmission ranges of node mobility, limited power resources, and limited physical security. The adva... 详细信息
来源: 评论
An efficient strategy of nonuniform sensor deployment in cyber physical systems
收藏 引用
JOURNAL OF SUPERCOMPUTING 2013年 第1期66卷 70-80页
作者: Kim, Yong-hwan Kim, Chan-Myung Han, Youn-Hee Jeong, Young-Sik Park, Doo-Soon Korea Univ Technol & Educ Adv Technol Res Ctr Lab Intelligent Networks Cheonan South Korea Dongguk Univ Dept Multimedia Engn Seoul South Korea Soonchunhyang Univ Div Comp Sci & Engn Asan South Korea
In this paper, we study the sensor deployment pattern problem in cyber physical systems. When designing the sensor deployment pattern, the network lifetime maximization while covering the given area/targets and forwar... 详细信息
来源: 评论
A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2005年 第8期54卷 978-991页
作者: Zou, Y Chakrabarty, K Duke Univ Dept Elect & Comp Engn Durham NC 27708 USA
Due to their low cost and small form factors, a large number of sensor nodes can be deployed in redundant fashion in dense sensor networks. The availability of redundant nodes increases network lifetime as well as net... 详细信息
来源: 评论