Ara
Toplam kayıt 13, listelenen: 1-10
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
(IEEE, 2006-08)
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the ...
The sectoral sweeper scheme for wireless sensor networks: Adaptive antenna array based sensor node management and location estimation
(Kluwer Academic Publishers-Plenum Publishers, 2006-12)
We introduce a novel sensor node management and location estimation method referred as sectoral sweeper (SS) scheme that uses an adaptive antenna array (AAA) at a central node in wireless sensor networks (WSNs). With the ...
A robust localization framework to handle noisy measurements in wireless sensor networks
(IEEE, 2009-09-14)
We construct a robust localization framework to handle noisy measurements in wireless sensor networks. Traditionally many approaches employ the distance information gathered from ranging devices of the sensor nodes to ...
Analysis of the benefits, challenges and risks for the integrated use of BIM, RFID and WSN: a mixed method research
(Emerald Group Publishing Ltd, 2023-07-11)
Purpose The purpose of this study is to identify, classify and prioritize the benefits, challenges and risks for the integrated use of building information modeling (BIM), radio frequency identification (RFID) and wireless ...
Improving age of information in random access channels
(Institute of Electrical and Electronics Engineers Inc., 2020-07)
We study Age of Information (AoI) in a random access channel where a number of devices try to send status updates over a common medium. Assuming a time-slotted scenario where multiple transmissions result in collision, we ...
When to pull data for minimum age penalty
(IEEE, 2021-10-18)
A communication receiver that wants to pull data from a remote sensor by exploiting wireless energy transfer is considered. The receiver has a long-term average energy budget for this operation, and its goal is to keep the ...
Resource allocation in the finite blocklength regime under PAoI and delay violation constraints
(IEEE, 2023-08-27)
URLLC (Ultra-reliable low-latency communication) is one of the more challenging modes for 5G for resource allocation (RA). Most of the previous studies for RA for wireless access in URLLC assumed known packet arrival ...
Force-directed approaches to sensor localization
(SIAM, 2006)
We consider the centralized, anchor-free sensor localization problem. We consider the case where the sensor network reports range information and the case where in addition to the range, we also have angular information ...
Design and implementation of a smart beehive and its monitoring system using microservices in the context of IoT and open data
(Elsevier B.V., 2022-05)
It is essential to keep honey bees healthy for providing a sustainable ecological balance. One way of keeping honey bees healthy is to be able to monitor and control the general conditions in a beehive and also outside of ...
Distribution games: a new class of games with application to user provided networks
(Institute of Electrical and Electronics Engineers Inc., 2022-11-29)
User Provided Network (UPN) is a promising solution for sharing the limited network resources by utilizing user capabilities as a part of the communication infrastructure. In UPNs, it is an important problem to decide how ...