... pages doi:10.1155/2008/287870 Research Article Distributed Event-Region Detection in Wireless Sensor Networks Jun Fang and Hongbin Li Depar tment of Electrical and Computer Engineering, Stevens Institute of Technology, ... the training data in capturing the true field. In practice, the training data should have a good representation of the true field, for example, the number of ev...
Ngày tải lên: 22/06/2014, 19:20
... for approximate inference in DBNs,” in Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence, 2001. [29] F. Hutter, N. Brenda, and R. Dearden, “Incremental thin junction trees ... rendering the exact inference algorithm intractable. In fact, intractability is an intrinsic property of the data association problems, no matter in VSN or in traditional multitar...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: "Research Article Dynamic Object Tracking Tree in Wireless Sensor Network" pptx
... tracking using sen- sor networks,” in Proceedings of IEEE International Conference on Wireless Communications and Networking, 2003. [5] C. Y. Lin, W. C. Peng, and Y. C. Tseng, “Efficient in- network moving ... in- network location management in a multi-sink wireless sensor network,” in Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy...
Ngày tải lên: 21/06/2014, 17:20
Báo cáo hóa học: "Research Article Biologically Inspired Target Recognition in Radar Sensor Networks" potx
... footprint of uncertainty of AC power values and region of interest in the footprint of uncertainty. Definition 1 (Footprint of Uncertainty). Uncertainty in the AC power values and time index consists ... mathematical modeling. In Section 3, we introduce the radar sensor network data collection. In Section 4, we apply the human information integration mechanisms to cognitive radar se...
Ngày tải lên: 21/06/2014, 23:20
Báo cáo hóa học: " Research Article Dynamic Session-Key Generation for Wireless Sensor Networks" ppt
... node in the network is linked as a chain. In each round, a node in the chaining structure is chosen as the chaining head. Both ends of the chain then start transmitting data to adjacent nodes in ... of the chaining head. In addition, each receiving node gathers the information. Finally, the chaining head transmits the information to the base station. In recent years, wireless s...
Ngày tải lên: 21/06/2014, 23:20
Báo cáo hóa học: " Research Article Scalable Coverage Maintenance for Dense Wireless Sensor Networks" doc
... and S. Plotkin, “Set K-cover algorithms for energy efficient monitoring in wireless sensor networks,” in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks ... Hsin and M. Liu, “Network coverage using low duty- cycled sensors: random & coordinated sleep algorithms,” in Proceedings of the 3rd International Symposium on Information Proces...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article Efficient MAC Protocols for Wireless Sensor Networks Endowed with Directive Antennas: A Cross-Layer Solution" pot
... phase in search of connectiv ity. In Figure 3, the signaling occurring within the regime phase is pointed out following the illustrative topology introduced above. In particular, the channel sensing ... protocol, each node might be either into an idle mode, in which it remains for a time interval T l (listening time), or in an energy saving sleep- ing state for a T s (sleeping time)...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article Energy-Constrained Optimal Quantization for Wireless Sensor Networks" doc
... properly cited. 1. INTRODUCTION Wireless sensor networks (WSN) are gaining increasing re- search interest for their emerging potential in both consumer and national security applications. Sensor networks ... solving the convex optimization problem in (8) using the interior-point method outlined in [16, Chapter 11]; Figure 4 depicts the result. 10 EURASIP Journal on Advances in S...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article Modeling the Lion Attack in Cognitive Radio Networks" pptx
... TCP source inactivity T after receiving an attack can be obtained as in T = ∞ i=1 t i ·Pr ( T = t i ) . (21) 3.7. Obtaining the TCP Inactivity Percentage due to the Lion Attack. We can assume an inactivity ... sender. Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011, Article ID 242304, 10 pages doi:10.1155/2011/242304 Research Art...
Ngày tải lên: 21/06/2014, 11:20
Báo cáo hóa học: " Research Article Multilayer Statistical Intrusion Detection in Wireless Networks" pptx
... radio frequency fingerprinting using signal phase,” in Proceedings of the Secure Mobile Ad-hoc Networks and Sensors Workshop, Held in Conjunction with the International Indus- trial Simulation ... by accurately determining its position. The main contributions of our work can be briefly described through the following points. (1) The physical layer preprocessor, aiming at gathering intrinsic...
Ngày tải lên: 21/06/2014, 22:20