Results 21 to 30 of about 1,380,281 (286)
Traffic Aware Data Gathering Protocol for VANETs
Vehicular Ad-Hoc Networks (VANETs) are a challenging yet active research area. It offers a wide range of applications, including Intelligent Transport System (ITS), effective road traffic monitoring, efficient traffic flow and road safety applications ...
Maryam Gillani +4 more
doaj +1 more source
This chapter offers detailed information on how data for the reported study were obtained and what characteristics the sample has. To ease understanding for the general readership, the chapter also includes brief portrays of the six European countries (Germany, France, Italy, Spain, Netherlands, and UK) included in the study.
Erhabor Idemudia, Klaus Boehnke
openaire +1 more source
Network correlated data gathering with explicit communication: NP-completeness and algorithms [PDF]
We consider the problem of correlated data gathering by a network with a sink node and a tree-based communication structure, where the goal is to minimize the total transmission cost of transporting the information collected by the nodes, to the sink ...
Baltasar Beferull-lozano +6 more
core +4 more sources
On Wireless Power Transfer and Max Flow in Rechargeable Wireless Sensor Networks
In rechargeable or energy harvesting wireless sensor networks (WSNs), a key concern is the max flow or data rate at one or more sinks. However, this data rate is constrained by the available energy at each node as well as link capacity. To date, in order
Tengjiao He, Kwan-Wu Chin, Sieteng Soh
doaj +1 more source
Wireless battery recharging through UAV in wireless sensor networks
In this contemporary era, recent developments have seen proliferation of methods on improving energy utilization for wireless sensor networks. Although the proposed methods can mitigate the problem of rapid battery depletion to some extent, the lifespan ...
Mohit Angurala +2 more
doaj +1 more source
Cybercrime money laundering cases and digital evidence [PDF]
The widespread dependence on digital systems and increased value of digital commerce in the metaverse boosted cyber vulnerability. The cybercrime will be more profitable than the global trade of all major illegal drugs combined, while Cybersecurity ...
Matić-Bošković Marina M.
doaj
Unbalanced Expander Based Compressive Data Gathering in Clustered Wireless Sensor Networks
Conventional compressive sensing-based data gathering (CS-DG) algorithms require a large number of sensors for each compressive sensing measurement, thereby resulting in high energy consumption in clustered wireless sensor networks (WSNs).
Xiangling Li, Xiaofeng Tao, Guoqiang Mao
doaj +1 more source
Data gathering for science and research
Reasoning and argumentation in empirical sciences and research is based on row data and the intermediate and final structures, calculations etc., derived from the raw data.
J. Vaníček
doaj +1 more source
Transform-based Distributed Data Gathering
A general class of unidirectional transforms is presented that can be computed in a distributed manner along an arbitrary routing tree. Additionally, we provide a set of conditions under which these transforms are invertible.
Ortega, Antonio, Shen, Godwin
core +1 more source
Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin +2 more
core +1 more source

