Results 1 to 10 of about 416,908 (286)
Service and device discovery of nodes in a wireless sensor network [PDF]
Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor\ud nodes requires a high-level framework enabling the devices to present ...
Halteren, A.T. van +3 more
core +9 more sources
Outlier detection algorithm based on k-nearest neighbors-local outlier factor
The main task of outlier detection is to detect data objects which have a different mechanism from the conventional data set. The existing outlier detection methods are mainly divided into two directions: local outliers and global outliers. Aiming at the
He Xu, Lin Zhang, Peng Li, Feng Zhu
doaj +1 more source
Power minimization for GSIC-based uplink cell-free massive MIMO-NOMA systems
Non-orthogonal multiple access (NOMA) and multiple-input multiple-output (MIMO) are considered promising techniques to satisfy the demands for high spectrum efficiency and massive connectivity in future wireless communication.
Tao Cui +3 more
doaj +1 more source
Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated ...
Prateek +4 more
doaj +1 more source
Moving Object Detection With Deep CNNs
In large field of view for open country, the real-time detection and identification of moving objects with high accuracy is a very challenging work due to the excessive amount of data.
Haidi Zhu +5 more
doaj +1 more source
Wireless sensor node localization [PDF]
For most wireless sensor network (WSN) applications, the positions of the sensor nodes need to be known. Global positioning systems have not fitted into WSNs very well owing to their price, power consumption, accuracy and limitations in their operating environment. Hence, the last decade has brought about a large number of proposed methods for WSN node
Ákos, Lédeczi, Miklós, Maróti
openaire +2 more sources
Cloud computing provides many advantages services to its users like online resources accessibility, better cost management, dynamic resource pooling, and efficient Virtual Machine (VM) allocation.
Kalka Dubey, S.C. Sharma
doaj +1 more source
Robust Resource Allocation for Indoor Self-Blockage Millimeter Wave Device-to-Device Communications
The advancement of millimeter wave (mmWave) technology can meet the requirements of large amounts of data communications among intelligent devices for indoor scenarios. However, reducing interference in an enclosed region is still challenging because the
Haie Dou +5 more
doaj +1 more source
Noise-resistant network: a deep-learning method for face recognition under noise
Along with the developments of deep learning, many recent architectures have been proposed for face recognition and even get close to human performance.
Yuanyuan Ding +5 more
doaj +1 more source
Localization in underwater wireless sensor network (UWSN) faces an imminent threat when the triangulating anchor node starts to malfunction. Traditional geometric approaches are insufficient to cope with the survivability of UWSN topology.
Prateek +4 more
doaj +1 more source

