Results 31 to 40 of about 1,124,592 (372)
Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern
Aimed at the defects of current coverage-enhancing algorithms, firstly the probability model is introduced into the coverage-enhancing algorithm of the directional sensor network based on the virtual potential field, and the probability model would have ...
Junjie Huang +4 more
doaj +1 more source
HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua +4 more
doaj +1 more source
A system called WiSDP, which is based on Wi‐Fi signals, to detect whether a Seated Dumbbell Press action is standard by using inexpensive consumer Wi‐Fi devices is proposed. Compared with the scheme based on high speed cameras and wearable sensors, Wi‐Fi
Yuxi Qin +4 more
doaj +1 more source
QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra +4 more
doaj +1 more source
FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor Networks [PDF]
Wireless sensor networks (WSNs) include large-scale sensor nodes that are densely distributed over a geographical region that is completely randomized for monitoring, identifying, and analyzing physical events.
GhasemiGol, Mohammad +5 more
core +2 more sources
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj +1 more source
An Improved Intrusion Detection Algorithm Based on GA and SVM
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj +1 more source
In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic.
Junjie Huang +5 more
doaj +1 more source
Distributed Local Linear Parameter Estimation using Gaussian SPAWN [PDF]
We consider the problem of estimating local sensor parameters, where the local parameters and sensor observations are related through linear stochastic models. Sensors exchange messages and cooperate with each other to estimate their own local parameters
Leng, Mei +3 more
core +1 more source
Improving energy efficiency in wireless sensor networks through scheduling and routing
This paper is about the wireless sensor network in environmental monitoring applications. A Wireless Sensor Network consists of many sensor nodes and a base station.
A, Sivasubramanian., R, Rathna.
core +1 more source

