Results 31 to 40 of about 1,112,751 (384)

Consumer Wi‐Fi device based action quality recognition: An illustrative example of seated dumbbell press action

open access: yesIET Communications, 2021
A system called WiSDP, which is based on Wi‐Fi signals, to detect whether a Seated Dumbbell Press action is standard by using inexpensive consumer Wi‐Fi devices is proposed. Compared with the scheme based on high speed cameras and wearable sensors, Wi‐Fi
Yuxi Qin   +4 more
doaj   +1 more source

QoS in Wireless Sensor Networks [PDF]

open access: yesSensors, 2018
The last decades have witnessed advances in multiple wireless sensor networks in both the academic and industrial world. [...]
openaire   +3 more sources

FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor Networks [PDF]

open access: yes, 2019
Wireless sensor networks (WSNs) include large-scale sensor nodes that are densely distributed over a geographical region that is completely randomized for monitoring, identifying, and analyzing physical events.
GhasemiGol, Mohammad   +5 more
core   +2 more sources

An Improved Intrusion Detection Algorithm Based on GA and SVM

open access: yesIEEE Access, 2018
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj   +1 more source

Wireless Sensor Networks: Applications

open access: yes, 2021
Wireless sensor networks consist of small nodes with identifying component by sensing, computation, and wireless communications infrastructure capabilities. Many path searching means routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols
Bhargavi, Dalal,, Sampada, Kukarni,
openaire   +3 more sources

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic.
Junjie Huang   +5 more
doaj   +1 more source

The Reliability of Wireless Sensor Network

open access: yes, 2014
The wireless communication is one of the widely used methods of data transfer at the present days. The benefit of this communication method is the partial independence of the infrastructure and the possibility of mobility. In some special applications it is the only way how to connect. This paper presents some problems in the implementation of a sensor
Juhasova, Bohuslava   +2 more
openaire   +1 more source

Miniaturized Wireless Sensor Networks

open access: yes2006 International Semiconductor Conference, 2006
This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.
Lecointre, Aubin   +9 more
openaire   +3 more sources

An Enhanced PSO-Based Clustering Energy Optimization Algorithm for Wireless Sensor Network

open access: yesTheScientificWorldJournal, 2016
Wireless Sensor Network (WSN) is a network which formed with a maximum number of sensor nodes which are positioned in an application environment to monitor the physical entities in a target area, for example, temperature monitoring environment, water ...
C. Vimalarani   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy