Results 1 to 10 of about 1,061,536 (205)
Wireless sensor networks [PDF]
In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network.
Havinga, Paul J.M. +2 more
core +14 more sources
This chapter presents the studies and analysis on the approaches, the concepts, and the ideas on data packet size optimization for data packets transmission in underwater wireless sensor network (UWSN) and terrestrial wireless sensor network (TWSN) communications.
Low Tang Jung, Azween Abdullah
semanticscholar +3 more sources
Malicious anchor node is a serious issue in underwater sensor networks. This problem gets compounded under sparse deployment scenario. To overcome this issue, the authors present a Compressed Sensing for Malicious node Compensation theorem (abbreviated ...
Prateek +4 more
doaj +1 more source
Outlier detection algorithm based on k-nearest neighbors-local outlier factor
The main task of outlier detection is to detect data objects which have a different mechanism from the conventional data set. The existing outlier detection methods are mainly divided into two directions: local outliers and global outliers. Aiming at the
He Xu, Lin Zhang, Peng Li, Feng Zhu
doaj +1 more source
Localization in underwater wireless sensor network (UWSN) faces an imminent threat when the triangulating anchor node starts to malfunction. Traditional geometric approaches are insufficient to cope with the survivability of UWSN topology.
Prateek +4 more
doaj +1 more source
Networking issues in wireless sensor networks [PDF]
The emergence of sensor networks as one of the dominant technology trends in the coming decades (Technol. Rev. (February 2003)) has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to ...
Ganesan, Deepak +5 more
openaire +2 more sources
An Entity Relation Extraction Method Based on Dynamic Context and Multi-Feature Fusion
Dynamic context selector, a kind of mask idea, will divide the matrix into some regions, selecting the information of region as the input of model dynamically.
Xiaolin Ma +3 more
doaj +1 more source
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
Energy and security are major challenges in a wireless sensor network, and they work oppositely. As security complexity increases, battery drain will increase.
Rami Ahmad +2 more
semanticscholar +1 more source
A Keyword Detection and Context Filtering Method for Document Level Relation Extraction
Relation extraction (RE) is the core link of downstream tasks, such as information retrieval, question answering systems, and knowledge graphs. Most of the current mainstream RE technologies focus on the sentence-level corpus, which has great limitations
Hailan Kuang +3 more
doaj +1 more source
Heart Rate Measurement Based on 3D Central Difference Convolution with Attention Mechanism
Remote photoplethysmography (rPPG) is a video-based non-contact heart rate measurement technology. It is a fact that most existing rPPG methods fail to deal with the spatiotemporal features of the video, which is significant for the extraction of the ...
Xinhua Liu +3 more
doaj +1 more source

