Results 111 to 120 of about 1,136,430 (371)

Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Accelerating energy consumption and increasing data traffic have become prominent in large-scale wireless sensor networks (WSNs). Compressive sensing (CS) can recover data through the collection of a small number of samples with energy efficiency ...
Zhi-qiang Zou   +3 more
doaj   +1 more source

Localization in Wireless Sensor Networks: A Survey on Algorithms, Measurement Techniques, Applications and Challenges

open access: yesJ. Sens. Actuator Networks, 2017
Localization is an important aspect in the field of wireless sensor networks (WSNs) that has developed significant research interest among academia and research community.
A. Paul, Takuro Sato
semanticscholar   +1 more source

Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics

open access: yesAdvanced Materials, EarlyView.
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades   +7 more
wiley   +1 more source

Impact of moving target on underwater positioning by using state measurement

open access: yesInternet of Things and Cyber-Physical Systems
The localization of moving targets in an underwater acoustic wireless sensor network (UAWSN) is inaccurate due to the various underwater forces (viscous, hydrodynamic forces, perturbation of underwater). The false measurements in the sensor network cause
Tippireddy Srinivasa Reddy, Rajeev Arya
doaj   +1 more source

RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Evaluation of security risks in radio frequency identification (RFID) systems is a challenging problem in Internet of Things (IoT). This paper proposes an extended attack tree (EAT) model to identify RFID system's flaws and vulnerabilities.
Peng Li   +3 more
doaj   +1 more source

Vertical Self‐Rectifying Memristive Arrays for Page‐Wise Parallel Logic and Arithmetic Processing

open access: yesAdvanced Materials, EarlyView.
This study proposes a page‐wise logic‐in‐memory architecture realized in a 3D vertical resistvie random‐access memory array of self‐rectifying memristors. By introducing intra‐ and inter‐page logic primitives, the system enables Boolean and arithmetic operations to be executed directly within the memory.
Kunhee Son   +12 more
wiley   +1 more source

A Multi-Pathology Ballistocardiogram Dataset for Cardiac Function Monitoring and Arrhythmia Assessment

open access: yesScientific Data
Cardiac dysfunction plays a critical role in clinical diagnostics and treatment. Although traditional methods like echocardiography and blood biomarkers are effective, their limitations highlight the need for noninvasive and continuous monitoring ...
Jing Zhan   +6 more
doaj   +1 more source

Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Scenarios in which two nodes who distrust each other in wireless sensor networks (WSNs) would like to know the distance between them are considered. The scenario is designed to protect the private information of WSNs, in this case each node's location ...
Haiping Huang   +4 more
doaj   +1 more source

Near Optimal Broadcast with Network Coding in Large Sensor Networks [PDF]

open access: yes, 2007
We study efficient broadcasting for wireless sensor networks, with network coding. We address this issue for homogeneous sensor networks in the plane. Our results are based on a simple principle (IREN/IRON), which sets the same rate on most of the nodes (
Adjih, Cédric   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy