Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    ARTICLE

    A Perceptron Algorithm for Forest Fire Prediction Based on Wireless Sensor Networks

    Haoran Zhu1, Demin Gao1,2,*, Shuo Zhang1

    Journal on Internet of Things, Vol.1, No.1, pp. 25-31, 2019, DOI:10.32604/jiot.2019.05897

    Abstract Forest fire prediction constitutes a significant component of forest management. Timely and accurate forest fire prediction will greatly reduce property and natural losses. A quick method to estimate forest fire hazard levels through known climatic conditions could make an effective improvement in forest fire prediction. This paper presents a description and analysis of a forest fire prediction methods based on machine learning, which adopts WSN (Wireless Sensor Networks) technology and perceptron algorithms to provide a reliable and rapid detection of potential forest fire. Weather data are gathered by sensors, and then forwarded to the server, More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) More >

  • Open Access

    ARTICLE

    Maximum Data Generation Rate Routing Protocol Based on Data Flow Controlling Technology for Rechargeable Wireless Sensor Networks

    Demin Gao1, 2, *, Shuo Zhang1, Fuquan Zhang1, Xijian Fan1, Jinchi Zhang1,∗

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 649-667, 2019, DOI:10.32604/cmc.2019.05195

    Abstract For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data More >

  • Open Access

    ARTICLE

    An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks

    Jin Wang1,2,3, Yu Gao3, Wei Liu3, Wenbing Wu1, Se-Jung Lim4,*

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 711-725, 2019, DOI:10.32604/cmc.2019.05450

    Abstract Recently, Wireless sensor networks (WSNs) have become very popular research topics which are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the Internet of Things (IoT). An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism (ACMDGTM) algorithm is proposed which would mitigate the problem of “hot spots” among sensors to enhance the lifetime of networks. The clustering process takes sensors’ location and residual energy into consideration to elect suitable cluster heads. Furthermore, one mobile sink node is employed to access cluster heads in accordance with More >

  • Open Access

    ARTICLE

    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

  • Open Access

    ARTICLE

    A Multi-Objective Metaheuristics Study on Solving Constrained Relay Node Deployment Problem in WSNS

    Wenjie Yu, Xunbo Li, Hang Yang, Bo Huang

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 367-376, 2018, DOI:10.1080/10798587.2017.1294873

    Abstract This paper studies how to deploy relay nodes into traditional wireless sensor networks with constraint aiming to simultaneously optimize two important factors; average energy consumption and average network reliability. We consider tackling this multi-objective (MO) optimization problem with three metaheuristics, which employ greatly different evolutional strategies, and aim at an in-depth analysis of different performances of these metaheuristics to our problem. For this purpose, a statistical procedure is employed to analyse the results for confidence, in consideration of two MO quality metrics; hypervolume and coverage of two sets. After comprehensive analysis of the results, it More >

  • Open Access

    ARTICLE

    A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks

    Jin Wang1,2, Chunwei Ju2, Yu Gao2, Arun Kumar Sangaiah3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 433-446, 2018, DOI:10.3970/cmc.2018.04132

    Abstract Wireless Sensor Networks (WSNs) are large-scale and high-density networks that typically have coverage area overlap. In addition, a random deployment of sensor nodes cannot fully guarantee coverage of the sensing area, which leads to coverage holes in WSNs. Thus, coverage control plays an important role in WSNs. To alleviate unnecessary energy wastage and improve network performance, we consider both energy efficiency and coverage rate for WSNs. In this paper, we present a novel coverage control algorithm based on Particle Swarm Optimization (PSO). Firstly, the sensor nodes are randomly deployed in a target area and remain More >

  • Open Access

    ABSTRACT

    Bridge Health Mornitoring using Wireless Sensor Networks

    Byung-wan Jo1, Do-keun Kim2, Sung-keun Song3, Suk-un Kim4

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.1, No.4, pp. 167-172, 2007, DOI:10.3970/icces.2007.001.167

    Abstract Wireless sensor networks bring new challenges to Bridge monitoring. To monitor a bridge, behavior, including vibration and displacement, must be measured to analyze the health of the structure based on measured and collected data. The collected data can be used to compute modal properties of the bridge. A bridge is moved by external forces, including wind, seismic activity, and traffic. So it is very hard reliance of safety through a preexistence method which uses Data Logger. Dynamic behavior of a bridge is difficult to measure because of costs and installation methods. In this paper, a More >

Displaying 131-140 on page 14 of 139. Per Page