Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (198)
  • Open Access

    ARTICLE

    Nature Inspired Improved Firefly Algorithm for Node Clustering in WSNs

    V. Manikandan1, *, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 753-776, 2020, DOI:10.32604/cmc.2020.010267

    Abstract Wireless Sensor Networks (WSNs) comprises low power devices that are randomly distributed in a geographically isolated region. The energy consumption of nodes is an essential factor to be considered. Therefore, an improved energy management technique is designed in this investigation to reduce its consumption and to enhance the network’s lifetime. This can be attained by balancing energy clusters using a meta-heuristic Firefly algorithm model for network communication. This improved technique is based on the cluster head selection technique with measurement of the tour length of fireflies. Time Division Multiple Access (TDMA) scheduler is also improved with the characteristics/behavior of fireflies… More >

  • Open Access

    ARTICLE

    Pipeline Scheduling Based on Constructive Interference in Strip Wireless Sensor Networks

    Xiangmao Chang1, 2, *, Xiaoxiang Xu1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 193-206, 2020, DOI:10.32604/cmc.2020.08183

    Abstract Strip Wireless Sensor Networks (SWSNs) have drawn much attention in many applications such as monitoring rivers, highways and coal mines. Packet delivery in SWSN usually requires a large number of multi-hop transmissions which leads to long transmission latency in low-duty-cycle SWSNs. Several pipeline scheduling schemes have been proposed to reduce latency. However, when communication links are unreliable, pipeline scheduling is prone to failure. In this paper, we propose a pipeline scheduling transmission protocol based on constructive interference. The protocol first divides the whole network into multiple partitions and uses a pipelined mechanism to allocate active time slots for each partition.… More >

  • Open Access

    ARTICLE

    Stabilizing Energy Consumption in Unequal Clusters of Wireless Sensor Networks

    Nithya Rekha Sivakumar1, *

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 81-96, 2020, DOI:10.32604/cmc.2020.08851

    Abstract In the past few decades, Energy Efficiency (EE) has been a significant challenge in Wireless Sensor Networks (WSNs). WSN requires reduced transmission delay and higher throughput with high quality services, it further pays much attention in increased energy consumption to improve the network lifetime. To collect and transmit data Clustering based routing algorithm is considered as an effective way. Cluster Head (CH) acts as an essential role in network connectivity and perform data transmission and data aggregation, where the energy consumption is superior to non-CH nodes. Conventional clustering approaches attempts to cluster nodes of same size. Moreover, owing to randomly… More >

  • Open Access

    ARTICLE

    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a state of the art the… More >

  • Open Access

    ARTICLE

    Data Cleaning Based on Stacked Denoising Autoencoders and Multi-Sensor Collaborations

    Xiangmao Chang1, 2, *, Yuan Qiu1, Shangting Su1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 691-703, 2020, DOI:10.32604/cmc.2020.07923

    Abstract Wireless sensor networks are increasingly used in sensitive event monitoring. However, various abnormal data generated by sensors greatly decrease the accuracy of the event detection. Although many methods have been proposed to deal with the abnormal data, they generally detect and/or repair all abnormal data without further differentiate. Actually, besides the abnormal data caused by events, it is well known that sensor nodes prone to generate abnormal data due to factors such as sensor hardware drawbacks and random effects of external sources. Dealing with all abnormal data without differentiate will result in false detection or missed detection of the events.… More >

  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks

    Bing Hu1, Feng Xiang2, Fan Wu3, Jian Liu4, Zhe Sun1, Zhixin Sun1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1323-1344, 2019, DOI:10.32604/cmc.2019.06414

    Abstract To cope with the arbitrariness of the network delays, a novel method, referred to as the composite particle filter approach based on variational Bayesian (VB-CPF), is proposed herein to estimate the clock skew and clock offset in wireless sensor networks. VB-CPF is an improvement of the Gaussian mixture kalman particle filter (GMKPF) algorithm. In GMKPF, Expectation-Maximization (EM) algorithm needs to determine the number of mixture components in advance, and it is easy to generate overfitting and underfitting. Variational Bayesian EM (VB-EM) algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations. Moreover,… More >

  • Open Access

    ARTICLE

    CPAC: Energy-Efficient Algorithm for IoT Sensor Networks Based on Enhanced Hybrid Intelligent Swarm

    Qi Wang1,*, Wei Liu1, Hualong Yu1, Shang Zheng1, Shang Gao1, Fabrizio Granelli2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.1, pp. 83-103, 2019, DOI:10.32604/cmes.2019.06897

    Abstract The wireless sensor network (WSN) is widely employed in the application scenarios of the Internet of Things (IoT) in recent years. Extending the lifetime of the entire system had become a significant challenge due to the energy-constrained fundamental limits of sensor nodes on the perceptual layer of IoT. The clustering routing structures are currently the most popular solution, which can effectively reduce the energy consumption of the entire network and improve its reliability. This paper introduces an enhanced hybrid intelligential algorithm based on particle swarm optimization (PSO) and ant colony optimization (ACO) method. The enhanced PSO is deployed to select… More >

  • Open Access

    ARTICLE

    Cultivated Land Monitoring System Based on Dynamic Wake-Up UAV and Wireless of Distributed Storage

    Longqing Zhang1, Liping Bai1,*, Xinwei Zhang2, Yanghong Zhang2, Lei Yang1, Xiangdu Yan2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 817-828, 2019, DOI:10.32604/cmc.2019.06062

    Abstract The drawbacks of the traditional multi-hop structure of wireless sensor networks (WSNS) are susceptible to reflection, scattering and diffraction, serious attenuation of signal intensity and phase deviation due to various obstacles in cultivated land environment and mountains. In this paper, the wireless signal intensity is measured and curve fitting is done respectively in both open environment and obstacle-environment with both sending and receiving height of 0 m, 1 m, and 2 m. It is found out that packet loss probability is too high when an obstacle exists. In such a case, unmanned aerial vehicle (UAV) is introduced to activate terrestrial… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237

    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether… More >

Displaying 181-190 on page 19 of 198. Per Page