首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.

Wireless sensor networks produce immense sensor readings within a report interval to the sink. So transfer of information in a resource constrained wireless environment is difficult. Compressive sensing overcomes the resource constrains in wireless environment by exploiting sparsity in transfer with fewer measurement and recovery of original signal. In this research Intelligent Neighbor Aided Compressive Sensing (INACS) scheme is proposed for efficient data assembly in spatial and temporal correlated WSNs. Sparse Matrix has been formed with spatial and temporal coordinates for data transfer. In every sensing period, the sensor node just sends the readings within the sensing period to uniquely selected neighbour based on a correlation. The transmission period provides significant improvement with compressed data using INACS with the measurement matrix. Thus INACS provides reduction in number of transmission and higher reconstruction accuracy. INACS has been compared with Compressive wireless sensing for reduction in number of transmissions achieved. The time series analysis with INACS has been done to validate the simultaneous association between number of transmissions and time period.

  相似文献   

2.

The main objective in wireless sensor networks is to exploit efficiently the sensor nodes and to prolong the lifetime of the network. The discussion of energy is a significant concern to extend the lifetime of the network. Moreover, a nature inspired hybrid optimization approach called hybrid Particle Swarm Optimization–Grey Wolf Optimizer (PSO–GWO) is used in this work to efficiently utilize the energy and to transmit the data securely in an augmented path. A Learning Dynamic Deterministic Finite Automata (LD2FA) has been innovated and initiated to learn the dynamic role of the environment. LD2FA is mainly used to provide the learned and accepted string to hybrid PSO–GGWO so that the routes are optimized. Hybrid PSO–GWO is used to choose the optimal next node for each path to obtain the optimal route. The simulation results are obtained in MATLAB for 100–700 sensor nodes in a region of 500 × 500 m2 which demonstrate that the proposed LD2FA based Hybrid PSO–GWO algorithm obtains better results when compared with existing algorithms. It is observed that LD2FA based Hybrid PSO–GWO has an increase of 18% and 48% betterment in lifetime of the network than PSO and GLBCA, nearly 57% and 75% increase in network lifetime when compared with GA and LDC respectively. It also shows an improvement of 24% increase compared to cluster-based IDS, nearly a rise of 90% throughput when compared with lightweight IDS. The consumption of energy is reduced by 13% and 15% than PSO and GA and an increase of 15% utilization of energy than LDC. Therefore, LD2FA based Hybrid PSO–GWO is been considered to efficiently utilize energy in an optimal route.

  相似文献   

3.
In large-scale Wireless sensor networks (WSNs), the network status is complex and unpredictable, which brings great challenges to practical network design and management. Tracing the route path of each data packet in the network is an important way to observe network behaviors and understand network dynamics. However, tracing the full route path of each packet could be highly challenging, due to the hard resource con- straint in WSNs. Our previous work proposes a hash-based path tracing mechanism, and leverages network connectivity and node locations to reduce the computational complexity. However, the node locations may be unavailable in some scenarios. In this work, we further propose a location-free enhancement to the hash-based path tracing mechanism, called P-Zone. P-Zone requires only network connectivity information to reduce the computational complexity. Theoretical analysis and practical simulations are conducted to evaluate the effectiveness and performance of our design. The results indicate that P-Zone can significantly reduce the computational complexity of the hashbased path tracing mechanism, while effectively tracing the full route path of each packet in the network in a real-time manner, and outperforms the state-of-the-art methods.  相似文献   

4.
5.
Wireless Personal Communications - In present days, the utilization of mobile edge computing (MEC) and Internet of Things (IoT) in mobile networks offers a bottleneck in the evolving technological...  相似文献   

6.
Wireless Personal Communications - Denial of Service (DoS) attack is a serious threat to the security of Wireless Sensor Netwokr (WSN). Moreover, Reduce of Quality (RoQ) attack is a special DoS...  相似文献   

7.
8.
Wireless Personal Communications - Despite its various benefits, the Mobile Ad-hoc Network (MANET) has a number of obstacles due to its mobility, unstable topology, energy efficiency, and other...  相似文献   

9.
In this paper, we utilize clustering to achieve energy efficiency for the on–off wireless sensor network, whose member nodes alternate between active and inactive states. In the proposed Distributed and Energy Efficient Self Organization (DEESO) scheme, the head election is adjusted adaptively to the remaining battery levels of local active nodes, which is a completely distributed approach compared to LEACH that relying on other routing schemes to access global information. Furthermore, we apply the Adaptive Channel Assignment (ACA) to address the on-off topology changes. Simulation results show that DEESO delivers 184% amount of data to the base station as LEACH for the same amount of energy consumption and the effective network lifetime is extended by around 50%.  相似文献   

10.
Several mobile computing applications require that both the order and location of occurrence of events be taken into account during decision making. Thus, processes need to track the location of nodes and synchronize their clocks. The Global Positioning System can be employed to mimic a global virtual clock that keeps the local clocks of participating nodes in synchrony with each other. The global virtual clock in conjunction with a space–time vector can track the mobility of nodes. Nodes can prioritize resource requests on the basis of request time as well as the requester's distance from the resource. Two distributed mutual exclusion algorithms that employ the space–time vector are presented. The error in the estimates of a mobile node, due to clock drift, about the region in which other mobile nodes may be present is formulated. Various resource allocation policies can react differently to such errors leading to performance differences. However, every policy should ensure that resource allocation has the properties of safety, deadlock freedom, liveness, and fairness.  相似文献   

11.
Wireless Personal Communications - Recent rich applications for the Internet of Things are demanding large bandwidth for communication which can cause congestion within multi-hop wireless sensor...  相似文献   

12.
This work provides an all-digital smart temperature sensor with dual-mode transceiver chipset for wireless body area network (WBAN). The measurement results show that the proposed temperature sensor achieves a maximum temperature error < 0.6oC within the range from 20oC to 50oC. And a phase-frequency tunable clock generator (PFTCG) is designed with frequency and phase tuning capability on the fly. This chip is manufactured on a standard 90 nm CMOS process. The supply voltage to the chip core is globally applied at 0.5 V with 12 power-domain partitions for sleep-active and voltage-scaling management. The transceiver chipset provides maximum 7 Mbps data rate, resulting in 97.7% efficiency improvement in baseband circuit processing.  相似文献   

13.
In this paper, a complete system for image transmission in harsh underwater environment is proposed. The key to increase the performance of the system is the use of an efficient image compression algorithm with a bandwidth-efficient modulation technique. The wavelet packet (WP) decomposition is used to get the best image representation and the set partitioning in hierarchical trees is applied on the WP coefficients. The parental conflicts are resolved, the parent–child relationships are adapted and thus the similarities between cross-subbands are preserved. Reed–Solomon is used for forward error correction to combat with the errors in wireless transmission. Orthogonal frequency division multiplexing with differential quadrature phase shift keying is used to transmit the generated bit stream. Effective image quality metrics are used for objective evaluation. Results show that the proposed system manages to transmit images over the limited bandwidth, and to effectively minimize the perceptual degradation.  相似文献   

14.
15.
The space division multiple access–orthogonal frequency division multiplexing (SDMA–OFDM) wireless system has become very popular owing high spectral efficiency and high load capability. The optimal maximum likelihood multiuser detection (MUD) technique suffers from high computational complexity. On the other hand the linear minimum mean square error (MMSE) MUD techniques yields poor performance and also fails to detect users in overload scenario, where the number of users are more than that of number of receiving antennas. By contrast, the differential evolution algorithm (DEA) aided minimum symbol error rate (MSER) MUD can sustain in overload scenario as it can directly minimizes probability of error rather than mean square error. However, all these classical techniques are still complex as these do channel estimation and multiuser detection sequentially. In this paper, complex multi layer perceptron (CMLP) neural network model is suggested for MUD in SDMA–OFDM system as it do both channel approximation and MUD simultaneously. Simulation results prove that the CMLP aided MUD performs better than the MMSE and MSER techniques in terms of enhanced bit error rate performance with low computational complexity.  相似文献   

16.
Design Method Based on Routing Tree for Topology Update in Ad Hoc Network   总被引:1,自引:0,他引:1  
Ad hoc network is a kind of infrastructureless and self-organized mobile network. The wireless communication range of mobile nodes is limited in ad hoc network. The nodes can’t communicate with each other directly, but resort to the other adjacent nodes to forward their packets and exchange information of nodes. Every node not only serves as the mobile terminal, but also is able to store and forward packets[1]. Therefore, the node can be regarded as a router in ad hoc network. It finds the p…  相似文献   

17.

Recently, many researchers has more attention in a single stage AC to DC converter features and DC to DC regulator are extensively used into low power applications. When compared with the two stage conventional method over the Single stage converter has a simple design and utilize only less components. Therefore, this task has been used in this paper as a prposed work of AC–DC single stage converters combine a converter front end with DC–DC back end converter. This proposed work has been improved single stage power factor correction (PFC) converter based on phase-shifted controller for wireless Power applications. The proposed technique employed to develop the improved converter for task of an extensive series of voltage outputs with rippleless outcomes in low frequency, that shows the high essential in battery application and the PFC duty ratio restriction is eradicated. Similarly, DC–DC stage operation are designed in a related way of conventional full bridge phase shifted converter. Accordingly, the proposed technique of improved converter of this paper will achieves better efficiency compared with other conventional techniques and it has been prove more efficient for many Industrial applications, it has been discussed in result section clearly. The experimental results of proposed improved converter proves that it is potential to extend high power single stage converter with good power factor, conversion characteristics and efficiency.

  相似文献   

18.

In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the schemes have had many potential vulnerabilities, such as key-impersonation, user anonymity, eavesdropping and masquerade. Thus, this paper proposes secure-cum-efficient mutual adaptive user authentication (S-Cum-EMAUA) scheme for practical use in H-WSNs. The scheme of S-Cum-EMAUA) is not only resilient to the most of the potential attacks, but also provides mutual authentication, user anonymity and session-key establishment. In addition, the proposed scheme is well secured, since it has the usage of the hash-function and X-OR operation.

  相似文献   

19.
20.
In this paper, we propose a complex orthogonal design based on the theory of Finite projective plane. As most of the orthogonal designs incur low ratio of time diversity, the proposed complex orthogonal design has a relatively high ratio of time diversity. In addition, the proposed scheme has the following characteristics: (1) full spatial diversity (2) low rate (3) linear processing. We compare the proposed scheme with another complex design to show the tradeoffs. The proposed scheme can be of use for certain applications such as sensor networks and deep space exploration where there might be an imposed limit on the peak transmit power.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号