Search results for "Wireless sensor network"

showing 10 items of 363 documents

SEAL: A Domain-Specific Language for Novice Wireless Sensor Network Programmers

2013

A lot of the prospective wireless sensor network users are novice programmers. Their experience in general-purpose programming languages is either limited or completely nonexistent. There are both financial and scientific incentives to empower these users and allow them to write sensor network applications on their own, rather than having to rely on a qualified computer science professional. We present SEAL, a sensor network programming language designed for novice programmers. SEAL manages to avoid computer science concepts that are hard to grasp for novices, while remaining suitable for typical sensor network application scenarios. The language is extensible in application-specific way, h…

Syntax (programming languages)business.industryComputer scienceGRASPCode (cryptography)A domainComputational linguisticsSoftware engineeringbusinessExtensibilitySeal (mechanical)Wireless sensor network2013 39th Euromicro Conference on Software Engineering and Advanced Applications
researchProduct

Challenging aspects in Consensus protocols for networks

2008

Results on consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to- peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the unknown but bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the epsiv-consensus problem, where the states…

Theoretical computer scienceAutomatic controlConsensus problemsWireless ad hoc networkStochastic processEstimation theoryComputer scienceDistributed computingMulti-agent systemConsensus problems; Consensus protocolsConsensus protocolsBounded functionConvergence (routing)Wireless sensor network
researchProduct

Performance comparison of residual related algorithms for ToA positioning in wireless terrestrial and sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172462 Time of Arrival (ToA) is a popular technique for terrestrial positioning. This paper presents a comparison of ToA based residual related positioning algorithms in wireless terrestrial and sensor networks in both long range outdoor and short range indoor environments. Us…

Time of arrivalComputational complexity theoryComputer scienceIterative methodbusiness.industryVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552WirelessResidualCommunication complexitybusinessWireless sensor networkAlgorithmWeighting
researchProduct

2021

Topology managementComputer sciencebusiness.industryDisjoint setsbusinessWireless sensor networkIndustrial and Manufacturing EngineeringConnected dominating setComputer networkIET Wireless Sensor Systems
researchProduct

Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks with IEEE 802.15.4 Transceivers

2006

In this paper a preamble sampling MAC protocol for low power wireless sensor networks is proposed. The article describes the implementation of the protocol using network nodes equipped with the Chipcon CC2420 802.15.4 transceiver. The power consumption of the transceiver has been measured and the MAC protocol has been adapted to the transceiver properties. The results show the trade-off between power consumption and transmission delay for this algorithm during the communication process.

Transmission delaybusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionlaw.inventionBluetoothlawLow-power electronicsWireless Application ProtocolComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSTransceiverbusinessWireless sensor networkcomputerIEEE 802.15Computer network2006 IEEE Instrumentation and Measurement Technology Conference Proceedings
researchProduct

A Battery-free Asset Monitoring System based on RF Wireless Power Transfer

2020

In the Internet of Things (IoT) era, asset monitoring represents an appealing implementation of Wireless Sensor Networks due to the enormous benefits associated with being able to monitor and record the exact position and transportation conditions of assets, personal objects, and the like. This kind of infrastructure enables the provision of increasingly advanced services, including the ability to measure the movement speed of a monitored asset using relatively inexpensive nodes with sensing capabilities and wireless transmission and reception. These nodes would ideally employ battery-free sensors that do not require any maintenance, but conventional power supply management systems cannot s…

TraverseComputer scienceNode (networking)010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciAsset (computer security)01 natural sciences0104 chemical sciencesIdentification (information)0202 electrical engineering electronic engineering information engineeringSystem on a chipWireless power transferWireless Power Transfer WPT Wireless Sensor Networks WSNs Radio Frequency Energy Harvesting Wireless Battery Charger Lithium Ion Internet of ThingsWireless sensor networkEnergy harvesting
researchProduct

WhoSNext: Recommending Twitter Users to Follow Using a Spreading Activation Network Based Approach

2020

The huge number of modern social network users has made the web a fertile ground for the growth and development of a plethora of recommender systems. To date, recommending a new user profile X to a given user U that could be interested in creating a relationship with X has been tackled using techniques based on content analysis, existing friendship relationships and other pieces of information coming from different social networks or websites. In this paper we propose a recommending architecture - called WhoSNext (WSN) - tested on Twitter and which aim is promoting the creation of new relationships among users. As recent researches show, this is an interesting recommendation problem: for a …

User profileInformation retrievalSocial networkbusiness.industryComputer sciencesocial networkingmedia_common.quotation_subjectTwitterKnowledge engineeringspreading activation network020207 software engineering02 engineering and technologyRecommender systemFriendshipContent analysis0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingData pre-processingRecommender systembusinessWireless sensor networksocial users recommendationmedia_common2020 International Conference on Data Mining Workshops (ICDMW)
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

MP2P Network in Collecting Data from Sensor Networks

2006

Wireless sensor networks provide numerous applications today. At the same time modern wireless short-range communication technologies combined with mobile users create environments for mobile peerto- peer networks. This paper discusses a concept of an application in which an MP2P network is used for collecting sensor network data. This model requires certain places with a high mobile user density in order to function. Simulation results indicate that the model can be used in environments where these requirements are met.

Vehicular ad hoc networkWi-Fi arrayWireless networkComputer sciencebusiness.industryWireless ad hoc networkDistributed computingMobile computingWireless WANMobile ad hoc networkBase transceiver stationAd hoc wireless distribution servicePublic land mobile networkKey distribution in wireless sensor networksIntelligent sensorIntelligent NetworkMobile wireless sensor networkWirelessRadio resource managementWired communicationbusinessWireless sensor networkHeterogeneous networkComputer network11th IEEE Symposium on Computers and Communications (ISCC'06)
researchProduct