Search results for "key"

showing 10 items of 1962 documents

A new Scheme for RPL to handle Mobility in Wireless Sensor Networks

2017

Mobile wireless sensor networks (WSNs) are characterised by dynamic changes in the network topology leading to route breaks and disconnections. The IPv6 routing protocol for low power and lossy networks (RPL), which has become a standard, uses the Trickle timer algorithm to handle changes in the network topology. However, neither RPL nor Trickle timer are well adapted to mobility. This paper investigates the problem of supporting mobility when using RPL. It enhances RPL to fit with sensors' mobility by studying two cases. Firstly, it proposes to modify RPL in order to fit with a dynamic and hybrid topology in the context of medical applications. Secondly, it investigates a more general case…

Routing protocol020203 distributed computingComputer Networks and CommunicationsComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsContext (language use)02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networksHardware and Architecture0202 electrical engineering electronic engineering information engineeringTimerbusinessWireless sensor networkSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

Power-constrained sensor selection and routing for cooperative detection in cognitive radios

2012

Given a spectrum-sensing network, a set of active nodes jointly aggregate sensed data at a preset frequency-band and simultaneously route this information to an arbitrarily chosen querying node through a power-constrained multi-hop path. Locally, each sensor node is assumed to be an energy-based detector. This work focuses on deriving algorithms that jointly optimize sensor selection and cooperative detection from which a power-efficient route to the querying node can be established, and then, a tree routing structure spanning the chosen nodes is constructed under a power budget constraint. Sensor information is sequentially aggregated along this optimized routing structure up to the queryi…

Routing protocolBackpressure routingDynamic Source RoutingStatic routingComputer sciencebusiness.industryNode (networking)020206 networking & telecommunicationsGeographic routing02 engineering and technologyKey distribution in wireless sensor networksCognitive radioLink-state routing protocol020204 information systemsSensor nodeMultipath routingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkbusinessWireless sensor networkComputer network
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

A combined relay-selection and routing protocol for cooperative wireless sensor networks

2012

International audience; In wireless sensor networks several constraints decrease communications performances. In fact, channel randomness and energy restrictions make classical routing protocols inefficient. Therefore, the design of new routing protocols that cope with these constraints become mandatory. The main objective of this paper is to present a multi-objective routing algorithm RBCR that computes routing path based on the energy consumption and channel qualities. Additionally, the channel qualities are evaluated based on the presence of relay nodes. Compared to AODV and AODV associated to a cooperative MAC protocol, RBCR provides better performances in term of delivery ratio, power …

Routing protocolDynamic Source RoutingComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Distributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technologylaw.inventionRouting Information Protocol[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad hoc On-Demand Distance Vector RoutingRelaylaw0202 electrical engineering electronic engineering information engineeringDestination-Sequenced Distance Vector routingHierarchical routingZone Routing ProtocolStatic routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPolicy-based routingPath vector protocol020206 networking & telecommunicationsEnergy consumptionAd hoc wireless distribution serviceKey distribution in wireless sensor networksDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingInterior gateway protocol020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessWireless sensor networkEfficient energy useComputer network2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

A Network Protocol to Enhance Robustness in Tree-Based WSNs Using Data Aggregation

2007

This paper proposes a data gathering strategy for wireless sensor networks and an implementation based on the IEEE 802.15.4 standard. The algorithm combines the benefits of single-path and multi-path routing strategies in a hybrid solution which makes use of alternative paths when necessary. We adopt a caching and retransmission technique, which exploits some peculiar features of data aggregation, with the use of implicit acknowledgments of reception. The paper also discusses simulation results that show how the mentioned techniques, combined with exploitation of the features of the IEEE 802.15.4 standard have been used to obtain an efficient protocol that takes energy consumption into acco…

Routing protocolDynamic Source RoutingInter-Access Point ProtocolComputer scienceDistributed computingRetransmissionEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolMobile wireless sensor networkIEEE 802.11sZone Routing Protocolbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolEnergy consumptionAd hoc wireless distribution serviceWireless sensor networksKey distribution in wireless sensor networksOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingHazy Sighted Link State Routing ProtocolCommunications protocolbusinessWireless sensor networkComputer networkNeuRFon2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
researchProduct

A Group-Based Architecture for Wireless Sensor Networks

2007

Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them are based on groups. We propose to divide the network into several groups of sensors. When a sensor send data to other groups, the data has to arrive just to one sensor from each group, then they propagate it to the rest of sensors in their groups. We have simulated our proposal for different types of sensor topologies to know which type of topology is the best depending on the number of sensors in the whole network or depending on the number of interior sensors. We have also simulated how much time is needed to propagate information between groups. The application areas for our proposal coul…

Routing protocolKey distribution in wireless sensor networksLink-state routing protocolComputer scienceWireless ad hoc networkbusiness.industryMobile wireless sensor networkGeographic routingNetwork topologybusinessWireless sensor networkComputer networkInternational Conference on Networking and Services (ICNS '07)
researchProduct

An adaptive timer for RPL to handle mobility in wireless sensor networks

2016

This paper focuses on the performance of wireless sensor networks characterized by a hybrid topology composed of mobile and static sensor nodes. The Routing Protocol for Low power and lossy networks (RPL), which is standardized as an IPv6 routing protocol for low power and lossy networks, uses the trickle timer algorithm to handle changes in the network topology. However, this algorithm is not well adapted to dynamic environments. This paper enhances the trickle timer in order to fit with mobility requirements. Most of previous works have improved this algorithm without considering the random movement of nodes. In this work, the proposed timer algorithm takes into consideration the random t…

Routing protocolbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computing020206 networking & telecommunications02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network020201 artificial intelligence & image processingTimerbusinessWireless sensor networkComputer network2016 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

<title>Latvian and Russian textbooks: eye movements in reading text formatted in two columns</title>

2008

Research of eye movements in reading textbooks suggests that reading the Cyrillic-based Russian language differs from reading the extended Latin-based Latvian texts. Ten bilingual students were asked to start reading a book passage in Latvian and to continue reading the text in Russian. Key parameters in information processing have been analyzed. Even though the difference in duration of fixations does not reach statistical significance, saccade size and regression rate are smaller in Russian.

Russian languageLiteraturebusiness.industrymedia_common.quotation_subjectInformation processingLatvianEye movementRegression rateLinguisticslanguage.human_languageKey (music)Reading (process)SaccadelanguagePsychologybusinessmedia_commonSPIE Proceedings
researchProduct

The mechanisms for maintenance of verbal information in working memory

2011

Working memory is a system that allows to maintain information, while performing a concurrent processing. The subvocal rehearsal (Baddeley, 1986) and the attentional refreshing (Barrouillet et al., 2007) are two mechanisms identified as playing a role in maintenance of verbal information within working memory. However, the exact nature of the interplay of these two mechanisms was little studied and remains unclear. Therefore, the purpose of our work was first to investigate the interplay of rehearsal and refreshing. In several experiments performed with young adults, the use of rehearsal and refreshing were respectively manipulated through articulatory suppression and attentional demand of …

Répétition subvocale[SHS.PSY] Humanities and Social Sciences/Psychology[ SHS.PSY ] Humanities and Social Sciences/PsychologyReprésentations phonologiques[SHS.PSY]Humanities and Social Sciences/PsychologyNo english keywordsMécanismes de maintienRafraîchissement attentionnelMémoire de travail
researchProduct

Delaying surgery for patients with a previous SARS-CoV-2 infection

2020

With at least 28 elective million operations delayed during the first three months of the COVID-19 pandemic, the number of patients who will require surgery after a previous SARS-CoV-2 infection is likely to increase rapidly1. Operating on patients with an active perioperative SARS-CoV-2 infection is now known to carry a very high pulmonary complication and mortality rate2. Urgent information is needed to guide whether postponing surgery in patients with a previous SARS-CoV-2 infection leads to a clinical benefit, and the optimal length of delay.

SARS Virus Coronavirus Severe Acute Respiratory Syndrome cancersurgery pandemic infectionSettore MED/06 - Oncologia MedicaSettore MED/18 - CHIRURGIA GENERALESettore MED/29 - CHIRURGIA MAXILLOFACCIALECOVID-19. Global surgery.Settore MED/19 - Chirurgia PlasticaComorbidity030230 surgeryCovidCOVID-19 / epidemiologysurgery0302 clinical medicineNeoplasms / surgeryNeoplasmsCOVID-19; Comorbidity; Humans; Neoplasms; Surgical Procedures Operative; Pandemics; SARS-CoV-2; Time-to-TreatmentProspective cohort study610 Medicine & healthCOVID-19/epidemiologymedicine.diagnostic_testSurgery sars-cov-2 covid surg surgery pandemic infectionPulmonary ComplicationSARS cov 2Covid19Surgical Procedures Operative / methodsOperativesurgery; Sars-CoV-2Surgical Procedures OperativeSurgery sars-cov-2Neoplasms / epidemiologyCohort studyHumanmedicine.medical_specialtySciences du Vivant [q-bio]/Médecine humaine et pathologieNOTime-to-TreatmentThroat culture03 medical and health sciencesSettore MED/28 - Malattie OdontostomatologichemedicineResearch LetterHumansElective surgeryGeneralPandemicscovid surgSurgical ProceduresPandemicbusiness.industrySARS-CoV-2No key words availablePostoperative complicationCOVID-19Perioperativemedicine.diseaseSurgeryPneumoniaSettore MED/40 - GINECOLOGIA E OSTETRICIANeoplasmSurgical Procedures Operative/methodsSurgerybusinessNeoplasms/epidemiology[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct