The result is to obtain network more stability and optimal energy consumption. The new protocol was tested on real characteristics of more than 600 traffic signs in the city of Hamedan, run in MTALAB software. The findings are examined here.
KLD ( p || p ) = E p ( log ( p ) − log ( p )) (15) 5. conclusion In this chapter, we have studied the parameters that may influence the performance of the WSN. We have started by the sensor nodes characteristics as battery, processor speed, storage capacity and radio communicatio[r]
The most important issue for designing wireless sensor network routing protocols is energy efficiency. Our study uses a combination of both fuzzy logic and A-star algorithms that improve priority level in selecting node to form route.
Chapter 15 - Purchasing transportation services. Chapter 15 provides an in-depth analysis of transportation costs. With JIT systems transportation costs are magnified. Some of the transportation costs include such activities as selecting the mode of transportation to be used in moving a particular s[r]
Chapter 15 - Purchasing transportation services. Chapter 15 provides an in-depth analysis of transportation costs. With JIT systems transportation costs are magnified. Some of the transportation costs include such activities as selecting the mode of transportation to be used in moving a particular s[r]
1473-1483, 2013 Apply to wireless sensor networks with obstacles Apply to dynamic wireless sensor networks Integrate with other objectives and constraints: o Connectivity assuaranc[r]
There is a common problem in energy efficiency considerations in wireless sensor networks (WSNs): maximizing the amount of data sent from all sensor nodes to the base station (BS) unti[r]
This offers the capability to measure and understand environmental indicators. Building or home automation, social smart communication for enhancement of quality of life that could be considered as one of the application of IoT where the sensors, actuators and controllers can be connected to interne[r]
Network Scalability Today's enterprise network is vastly superior in terms of raw bandwidth to the enterprise network of a decade ago. In fact, in the 1970s, some of the largest corporations in the world ran networks in which 9.6 Kbps wide area
With the increasing use of underwater sensors for the exploitation and monitoring of vast underwater resources, underwater wireless sensor network UWSN, mostly based on acoustic transmis[r]
Typed passwords are typically converted by algorithm to cryptographic keys. When they are not converted to keys, they are used for authentication, just as a key is. Therefore, we consider passwords to be in the category of keys. Passwords can be distributed by bein[r]
1. Introduction The function of a greenhouse is to create the optimal growing conditions for the full lifecycle of the plants. Using autonomous measuring stations helps to monitor all the necessary parameters for creating the optimal environment in[r]
Today the rapid and widespread development of computer networks and computer network environments brings many risks and threats to network security that cause loss or change data of information systems. Security attacks that change the state and components of the system will leave traces, so tracing[r]
qua kênh vô tuy ế n, c ả m nh ậ n các ho ạ t độ ng nh ư đụ ng độ trên kênh truy ề n, k ế t thúc truy ề n d ữ li ệ u gi ữ a các nút hay ACK, thông qua l ắ ng nghe các gói RTS, CTS. K ế t thúc kho ả ng tích c ự c, nút chuy ể n sang ch ế độ ng ủ . - SENSOR-MAC: đượ c thi ế t k ế để[r]
MABS refers to the simulation aim at modeling the behavior of agents in order to analyze their interactions and consequences of their decision making process. Hence, a global result is closely determined by agents’ interactions. In practice, MABS models are used to[r]
Dang Van Ngoc * , Nguyen Duy Minh, Hoang Thi Thuong TNU - University of Information and Communication Technology ABSTRACT In today's industrial production plants, conventional wired monitoring and control systems that require trenching to place new[r]
Obtain suitable specimens • Identified specimens with suitable information Evaluate of chances of success of the process before start Make sure transportation used cold chain • 4°C • -20[r]
main approaches, cluster-based tree [ 1 – 3 ], hierarchy-based tree [ 4 – 11 ]. The cluster-based tree will organize all sensors into clusters and an election of cluster heads will determine which node takes responsibility for collecting the object informa- tion within the same cluster an[r]