Stochastic binary sensor networks for noisy environments
نویسندگان
چکیده
منابع مشابه
Stochastic map merging in noisy rescue environments
We address the problem of merging multiple noisy maps in the rescue environment. The problem is tackled by performing a stochastic search in the space of possible map transformations. The proposed technique has its roots in a motion planning algorithm we recent developed, and turns out to be a generalization of other search techniques like hill-climbing or simulated annealing. We provide the pr...
متن کاملFuzzy completion time for alternative stochastic networks
In this paper a network comprising alternative branching nodes with probabilistic outcomes is considered. In other words, network nodes are probabilistic with exclusive-or receiver and exclusive-or emitter. First, an analytical approach is proposed to simplify the structure of network. Then, it is assumed that the duration of activities is positive trapezoidal fuzzy number (TFN). This paper com...
متن کاملSimulation Environments for Wireless Sensor Networks
Recently, the advances in micro-technology and highly integrated electronics speeded up the rising technology of Wireless Sensor Networks (WSNs). In WSNs distributed autonomous, self-configuring devices, so called sensor nodes, cooperate to form a wireless network for monitoring environmental conditions such as temperature, motion etc. Originally starting from military researches, their applica...
متن کاملStochastic Scheduling for Underwater Sensor Networks
The context of underwater sensor networks (UWSNs) presents special challenges for data transmission. For that context, we examine the merit of using a simple, stochastic transmission strategy based on the ALOHA protocol. The strategy uses a stochastic scheduling approach in which time is slotted, and each network node broadcasts according to some probability during each time slot. We present a ...
متن کاملSecure Position Verification for Wireless Sensor Networks in Noisy Channels
Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification have used trusted verifiers, which are in fact vulnerable to attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Sensor Networks
سال: 2007
ISSN: 1748-1279,1748-1287
DOI: 10.1504/ijsnet.2007.014365