نتایج جستجو برای: sensors network

تعداد نتایج: 750789  

Journal: :Chest 1985
D F Wilson M Erecińska

Experimental evidence is presented that mitochondrial oxidative phosphorylation is dependent on oxygen concentration in its physiologic range both in vivo and in vitro. Mitochondrial oxidative phosphorylation is considered to act as a tissue oxygen sensor important for controlling local vascular resistance.

2013
Zhiliang Chen Alexander Kühne Anja Klein

Gossiping-based wireless sensor networks provide a communication paradigm with which all sensors in the network can aggregate messages from the entire network without specifying a routing tree and a sink sensor. Random gossiping provides a robust aggregation, however, it also leads to biased aggregation and long aggregation time in terms of the number of communications between sensors. In a pre...

2013
Eni Dwi Wardihani

Sensing is a task of paramount importance for proper functioning of wireless sensor network. The sensing influenced many factor, such as the type and variety of the sensors, the number of sensors deployed, the deployment scheme and the characteristic of the target and the environment. Decreasing the sensing range of sensors results a few detections and the overall communication activity of the ...

Journal: :IJAPUC 2013
Tao Gao Zhenjing Yao

The spectrum matching and correlation characteristic are both important in the multiple-user ultrasonic ranging system. As people know, an ultrasonic ranging system, which has a bell-shaped magnitude spectrum, acts like a band-pass filter. If the spectrum of the excitation signal does not match that of the ultrasonic ranging system, some of energy cannot be transmitted by the ultrasonic system....

Journal: :CoRR 2014
Mo Zhao Robert H. Blick

An advanced system of sensors/actuators should allow the direct feedback of a sensed signal into an actuation, e.g., an action potential propagation through an axon or a special cell activity might be sensed and suppressed by an actuator through voltage stimulation or chemical delivery. Such a complex procedure of sensing and stimulation calls for direct communication among these sensors and ac...

2008
YoungSang Yun Ye Xia

In a sensor network, if the sensors are deployed uniformly across the network, they experience different traffic intensities and energy depletion rates depending on their locations. Usually, the sensors near the sink tend to deplete their energy sooner; when enough of them exhaust their energy, they leave holes in the network, causing the remaining nodes to be disconnected from the sink. One of...

2009
Michel Kieffer

This paper presents a distributed bounded-error state estimation algorithm suited, e.g., to measurement processing by a network of sensors. Contrary to centralized estimation, where all data are collected to a central processing unit, here, each data is processed locally by the sensor, the results are broadcasted to the network and taken into account by the other sensors. A first analysis of th...

2003
Linnyer Beatrys Ruiz Thais R. M. Braga Silva Fabrício A. Silva José Marcos S. Nogueira Antonio Alfredo Ferreira Loureiro

Wireless Sensor Networks (WSNs) are becoming an increasingly technology that will be used in a variety of applications. However, until now, WSNs and their applications have been developed without considering a management solution. In this paper, we have evaluated a management architecture for WSNs, called MANNA, where the service and configuration management are analyzed. We focus on a class of...

2009
Cengiz Günay Astrid A. Prinz

When we compare the sensor distributions between functional and non-functional model network subsets, we can make speci c predictions about the produced network pattern from the activity of individual cells. For instance, model networks with low LP activity (sensor average within the bin of 0.02 ± 0.005) are not functional (compare Fig. 8C to panel D). To nd which of these networks can be made ...

2000
Florian Kerschbaum Eugene H. Spafford Diego Zamboni

Embedded sensors for intrusion detection consist of code added to the operating system and the programs of the hosts where monitoring will take place. The sensors check for specific conditions that indicate an attack is taking place, or an intrusion has occurred. Embedded sensors have advantages over other data collection techniques (usually implemented as separate processes) in terms of reduce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید