نتایج جستجو برای: under wireless sensor network
تعداد نتایج: 1834949 فیلتر نتایج به سال:
81 Abstract We establish some new results on the capacity of wireless sensor networks that employ single-userdetection, and we present the implications of our results on the scalability of such networks. In particular, we find bounds on the maximum achievable per-sensor end-to-end throughput, λe, and the maximum number of simultaneously successful wireless transmissions, Nt , under a more gener...
One of the features of wireless sensor networks is that the nodes in this network have limited power sources. Therefore, assessment of energy consumption in these networks is very important. What has been common practice has been the use of traditional simulators to evaluate the energy consumption of the nodes in these networks. Simulators often have problems such as fluctuating output values i...
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
Wireless Sensor Network technology is expected to create significant impact on our lives in the coming decade. Various applications of Wireless Sensor Network include environmental monitoring, natural disaster prediction, home appliances covering many domains like agriculture, and health care, clustered databases and so on. A Sensor Network is a network comprised of sensing as well as computing...
ZigBee is an emerging wireless network technology, according to china’s digital agricultural feature such as remote, dispersion, variability and diversity, the ZigBee-based wireless sensor network for digital agricultural data acquisition is one of the best ways to build the system. In this paper, based on ZigBee wireless sensor network deployment planning principles and the status of our digit...
A wireless network is a type of network where various physical devices (e.g. computer, laptops, PDAs etc) are interconnected with each other using network infrastructure. Owing to wireless medium of data communication, the security risk is potentially high for unauthorized access and intrusion of various malicious programs. The security protocols of wireless network are governed by family of IE...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید