Three-dimensional Voronoi Diagram–based Self-deployment Algorithm in IoT Sensor Networks
暂无分享,去创建一个
[1] Marc Parizeau,et al. Probabilistic Sensing Model for Sensor Placement Optimization Based on Line-of-Sight Coverage , 2013, IEEE Transactions on Instrumentation and Measurement.
[2] Klaus Schöffmann,et al. Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.
[3] Liehuang Zhu,et al. Cross-cluster asymmetric group key agreement for wireless sensor networks , 2018, Science China Information Sciences.
[4] Jin Li,et al. Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics , 2017, Soft Comput..
[5] Tan Yu-An,et al. An extra-parity energy saving data layout for video surveillance , 2018 .
[6] Laurence T. Yang,et al. Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks , 2016, IEEE Internet of Things Journal.
[7] Tisha Brown,et al. On wireless video sensor network deployment for 3D indoor space coverage , 2016, SoutheastCon 2016.
[8] Pascale Minet,et al. Covering a 3D flat surface with autonomous and mobile wireless sensor nodes , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[9] Chu-Sing Yang,et al. Voronoi-based coverage improvement approach for wireless directional sensor networks , 2014, J. Netw. Comput. Appl..
[10] Xiang Li,et al. Deploying Three-Dimensional Mobile Sensor Networks Based on Virtual Forces Algorithm , 2012, CWSN.
[11] Ting-Yu Lin,et al. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a Bounded Monitoring Area , 2017, IEEE Transactions on Mobile Computing.
[12] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[13] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[14] Sesh Commuri,et al. Coverage issues in wireless sensor networks , 2006 .
[15] Chen Liang,et al. An optimized data hiding scheme for Deflate codes , 2018, Soft Comput..
[16] Okyay Kaynak,et al. On Deployment of Wireless Sensors on 3-D Terrains to Maximize Sensing Coverage by Utilizing Cat Swarm Optimization With Wavelet Transform , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[17] Hui Wang,et al. A new dynamic firefly algorithm for demand estimation of water resources , 2018, Inf. Sci..
[18] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[19] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[20] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[21] Feng Li,et al. Autonomous Deployment for Load Balancing $k$-Surface Coverage in Sensor Networks , 2015, IEEE Transactions on Wireless Communications.
[22] Qing Wang,et al. Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..
[23] Xiaojiang Du,et al. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.
[24] Yuanzhang Li,et al. DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[25] Chen Liang,et al. An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.
[26] Murat Ermis,et al. Positioning and Utilizing Sensors on a 3-D Terrain Part II—Solving With a Hybrid Evolutionary Algorithm , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[27] Xiaojiang Du,et al. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.
[28] Hang Yang,et al. A Novel Sensor Deployment Method Based on Image Processing and Wavelet Transform to Optimize the Surface Coverage in WSNs , 2016 .
[29] Leïla Azouz Saïdane,et al. Three dimensional mobile wireless sensor networks redeployment based on virtual forces , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[30] Houfeng Wang,et al. Model approach to grammatical evolution: theory and case study , 2016, Soft Comput..
[31] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[32] Weiwei Lin,et al. An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.
[33] Yung-Chih Chen,et al. An Efficient Interpolation-Based Projected Sum of Product Decomposition via Genetic Algorithm , 2016, J. Multiple Valued Log. Soft Comput..
[34] M. Winkler,et al. Theoretical and practical aspects of military wireless sensor networks , 2023, Journal of Telecommunications and Information Technology.