Academic literature on the topic 'WSNs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WSNs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WSNs"

1

Han, Bing, Feng Ran, Jiao Li, Limin Yan, Huaming Shen, and Ang Li. "A Novel Adaptive Cluster Based Routing Protocol for Energy-Harvesting Wireless Sensor Networks." Sensors 22, no. 4 (2022): 1564. http://dx.doi.org/10.3390/s22041564.

Full text
Abstract:
With the various applications of the Internet of Things, research into wireless sensor networks (WSNs) has become increasingly important. However, because of their limited energy, the communication abilities of the wireless nodes distributed in the WSN are limited. The main task of WSNs is to collect more data from targets in an energy-efficient way, because the battery replacement of large amounts of nodes is a labor-consuming work. Although the life of WSNs can be prolonged through energy-harvesting (EH) technology, it is necessary to design an energy-efficient routing protocol for the energy harvesting-based wireless sensor networks (EH-WSNs) as the nodes would be unavailable in the energy harvesting phase. A certain number of unavailable nodes would cause a coverage hole, thereby affecting the WSN’s monitoring function of the target environment. In this paper, an adaptive hierarchical-clustering-based routing protocol for EH-WSNs (HCEH-UC) is proposed to achieve uninterrupted coverage of the target region through the distributed adjustment of the data transmission. Firstly, a hierarchical-clustering-based routing protocol is proposed to balance the energy consumption of nodes. Then, a distributed alternation of working modes is proposed to adaptively control the number of nodes in the energy-harvesting mode, which could lead to uninterrupted target coverage. The simulation experimental results verify that the proposed HCEH-UC protocol can prolong the maximal lifetime coverage of WSNs compared with the conventional routing protocol and achieve uninterrupted target coverage using energy-harvesting technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Sahar, Gul, Kamalrulnizam Abu Bakar, Sabit Rahim, Naveed Ali Khan Kaim Khani, and Tehmina Bibi. "Recent Advancement of Data-Driven Models in Wireless Sensor Networks: A Survey." Technologies 9, no. 4 (2021): 76. http://dx.doi.org/10.3390/technologies9040076.

Full text
Abstract:
Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four types of data-driven models that correspond with various applications are identified as WSNs: query-driven, event-driven, time-driven, and hybrid-driven. The aim of the classification of data-driven models is to get real-time applications of specific data. Many challenges occur during data collection. Therefore, the main objective of these data-driven models is to save the WSN’s energy for processing and functioning during the data collection of any application. In this survey article, the recent advancement of data-driven models and application types for WSNs is presented in detail. Each type of WSN is elaborated with the help of its routing protocols, related applications, and issues. Furthermore, each data model is described in detail according to current studies. The open issues of each data model are highlighted with their challenges in order to encourage and give directions for further recommendation.
APA, Harvard, Vancouver, ISO, and other styles
3

Sajid Hasan. "Role of Computational Intelligence and Genetic Programming for Enhancing WSNs in Biomedical Monitoring and Applications." Power System Technology 48, no. 3 (2024): 230–56. https://doi.org/10.52783/pst.813.

Full text
Abstract:
Wireless sensor networks (WSNs) are event-monitoring and distributed autonomous data-collecting devices that are tightly distributed, lightweight nodes deployed in large numbers to monitor physical or environmental conditions cooperatively. WSNs face many challenges related to communication failures, storage and computational constraints, and limited power supply; in this context, different Computational Intelligence (CI) techniques provide adaptive mechanisms to alter WSN's dynamic nature and provide autonomous behavior, flexibility, scenario changes, robustness against communication failure and topology changes. Paradigms of CI have been successfully used in recent years to address various challenges in medical domains, such as data aggregation and fusion, energy-aware routing, task scheduling, security, optimal deployment, and localization. In this review, we intend to close the computational gap and foster collaboration by offering a detailed introduction to WSNs and their properties based on genetic programming approaches for investigating biomedical problems. Furthermore, an extensive survey of CI applications to various problems in WSNs from various biomedical research areas and publication venues is presented. Besides, a discussion on the advantages and disadvantages of CI algorithms over traditional WSN solutions is offered. Also, it explores the benefits of CI techniques in real-time disease monitoring and how they may be used to solve various problems associated with WSNs in healthcare systems. In addition, a general evaluation of CI algorithms is presented, which will serve as a guide for using CI algorithms for WSNs to treat computational health applications. The most common CI paradigms, such as fuzzy systems, evolutionary algorithms, artificial neural networks, swarm intelligence, and artificial immune systems, are explored to introduce Real-Time Disease Monitoring systems in time, space, complexity and cost optimization. Finally, a short conclusion and future recommendations are provided.
APA, Harvard, Vancouver, ISO, and other styles
4

Et. al., S. SriGowthem,. "Trust-based Routing Protocols in Wireless Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (2021): 567–72. http://dx.doi.org/10.17762/turcomat.v12i1s.1931.

Full text
Abstract:
the Wireless sensor Networks is usually consisting of all-inclusive amount of bound sensor accessories which are announced in balance of the wireless media. As WSN’s become added and added capital to accustomed life, their aegis and assurance become a primary concern. However because of the attributes of WSNs, aegis architecture can be challenging. Trust-aware acquisition protocols play a capital role in aegis of Wireless Sensor Networks (WSNs). The key allotment of the acquisition agreement is avenue alternative based on account theory. Our after-effects announce that trust-based geographic acquisition approaches the ideal achievement akin accessible by flooding-based acquisition in bulletin supply arrangement and bulletin adjournment after incurring abundant bulletin overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Arshad, Hashmi, Tabrez Nafis Md, and Rahman Nafisur. "A Descriptive Study on Wireless Sensor Networks (WSNs) using Cloud Computing (CC)." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 6–14. https://doi.org/10.5281/zenodo.10147676.

Full text
Abstract:
<i>This paper presents a descriptive study on Wireless Sensor Networks (WSNs) using Cloud Computing (CC). WSNs are widely used in various applications, including environmental monitoring, industrial automation, and healthcare. However, WSNs face several challenges, such as limited storage capacity, processing power, and energy constraints. Cloud Computing (CC) provides a viable solution to overcome these challenges by providing a scalable, cost-effective, and on-demand computing platform for WSNs.</i><i>The paper examines the benefits and challenges of using Cloud Computing (CC) in WSNs. Moreover, the study analyzes the current trends and future directions of cloud-based WSNs, including the use of edge computing, machine learning, and artificial intelligence. The paper also discusses the security and privacy concerns associated with cloud-based WSNs and examines the different security solutions and best practices to ensure the security and privacy of WSNs.</i><i>Overall, this descriptive study provides valuable insights into the integration of Cloud Computing (CC) with Wireless Sensor Networks (WSNs) and highlights the potential of cloud-based WSNs to transform various industries and domains. The study serves as a useful resource for researchers, practitioners, and organizations interested in leveraging the power of Cloud Computing (CC) for Wireless Sensor Networks (WSNs).</i>
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jinmeng, Jianxun Lv, Penghui Zhao, Yucheng Sun, Haiwen Yuan, and Hai Xu. "Research and Application of Energy-Efficient Management Approach for Wireless Sensor Networks." Sensors 23, no. 3 (2023): 1567. http://dx.doi.org/10.3390/s23031567.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely used in industrial applications. However, many of them have limited lifetimes, which has been a considerable constraint on their widespread use. As a typical application of WSNs, distributed measurement of the electric field under high-voltage direct-current (HVDC) transmission lines also suffers from this issue. This paper first introduces the composition of the electric-field measurement system (EFMS) and its working principle. Considering the actual power supply of the system, this paper mainly introduces the composition of the wireless sensor node (WSND) and analyzes the power consumption and potential working state transformation of the WSND, together with a comprehensive study on parameters affecting the power consumption of the wireless communication unit. Moreover, an energy-efficient scheduling approach is proposed after specially designing a working sequence and the study on system parameters. The proposed approach is verified by experiments on not only the experimental line of the national HVDC test base, but also a commercial operation HVDC transmission line with the challenge of long endurance, which is considered in this paper with a new strategy. The results show that the proposed method can greatly extend the lifetime of the WSND.
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Biao, Minyan Lu, and Hong Zhang. "Multi-Agent Modeling and Jamming-Aware Routing Protocols for Movable-Jammer-Affected WSNs." Sensors 23, no. 8 (2023): 3846. http://dx.doi.org/10.3390/s23083846.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely used in various fields, and the reliability and performance of WSNs are critical for their applications. However, WSNs are vulnerable to jamming attacks, and the impact of movable jammers on WSNs’ reliability and performance remains largely unexplored. This study aims to investigate the impact of movable jammers on WSNs and propose a comprehensive approach for modeling jammer-affected WSNs, comprising four parts. Firstly, agent-based modeling of sensor nodes, base stations, and jammers has been proposed. Secondly, a jamming-aware routing protocol (JRP) has been proposed to enable sensor nodes to weigh depth and jamming values when selecting relay nodes, thereby bypassing areas affected by jamming. The third and fourth parts involve simulation processes and parameter design for simulations. The simulation results show that the mobility of the jammer significantly affects WSNs’ reliability and performance, and JRP effectively bypasses jammed areas and maintains network connectivity. Furthermore, the number and deployment location of jammers has a significant impact on WSNs’ reliability and performance. These findings provide insights into the design of reliable and efficient WSNs under jamming attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Chenrui, Liang Gong, Rui Fang, Yixiang Huang, Wei Wu, and Chengliang Liu. "Integration of Agricultural Wireless Sensor Networks to Web-of-Things Through an Edge-Computing-Enriched WSNs/WoT Gateway." International Journal of Interdisciplinary Telecommunications and Networking 14, no. 1 (2023): 1–15. http://dx.doi.org/10.4018/ijitn.309694.

Full text
Abstract:
To connect agricultural wireless sensor networks (WSNs) to web services and applications, the agricultural WSNs/WoT gateway is empowered with local data management and network maintenance functions for downstream WSNs in addition to traditional upstream data collection. This work demonstrates a low-cost, highly scalable, rapidly deployable web of things (WoT) gateway with edge computing capabilities. First, an agricultural WSNs/WoT topology is architected, connecting a ZigBee WSNs to the Web for remote monitoring the local environmental and agronomical information, and simultaneously for managing the solar-powered WSNs for a prolonged lifespan according to the instant data scrawled from the cloud. Second, a WSNs/WoT gateway is designed with the hardware platform Raspberry Pi 3, which serves multiple needs for bidirectional information exchange and local WSNs management. Finally, experimentation demonstrates the proposed hardware platform and architecture can perform edge computing, and efficiently realize the up and down transmission and distribution of data stream.
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Mui Duc, Minh Tuan Nguyen, Thang Chien Vu, Tien Minh Ta, Quang Anh Tran, and Dung The Nguyen. "A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes." Journal of Computing Theories and Applications 2, no. 1 (2024): 102–17. http://dx.doi.org/10.62411/jcta.10486.

Full text
Abstract:
The paper evaluates potential applications of blockchain technology in enhancing the security and reliability of Wireless Sensor Networks (WSNs). The existing vulnerabilities in WSNs, such as concerns regarding data integrity and security, demand innovative security solutions. Through systematic analysis, this paper provides valuable insights to expand understanding of WSNs security, explaining the feasibility and benefits of deploying blockchain technology. Possible attacks in the networks are classified to point out either risks or potential solusions to protect the networks. By exploring the integration of Blockchain within WSNs, the paper highlights its potential to minimize various security risks. In addition, this work discusses the challenges and considerations associated with implementing Blockchain in WSNs. Overall, this paper contributes on securing WSNs and underscores the role of blockchain technology as a promising way for enhancing security of WSNs.
APA, Harvard, Vancouver, ISO, and other styles
10

Alfawaz, Oruba, Ahmed M. Khedr, Bader Alwasel, and Walid Osamy. "Reliability Evaluation for Chain Routing Protocols in Wireless Sensor Networks Using Reliability Block Diagram." Journal of Sensor and Actuator Networks 12, no. 2 (2023): 34. http://dx.doi.org/10.3390/jsan12020034.

Full text
Abstract:
There are many different fields in which wireless sensor networks (WSNs) can be used such as environmental monitoring, healthcare, military, and security. Due to the vulnerability of WSNs, reliability is a critical concern. Evaluation of a WSN’s reliability is essential during the design process and when evaluating WSNs’ performance. Current research uses the reliability block diagram (RBD) technique, based on component functioning or failure state, to evaluate reliability. In this study, a new methodology-based RBD, to calculate the energy reliability of various proposed chain models in WSNs, is presented. A new method called D-Chain is proposed, to form the chain starting from the nearest node to the base station (BS) and to choose the chain head based on the minimum distance D, and Q-Chain is proposed, to form the chain starting from the farthest node from the BS and select the head based on the maximum weight, Q. Each chain has three different arrangements: single chain/single-hop, multi-chain/single-hop, and multi-chain/multi-hop. Moreover, we applied dynamic leader nodes to all of the models mentioned. The simulation results indicate that the multi Q-Chain/single-hop has the best performance, while the single D-Chain has the least reliability in all situations. In the grid scenario, multi Q-Chain/single-hop achieved better average reliability, 11.12 times greater than multi D-Chain/single-hop. On the other hand, multi Q-Chain/single-hop achieved 6.38 times better average reliability than multi D-Chain/single-hop, in a random scenario.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "WSNs"

1

Doddapaneni, Krishna. "Energy aware performance evaluation of WSNs." Thesis, Middlesex University, 2014. http://eprints.mdx.ac.uk/17460/.

Full text
Abstract:
Distributed sensor networks have been discussed for more than 30 years, but the vision of Wireless Sensor Networks (WSNs) has been brought into reality only by the rapid advancements in the areas of sensor design, information technologies, and wireless networks that have paved the way for the proliferation of WSNs. The unique characteristics of sensor networks introduce new challenges, amongst which prolonging the sensor lifetime is the most important. Energy-efficient solutions are required for each aspect of WSN design to deliver the potential advantages of the WSN phenomenon, hence in both existing and future solutions for WSNs, energy efficiency is a grand challenge. The main contribution of this thesis is to present an approach considering the collaborative nature of WSNs and its correlation characteristics, providing a tool which considers issues from physical to application layer together as entities to enable the framework which facilitates the performance evaluation of WSNs. The simulation approach considered provides a clear separation of concerns amongst software architecture of the applications, the hardware configuration and the WSN deployment unlike the existing tools for evaluation. The reuse of models across projects and organizations is also promoted while realistic WSN lifetime estimations and performance evaluations are possible in attempts of improving performance and maximizing the lifetime of the network. In this study, simulations are carried out with careful assumptions for various layers taking into account the real time characteristics of WSN. The sensitivity of WSN systems are mainly due to their fragile nature when energy consumption is considered. The case studies presented demonstrate the importance of various parameters considered in this study. Simulation-based studies are presented, taking into account the realistic settings from each layer of the protocol stack. Physical environment is considered as well. The performance of the layered protocol stack in realistic settings reveals several important interactions between different layers. These interactions are especially important for the design of WSNs in terms of maximizing the lifetime of the network.
APA, Harvard, Vancouver, ISO, and other styles
2

Kamsuvan, Thanisara. "Power management in Wireless Sensor Networks (WSNs)." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/13499.

Full text
Abstract:
The wireless sensor network (WSN) is increasingly used in many areas nowadays. It can be applied to provide the solutions to environmental problems, help increasing security and safety systems, and make the detection of the problems more efficient, e.g. the earthquake or tidal wave, which will harmful to humans. The WNS is durable and resistant to all types of terrain and climate, but while the WSN system is more and more widespread, one of the obstacles hindering the growth of this technology and the demand for WSN applications is the limited battery lifespan. Consequently, there is a significant requirement for techniques for prolonging the battery’s lifespan. Therefore, one potential solution is to use alternative energy sources combined with the sensor nodes in WSN, specifically energy harvesting from existing environmental sources. This research project reviews the characteristics of each kind of energy harvesting, understanding the various energy sources (solar energy, vibration energy and wind power), including wireless power transfer (WPT) by using electromagnetic (EM) radiation energy transfer or RF radio-frequency emission and magnetic coupled energy transfer. They are adopted for extending node’s life in the WSN, based on published information. Then it compares these diverse alternative energy methods and identifies for the most suitable energy harvesting method for application to wireless sensor nodes in order to prolong the lifespan of the battery. The major findings from the researcher include that wireless power transfer energy harvesting (WPT) using the magnetic field is the most appropriate tool for extending the lifespan of the WSN system. In addition, the author also designed an experiment to test this alternative energy, achieving by modelling the wireless power transfer with four coils. From the experimental results, it can be seen that the WPT technique using energy harvesting with magnetic inductive source can be applied to prolong the lifespan of the WSN system.
APA, Harvard, Vancouver, ISO, and other styles
3

Peng, Bo. "Energy-efficient geographic routing in realistic WSNs." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.522967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Toussi, Ahora Mehdi. "Energy and QoS aware routing for WSNs." Thesis, Kingston University, 2017. http://eprints.kingston.ac.uk/41130/.

Full text
Abstract:
The advancement of Wireless Sensor Networks (WSNs), necessitate optimisation of their algorithms and their performance. More specifically, network coverage and preservation of nodes energy to increase the network's lifetime are among the core objectives of routing and clustering methods. This thesis constitutes of a literature review of WSNs' routing protocols in a categorised manner followed by proposing an energy efficient and QoS aware paradigm (PUSH) for flat network that outperform other similar paradigms in terms of collective delay and energy dissipation within the network. We have proposed a new clustering model, known as Energy Aware and Address Free Clustering (EAAFC) in which, no global addressing is required. In other words, nodes are assigned with an ID, based on local information. EAAFC clusters nodes with minimum number of cluster heads which in turn results in less in network energy consumption. Cluster heads are then re-elected frequently based on nodes' energy and distribution. EAAFC does not require geographical location of nodes nor time synchronisation. We compare performance results of our proposed clustering model, against two of well received algorithms, namely LEACH and EECF to demonstrate the advantages of EAAFC. In chapters 1 and 2, the major routing protocols have been studied over the years of research and strength and weaknesses of each protocol has been scrutinised. Further, objectives, motivation and methodology of the research are discussed. In chapter 3 and 4 the proposed routing paradigm for flat networks (PUSH) as well as the clustering protocol, EAAFC, and its advantages over other protocols is discussed in depth. Several scenarios based on similar well-known routing protocols have been implemented and tested to use as comparison and to evaluate the performance of paradigm and protocol presented in this thesis. These scenarios have been implemented in the simulator environment. The simulation results confirm the theoretic evaluation and support that PUSH and EAAFC outperforms the other protocols in compared criteria as they can achieve less latency, better coverage, preserve more energy and achieve more equally distributed energy dissipation across the network which result in longer network life time and full functionality.
APA, Harvard, Vancouver, ISO, and other styles
5

Rukpakavong, Wilawan. "Energy-efficient and lifetime aware routing in WSNs." Thesis, Loughborough University, 2014. https://dspace.lboro.ac.uk/2134/14497.

Full text
Abstract:
Network lifetime is an important performance metric in Wireless Sensor Networks (WSNs). Transmission Power Control (TPC) is a well-established method to minimise energy consumption in transmission in order to extend node lifetime and, consequently, lead to solutions that help extend network lifetime. The accurate lifetime estimation of sensor nodes is useful for routing to make more energy-efficient decisions and prolong lifetime. This research proposes an Energy-Efficient TPC (EETPC) mechanism using the measured Received Signal Strength (RSS) to calculate the ideal transmission power. This includes the investigation of the impact factors on RSS, such as distance, height above ground, multipath environment, the capability of node, noise and interference, and temperature. Furthermore, a Dynamic Node Lifetime Estimation (DNLE) technique for WSNs is also presented, including the impact factors on node lifetime, such as battery type, model, brand, self-discharge, discharge rate, age, charge cycles, and temperature. In addition, an Energy-Efficient and Lifetime Aware Routing (EELAR) algorithm is designed and developed for prolonging network lifetime in multihop WSNs. The proposed routing algorithm includes transmission power and lifetime metrics for path selection in addition to the Expected Transmission Count (ETX) metric. Both simulation and real hardware testbed experiments are used to verify the effectiveness of the proposed schemes. The simulation experiments run on the AVRORA simulator for two hardware platforms: Mica2 and MicaZ. The testbed experiments run on two real hardware platforms: the N740 NanoSensor and Mica2. The corresponding implementations are on two operating systems: Contiki and TinyOS. The proposed TPC mechanism covers those investigated factors and gives an overall performance better than the existing techniques, i.e. it gives lower packet loss and power consumption rates, while delays do not significantly increase. It can be applied for single-hop with multihoming and multihop networks. Using the DNLE technique, node lifetime can be predicted more accurately, which can be applied for both static and dynamic loads. EELAR gives the best performance on packet loss rate, average node lifetime and network lifetime compared to the other algorithms and no significant difference is found between each algorithm with the packet delay.
APA, Harvard, Vancouver, ISO, and other styles
6

Drira, Wassim. "Secure collection and data management system for WSNs." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00814664.

Full text
Abstract:
Nowadays, each user or organization is already connected to a large number of sensor nodes which generate a substantial amount of data, making their management not an obvious issue. In addition, these data can be confidential. For these reasons, developing a secure system managing the data from heterogeneous sensor nodes is a real need. In the first part, we developed a composite-based middleware for wireless sensor networks to communicate with the physical sensors for storing, processing, indexing, analyzing and generating alerts on those sensors data. Each composite is connected to a physical node or used to aggregate data from different composites. Each physical node communicating with the middleware is setup as a composite. The middleware has been used in the context of the European project Mobesens in order to manage data from a sensor network for monitoring water quality. In the second part of the thesis, we proposed a new hybrid authentication and key establishment scheme between senor nodes (SN), gateways (MN) and the middleware (SS). It is based on two protocols. The first protocol intent is the mutual authentication between SS and MN, on providing an asymmetric pair of keys for MN, and on establishing a pairwise key between them. The second protocol aims at authenticating them, and establishing a group key and pairwise keys between SN and the two others. The middleware has been generalized in the third part in order to provide a private space for multi-organization or -user to manage his sensors data using cloud computing. Next, we expanded the composite with gadgets to share securely sensor data in order to provide a secure social sensor network
APA, Harvard, Vancouver, ISO, and other styles
7

Drira, Wassim. "Secure collection and data management system for WSNs." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0051.

Full text
Abstract:
Le développement des réseaux de capteurs sans fil fait que chaque utilisateur ou organisation est déjà connecté à un nombre important de nœuds. Ces nœuds génèrent une quantité importante de données, rendant la gestion de ces données non évident. De plus, ces données peuvent contenir des informations concernant la vie privée. Les travaux de la thèse attaquent ces problématiques. Premièrement, nous avons conçu un middleware qui communique avec les capteurs physiques pour collecter, stocker, traduire, indexer, analyser et générer des alertes sur les données des capteurs. Ce middleware est basé sur la notion de composants et de composites. Chaque nœud physique communique avec un composite du middleware via une interface RESTFul. Ce middleware a été testé et utilisé dans le cadre du projet Européen Mobesens dans le but de gérer les données d'un réseau de capteurs pour la surveillance de la qualité de l'eau. Deuxièmement, nous avons conçu un protocole hybride d'authentification et d'établissement de clés de paires et de groupes. Considérant qu'il existe une différence de performance entre les noeuds capteur, la passerelle et le middleware, nous avons utilisé l'authentification basé sur la cryptographie basée sur les identités entre la passerelle et le serveur de stockage et une cryptographie symétrique entre les capteurs et les deux autres parties. Ensuite, le middleware a été généralisé dans la troisième partie de la thèse pour que chaque organisation ou individu puisse avoir son propre espace pour gérer les données de ses capteurs en utilisant le cloud computing. Ensuite, nous avons portail social sécurisé pour le partage des données des réseaux de capteurs<br>Nowadays, each user or organization is already connected to a large number of sensor nodes which generate a substantial amount of data, making their management not an obvious issue. In addition, these data can be confidential. For these reasons, developing a secure system managing the data from heterogeneous sensor nodes is a real need. In the first part, we developed a composite-based middleware for wireless sensor networks to communicate with the physical sensors for storing, processing, indexing, analyzing and generating alerts on those sensors data. Each composite is connected to a physical node or used to aggregate data from different composites. Each physical node communicating with the middleware is setup as a composite. The middleware has been used in the context of the European project Mobesens in order to manage data from a sensor network for monitoring water quality. In the second part of the thesis, we proposed a new hybrid authentication and key establishment scheme between senor nodes (SN), gateways (MN) and the middleware (SS). It is based on two protocols. The first protocol intent is the mutual authentication between SS and MN, on providing an asymmetric pair of keys for MN, and on establishing a pairwise key between them. The second protocol aims at authenticating them, and establishing a group key and pairwise keys between SN and the two others. The middleware has been generalized in the third part in order to provide a private space for multi-organization or -user to manage his sensors data using cloud computing. Next, we expanded the composite with gadgets to share securely sensor data in order to provide a secure social sensor network
APA, Harvard, Vancouver, ISO, and other styles
8

Ali, Mahmood, and Kumar Ravula Sai. "Real-Time Support and Energy Efficiency In Wireless Sensor Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1150.

Full text
Abstract:
<p>Wireless sensors nodes are made up of small electronic devices which are capable of sensing, computing and transmitting data from harsh physical environments like a surveillance field. These sensor nodes majorly depend on batteries for energy, which get depleted at a faster rate because of the computation and communication operations they have to perform. Communication protocols can be designed to make efficient utilization of energy resources of a sensor node and to obtain real time functionality. A set of previously reported routing and MAC (Medium Access Control) layer protocols has abilities to achieve energy efficiency and supports real-time functionality. A detailed study of these protocols has been carried out and comparison tables give an overview of the protocol’s performance on some factors like latency, scalability and energy awareness. Conclusions have been drawn using the comparison table parameters of how the protocol performs when utilized for a surveillance application and what kind of tradeoff they show. </p><p>The conclusions and tabular information drawn here are from our theoretical analysis of protocols referred from journals; there is no simulation work done in this thesis.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Khemapech, Ittipong. "PoRAP : an energy aware protocol for cyclic monitoring WSNs." Thesis, University of St Andrews, 2011. http://hdl.handle.net/10023/1899.

Full text
Abstract:
This work starts from the proposition that it is beneficial to conserve communication energy in Wireless Sensor Networks (WSNs). For WSNs there is an added incentive for energy-efficient communication. The power supply of a sensor is often finite and small. Replenishing the power may be impractical and is likely to be costly. Wireless Sensor Networks are an important area of research. Data about the physical environment may be collected from hostile or friendly environments. Data is then transmitted to a destination without the need for communication cables. There are power and resource constraints upon WSNs, in addition WSN networks are often application specific. Different applications will often have different requirements. Further, WSNs are a shared medium system. The features of the MAC (Medium Access Control) protocol together with the application behaviour shape the communication states of the node. As each of these states have different power requirements the MAC protocol impacts upon the operation and power consumption efficiency. This work focuses on the development of an energy conservation protocol for WSNs where direct communication between sources and a base station is feasible. Whilst the multi-hop approach has been regarded as the underlying communication paradigm in WSNs, there are some scenarios where direct communication is applicable and a significant amount of communication energy can be saved. The Power & Reliability Aware Protocol has been developed. Its main objectives are to provide efficient data communication by means of energy conservation without sacrificing required reliability. This has been achieved by using direct communication, adaptive power adaptation and intelligent scheduling. The results of simulations illustrate the significance of communication energy and adaptive transmission. The relationship between Received Signal Strength Indicator (RSSI) and Packet Reception Rate (PRR) metrics is established and used to identify when power adaptation is required. The experimental results demonstrate an optimal region where lower power can be used without further reduction in the PRR. Communication delays depend upon the packet size whilst two-way propagation delay is very small. Accurate scheduling is achieved through monitoring the clock drift. A set of experiments were carried out to study benefits of direct vs. multi-hop communication. Significant transmitting current can be conserved if the direct communication is used. PoRAP is compared to Sensor-MAC (S-MAC), Berkeley-MAC (B-MAC) and Carrier Sense Multiple Access (CSMA). Parameter settings used in the Great Duck Island (GDI) a production habitat monitoring WSNs were applied. PoRAP consumes the least amount of energy.
APA, Harvard, Vancouver, ISO, and other styles
10

Maheshwari, Hemat Kumar. "Optimizing range aware localization in wireless sensor networks (WSNs)." Thesis, University of Leeds, 2011. http://etheses.whiterose.ac.uk/1743/.

Full text
Abstract:
The adoption of wireless sensor networks (WSNs) in numerous emerging applications have prevailed us to realize that smart living is no longer an imagination, it already exists. In emerging applications, localization is an essential function so that all the sensed information can be responded carefully. Among the range free and range aware localization, range aware localization has been the most promising for fine-grained accuracy. Range aware localization has two phases, ranging and localization. Location errors always exist no matter which ranging or localization technique is used. Therefore, there is a need to optimize range aware localization for better performance. Firstly, this thesis investigates the performance of time-of-flight (ToF) and received signal strength (RSS) based ranging using IEEE 802.1.5.4 compliant WSNs nodes in outdoor and indoor for both line-of-sight (LOS) and non-line-of-sight (NLOS) paths. The fundamental Cram´er- Rao lower bound (CRLB) on ToF and RSS ranging performance is compared with the performance limits of IEEE 802.1.5.4 compliant modules. The experimental results for both outdoor and indoor LOS path demonstrated that RSS is a good candidate for range estimation at ranges less than 7m. Further analysis over long range demonstrates that ToF is a good candidate for range estimation at greater than 7m. In addition to the ranging error, another well-known error mechanism is the poor geometric anchors placement, which can significantly degrade localization performance. In the Global Positioning System (GPS) community, geometric dilution of precision (GDOP) is a well-known problem which illustrates the geometric configuration impacting localization accuracy. To analyse the impact of anchor placement on localization, performance of three lateration based approaches is compared in a cooperative fashion. Through results, It is confirmed that lateration based approaches presents a trade-off for complex computation, thus energy consumption and accuracy. It provided the needed motivation to investigate and optimize the anchor placement for better localization accuracy. The impact of anchor placement for quality reliable localization has been limited to 3-4 anchors with respect to a single subject node for 2-D. Therefore, to model reality most clearly, it makes sense to step beyond the easy and secure reach of unrealistic and mostly researched 2-dimensional representations to the pragmatic world in 3-dimensional visualization. In addition, previous work for optimal anchors placement has been limited to only additive noise. To the best of our knowledge, there is no study of optimization of anchor placement with respect to the multiplicative noise. Therefore, the optimal anchor placements are determined for both signal models based on minimum mean CRLB (m-CRLB). It is confirmed that optimal anchor placement for both signal models is different and have a serious impact on localization accuracy. The optimal anchor placement is further verified by developing a new Range Aware Localization System (RALS) using IEEE 802.15.4 compliant devices. In LOS, quality reliable localization performance can be achieved but as propagation criteria change from LOS to NLOS, localization performance also changes. In an indoor environment, localization performance degrades significantly due to multipath components. To overcome, a new 3-D scheme named Range Estimate Threshold (RET) is proposed which exploits field dimensions based on the signal model and optimal anchor placement to define a threshold. Based on the defined threshold, RET mitigates the poor range estimates from Measured Estimation (ME) for better localization accuracy. The ramification of RET on ME is explored through additive, multiplicative and log-normal shadowing models. It is confirmed that localization based on RET compared to ME showed improved accuracy.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "WSNs"

1

Sharma, Sudhir Kumar, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, and Narayan C. Debnath, eds. Integration of WSNs into Internet of Things. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

World summit on the information society. WSIS follow up report 2008. United Nations, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kluger, Yoram, Federico Coccolini, Fausto Catena, and Luca Ansaloni, eds. WSES Handbook of Mass Casualties Incidents Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-92345-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

1952-, Servaes Jan, Carpentier Nico, and European Consortium for Communications Research., eds. Towards a sustainable information society: Deconstructing WSIS. Intellect, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1974-, Holloway Randy, ed. Professional MOM 2005, SMS 2003, and WSUS. Wiley Pub./Wrox, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rani, Shalli, R. Maheswar, G. R. Kanagachidambaresan, and P. Jayarajan, eds. Integration of WSN and IoT for Smart Cities. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38516-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

United Nations Commission on Science and Technology for Development. Implementing WSIS outcomes: Experience to date and prospects for the future. United Nations, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matthews, Joseph R. Service providers: ASPs, ISPs, MSPs, and WSPs : a Wiley tech brief. John Wiley & Sons, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A. M. El-Bendary, Mohsen. Developing Security Tools of WSN and WBAN Networks Applications. Springer Japan, 2015. http://dx.doi.org/10.1007/978-4-431-55069-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "WSNs"

1

Fahmy, Hossam Mahmoud Ahmad. "WSNs Manufacturers." In Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58015-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fahmy, Hossam Mahmoud Ahmad. "WSNs Applications." In Signals and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0412-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fahmy, Hossam Mahmoud Ahmad. "WSNs Manufacturers." In Signals and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0412-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fahmy, Hossam Mahmoud Ahmad. "WSNs Applications." In Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20709-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahmed, Jameel, Mohammed Yakoob Siyal, Muhammad Tayyab, and Menaa Nawaz. "RFIDs and WSNs." In RFID-WSN Integrated Architecture for Energy and Delay- Aware Routing. Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-414-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Thomas M., Jorge Blasco, and Harsh Kupwade Patil. "Cryptography in WSNs." In Mission-Oriented Sensor Networks and Systems: Art and Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fahmy, Hossam Mahmoud Ahmad. "Testbeds for WSNs." In Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58015-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fahmy, Hossam Mahmoud Ahmad. "Testbeds for WSNs." In Signals and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0412-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fahmy, Hossam Mahmoud Ahmad. "WSNs Energy Testbeds." In Signals and Communication Technology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29700-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oteafy, Sharief M. A., and Hossam S. Hassanein. "Cloud-Centric WSNs." In Dynamic Wireless Sensor Networks. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118761977.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WSNs"

1

Chou, Yu-Cheng. "A Hybrid Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12920.

Full text
Abstract:
Wireless sensor networks (WSNs) are limited to resources including computing power, storage capacity, and especially energy supply. Thus, energy consumption of sensor nodes has become a dominant performance index for a WSN. In addition, data transmission between sensor nodes is a main energy consumer of WSNs. This paper presents a method called immune genetic algorithm based multiple-mobile-agent itinerary planning (IGA-M2IP) that addresses issues of energy consumption in large-scale WSNs. The IGA-M2IP preserves a GA’s advantages, and further improves a GA’s efficiency by restraining possible degenerative phenomena during the evolutionary process.
APA, Harvard, Vancouver, ISO, and other styles
2

Peixoto, João Paulo Just, and Daniel G. Costa. "MobSink: a Visual Mobile Wireless Sensor Networks Positioning Simulator." In XXIV Simpósio Brasileiro de Sistemas Multimídia e Web. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/webmedia.2018.4577.

Full text
Abstract:
The planning and deployment of a WSN (Wireless Sensor Network) in a Smart City can be a very challenging work. People involved in such implementation must be aware of how sensors and sinks may behave in the target environment. To aid the development of new WSNs, simulation tools are often used to predict how nodes will interact before spending time and money in a real deployment. Also, simulator can help students better understand WSNs. In this paper, we present MobSink, a simulator for WSNs with multiple mobile sinks. MobSink also allows to perform simulations in a Smart City scenario, with streets and movements constraints. It also shows how to configure MobSink for a generic scenario and describes how it works internally.
APA, Harvard, Vancouver, ISO, and other styles
3

S. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz, and Worud Mahdi Saleh. "Security Challenges and Threats in Wireless Sensor Networks: A Review." In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have gained increasing popularity in recent years due to their diverse range of applications. However, owing to their distinctive characteristics—such as limited computational power, energy resources, and a dynamic nature—these networks present unique challenges. Comprising numerous small, lowpower sensor nodes, WSNs are deployed in specific areas to gather and transmit data to a base station or sink node. Nevertheless, they remain susceptible to various security threats. A significant concern in WSNs involves attacks compromising data confidentiality, integrity, and availability. Adversaries can intercept and modify transmitted data before forwarding it, thereby undermining its integrity. Additionally, attackers can compromise sensor nodes themselves, thereby gaining unauthorized network access, data manipulation abilities, and the potential to launch subsequent attacks. This paper comprehensively addresses security challenges in WSNs, encompassing attacks on data confidentiality, integrity, availability, and network vulnerabilities. Furthermore, it delves into various attack types against WSNs, such as node compromise, denial-of-service attacks, and network topology breaches. The document provides a thorough review of existing security solutions and protocols proposed to counter these attacks, including encryption, access control, and intrusion detection systems. Lastly, the paper identifies ongoing research challenges and outlines future strategies for enhancing WSN security
APA, Harvard, Vancouver, ISO, and other styles
4

"WSNS Organization." In 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2011. http://dx.doi.org/10.1109/mass.2011.148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ibraheem, Manar Khalid, Mbarka Belhaj Mohamed, and Ahmed Fakhfakh. "Energy Optimization in Wireless Sensor Networks for Forest Fire Detection: A Study of Sleep Scheduling Techniques." In 5th International Conference on Machine Learning & Applications. Academy & Industry Research Collaboration, 2023. http://dx.doi.org/10.5121/csit.2023.131005.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have gained significant interest in forest fire applications due to their potential for real-time monitoring, early detection, and quick reaction. However, energy consumption poses a challenge as sensor nodes primarily rely on batteries. Efficient energy management is crucial to extend network lifespan, reduce maintenance frequency, and ensure continuous monitoring. This paper proposes the use of sleep-based concepts in WSNs for forest fire detection to optimize energy consumption. The study utilizes the Omnet++ simulation platform to model and simulate a realistic WSN deployed in a forest fire detection scenario. It analyses power consumption patterns, evaluates different MAC protocols, and explores sleep scheduling optimization.
APA, Harvard, Vancouver, ISO, and other styles
6

Sivieri, Alessandro. "Erlang meets WSNs: A functional approach to WSN programming." In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 2012. http://dx.doi.org/10.1109/percomw.2012.6197575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Premachandra, N. G. P. R., and Sampath Edirisinghe. "Battery-Less Sensor Node Design with Solar Panels and LoRa for Wireless Sensor Networks." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/ojhy9648.

Full text
Abstract:
A wireless sensor network (WSN) is a network of sensors that detect physical changes and convert them into analog or digital signals. These sensors communicate with each other to monitor and collect data from a specific area. Applications of WSNs range from environmental monitoring to agriculture, industrial automation, etc. The current WSN nodes are powered by rechargeable batteries and designed for short distances. The problems faced with current WSNs are short-distance communication, battery replacement in large, deployed networks, and rechargeable batteries that take longer time periods to recharge. The term “battery-less” refers to devices that operate without traditional batteries or external power sources. In this design, solar energy is used as a sustainable energy source, and supercapacitors are used to store the solar energy. Supercapacitors have a greater number of charging-discharging cycles than batteries, which can operate in a wide temperature range. They are also more environmentally friendly than typical batteries. LoRa is the technology used for long-range communication, which operates in Industrial, Scientific, and Medical (ISM) radio bands, which is the most cost-effective technology that provides wide coverage with low power consumption. For power management, lowpower approach and sleep mode are used to make the sensor node work efficiently with the stored power in the supercapacitors. The whole system design was optimized, taking scalability, performance, and cost-effectiveness into account. Keywords: Wireless Sensor Network (WSN), Solar power, Supercapacitors, LoRa, Power efficiency, Cost effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
8

Pinar, Yasaroglu, Abduljabbar Zuhair, Alotaibi Hamad, Akcam Resit, Kadavarthi Shiva, and Abuzaghleh Omar. "Wireless Sensor Networks (WSNs)." In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2016. http://dx.doi.org/10.1109/lisat.2016.7494144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Alic, Michael Koplow, Deepa Madan, Paul K. Wright, and James W. Evans. "Dispenser Printed Microscale Thermoelectric Generators for Powering Wireless Sensor Networks." In ASME 2009 International Mechanical Engineering Congress and Exposition. ASMEDC, 2009. http://dx.doi.org/10.1115/imece2009-11636.

Full text
Abstract:
Wireless sensor networks (WSN) are a promising technology for ubiquitous, active monitoring in residential, industrial and medical applications. These nodes combine a radio transceiver, microcontroller and sensors into a low power package. A current bottleneck for widespread adoption of WSN’s is the power supplies. While the power demands can be somewhat alleviated through novel electronics, any primary battery will have a finite lifetime. Energy harvesting, from ambient vibration, light, and heat sources, offers an opportunity to significantly extend the lifetime of the nodes and possibly provide perpetual power. Thermal energy is an ideal source for WSNs due to the availability of low-grade ambient waste heat sources. Thermoelectric devices convert temperature gradients into DC electric power in compact form factors. Efficient device designs require hundreds of high-aspect ratio semi-conductor microelements fabricated electrically in series and thermally in parallel. This design requirement presents problems for standard microfabrication techniques due to thickness limitations of standard semiconductor processes. We present a new method of contact dispenser printing, specifically developed to additively create microscale generators. Initial materials performance results show promising results and are further detailed in this work.
APA, Harvard, Vancouver, ISO, and other styles
10

Fernandez-Bes, Jesus, Rocio Arroyo-Valles, Jeronimo Arenas-Garcia, and Jesus Cid-Sueiro. "Censoring diffusion for harvesting WSNs." In 2015 IEEE 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). IEEE, 2015. http://dx.doi.org/10.1109/camsap.2015.7383780.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "WSNs"

1

Adler Brzezinski, Ilan. Integrating Innovative Solutions in Water and Sanitation Utilities: Lessons from Innovation Pilots in Latin America and the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005236.

Full text
Abstract:
Innovation in the water supply and sanitation (WSS) sector can contribute to achieving the goal of availability and sustainable management of water and sanitation for all. However, innovation initiatives in the WSS sector in the Latin America and the Caribbean (LAC) region face significant challenges. WSS utilities and service providers, in particular, have shown marginal levels of innovation, low integration of innovation into their business practices, and low levels of new technology adoption. This technical note presents findings from an analysis of innovation pilots in WSS utilities and provides practical and actionable knowledge that may contribute to facilitating the adoption and integration of innovative solutions for WSS in LAC.
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, H., Y. Lee, A. Guo, V. Lopez, and D. King. A YANG Data Model for Wavelength Switched Optical Networks (WSONs). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc9094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, D., and G. Martinelli. A Framework for the Control of Wavelength Switched Optical Networks (WSONs) with Impairments. Edited by Y. Lee and G. Bernstein. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Imajuku, W. Framework for GMPLS and Path Computation Element (PCE) Control of Wavelength Switched Optical Networks (WSONs). Edited by Y. Lee and G. Bernstein. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Naregudam, Nirupana. Simulation of Any-to-One Communication Protocol for WSN in Cooja Simulator of Contiki OS. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-1289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McKnight, C., David May, and Keaton Jones. Numerical analysis of dike effects on the Mississippi River using a two-dimensional Adaptive Hydraulics model (AdH). Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/46120.

Full text
Abstract:
This report describes the hydraulic effects of dikes on water surface elevation (WSE) and velocities in the Mississippi River near Vicksburg, MS, from Interstate 20 to Highway 80 using a previously calibrated 2D Adaptive Hydraulics numerical model. Dike heights and their associated hydraulic roughness values were varied to quantify the overall effects of adjustments to dike fields. Steady flows characterized as low, medium, and high conditions were simulated. The WSE and velocity difference plots were generated to illustrate the hydraulic effects on the river under all scenarios discussed above. Overall, the dike adjustments had negligible impacts on WSEs and showed minimal effects on velocities on a system-wide scale.
APA, Harvard, Vancouver, ISO, and other styles
7

Robles, Marcelo, and Claudio Dachevsky. Evaluation of the efficacy and safety of cross-linked hyaluronic acid 30 mg/ml for filling nasolabial folds. Edited by María Fernanda Cristoforetti. Lugones Editorial, 2025. https://doi.org/10.47196/0590.

Full text
Abstract:
Introduction: the nasolabial folds (NLF) are a highly mobile facial region that undergoes multifactorial changes during aging. Cientific Hyaluronic Facial Implant 30® is a 30 mg/ml cross-linked hyaluronic acid (HRA) filler developed to optimize the results of this highly dynamic facial area. Objectives: to evaluate the safety and efficacy of Cientific Hyaluronic Facial Implant 30® (CH30), composed of 30 mg/ml HRA, for the correction of moderate to severe NLF. Materials and methods: a 12-month, prospective, multicenter clinical study that included 64 male and female patients between 30 and 75 years of age with moderate to severe NLF treated in both NLFs with CH30 to balance the asymmetry until optimal correction was achieved. Efficacy assessments by evaluators included analysis of NLF severity using the Wrinkle Severity Rating Scale (WSRS) and improvement using the Global Aesthetic Improvement Scale (GAIS). Safety was recorded throughout the study based on checks at each appointment and patient reporting of adverse events. Results: no adverse events were observed during the 12-month follow-up. In 100% of cases, defect correction, duration, and satisfaction were rated by patients and physicians as “improved” to “very improved,” with a very slow decrease in effect observed at 12 months. Conclusions: the use of AHR for the treatment of NLF is one of the most effective and safe options in current aesthetic medicine. Its ability to restore volume, smooth wrinkles, and improve skin quality make it a key tool for facial rejuvenation. The durability of the results, combined with its low complication rate, makes HRA widely recommended for patients seeking a natural and longlasting aesthetic improvement, making it one of the most popular interventions in modern aesthetic medicine.
APA, Harvard, Vancouver, ISO, and other styles
8

Dachevsky, Claudio. Lip volumization with cross-linked hyaluronic acid 18 mg/ml. Efficacy and safety in 102 treated patients. Edited by María Fernanda Cristoforetti. Lugones Editorial, 2025. https://doi.org/10.47196/0595.

Full text
Abstract:
Introduction: beauty trends have increased the demand for aesthetic procedures, especially the use of hyaluronic acid (HA), to rejuvenate the face and enhance lips. This safe and effective treatment hydrates, fills wrinkles, and restores volume to different areas of the face. HA is obtained from non-animal sources, is non-immunogenic, and possesses antioxidant properties. The perioral region, key to facial aging, is highly sought after for correcting wrinkles, folds, and the loss of definition caused by factors such as age, sun exposure, and lifestyle habits. Cross-linked hyaluronic acid (HRA) is an ideal option for restoring volume to this area. Objectives: to evaluate the safety, efficacy and adverse effects of using HRA 18 mg/ml as a lip filler. Materials and methods: a prospective clinical study included 102 patients (81 women and 21 men), aged 25–65, who required lip volumization and received Cientific Hyaluronic Facial Implant 18® (HRA 18 mg/ml). Treatment efficacy was assessed using the Global Aesthetic Improvement Scale (GAIS). Initial lip volume and perioral wrinkle severity were assessed using the photonumeric scales MERZ (Merz Lip Fullness Scale, MLFS) and Wrinkle Severity Rating Scale (WSRS), respectively. Safety was determined by analyzing local reactions at the injection site and the occurrence of adverse events. The product was administered at a dose of up to 1 ml per half of the lip in an initial application (T0), with follow-ups at 1, 3, and 8 months. If necessary, a single reapplication was performed during these follow-ups. Treatment efficacy was assessed at a final follow-up at 12 months. Results: adverse effects were mild, of immediate onset, common for this type of treatment, which resolved without the need for special treatment. The volumizing effect of HRA 18 mg/ml was effective in 98% of treated patients, with a gradual decrease after 12 months. A significant improvement in lip hydration and firmness was observed. Conclusions: HRA 18 mg/ml is a safe and effective treatment as a dermal filler in lips, with high volume retention and lasting up to 12 months. Patients and professionals experienced high satisfaction, and improvements in skin firmness and elasticity were observed. The results support HRA as a viable and beneficial option in aesthetic medicine.
APA, Harvard, Vancouver, ISO, and other styles
9

Adam, Gaelen P., Melinda Davies, Jerusha George, et al. Machine Learning Tools To (Semi-) Automate Evidence Synthesis. Agency for Healthcare Research and Quality (AHRQ), 2025. https://doi.org/10.23970/ahrqepcwhitepapermachine.

Full text
Abstract:
Introduction. Tools that leverage machine learning, a subset of artificial intelligence, are becoming increasingly important for conducting evidence synthesis as the volume and complexity of primary literature expands exponentially. In response, we have created a living rapid review and evidence map to understand existing research and identify available tools. Methods. We searched PubMed, Embase, and the ACM Digital Library from January 1, 2021, to April 3, 2024, for comparative studies, and identified older studies using the reference lists of existing evidence synthesis products (ESPs). We plan to update searches every 6 months. We included evaluations of machine learning or artificial intelligence tools to automate or semi-automate any stage of systematic review production. Two reviewers conducted title and abstract screening independently, with disagreements resolved through discussion or adjudication by a third reviewer. A single reviewer performed full-text screening and data extraction. We did not assess the quality of individual studies or the strength of evidence across studies. Extracted data included key characteristics of the tools (e.g., type of automation method, systematic review tasks automated), evaluation methods, and performance results (e.g., recall, measures of workload, accuracy, and the authors’ conclusions). The protocol was prospectively registered on the AHRQ website (https://effectivehealthcare.ahrq.gov/products/tools/protocol). Results. We included 56 studies, which evaluated the performance of tools primarily relative to standard human processes across various systematic review tasks. For search-related tools (7 studies), recall (the percent of relevant citations correctly identified) ranged from 0 to 97 percent (median 26%) compared to human-developed search strategies, while precision (the percent of identified citations that are relevant) ranged from 0 to 13.4 percent (median 4.3%). Tools designed to identify randomized controlled trials (RCTs) (6 studies) had recalls between 96 and 100 percent (median 98.5%), with precision ranging from 8 to 92 percent (median 44%), compared to either manual identification or PubMed’s “publication type” tags. Abstract screening tools (22 studies) had a median recall of 93 percent (range 1–100%) with human screening as the standard, while median burden reduction was 50 percent (range 1–93%), and median work saved over sampling to achieve 95 percent recall (WSS@95) was 54 percent (range 33–90%). Data extraction tools (9 studies) showed highly variable performance, with the percentage of data correctly extracted compared to manual extraction ranging from 0 to 99 percent (median 10%). Finally, tools used for risk of bias assessment (7 studies) showed modest agreement with human reviewers, with Cohen’s weighted kappa ranging from 0.11 to 0.48 (median 0.16). Discussion. Certain tools, particularly those for automatically identifying RCTs and prioritizing relevant abstracts in screening, show a high level of recall and precision, suggesting they are nearing widespread use with human oversight. However, other tools, such as those for searching and data extraction, show highly variable performance and are not yet reliable enough for semi-automation. This work revealed the importance of developing standardized evaluation frameworks for assessing the performance of machine learning and artificial intelligence tools in systematic review tasks. We did not assess the risk of bias or methodological quality of the included studies, which may affect the reliability and comparability of the reported performance outcomes. Additionally, the tools were evaluated in a variety of settings, tasks, and review questions, which introduces heterogeneity that makes direct comparisons across tools challenging. Lastly, the rapidly evolving nature of machine learning technologies means that our findings may quickly become outdated. Therefore, we have planned ongoing updates every 6 months.
APA, Harvard, Vancouver, ISO, and other styles
10

The Science System of the World Organisation for Animal Health. WOAH (World Organisation for Animal Health), 2024. http://dx.doi.org/10.20506/woah.3534.

Full text
Abstract:
Access to the best available science is critical to WOAH’s missions and is embedded in WOAH strategies. One of the goals of WOAH’s 7th Strategic Plan is to leverage scientific expertise to address multisectoral animal health and welfare issues to develop international animal health policy that is supported by science. The purpose of this document is to describe the existing structure and functioning of WOAH’s science system (WSS). It illustrates the mechanisms by which WOAH leverages science and uses its scientific network to ensure that its recommendations and technical outputs are based on the latest science, aligned with best practices, and optimised to support WOAH’s missions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!