找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Wireless Sensor Networks; Principles, Design a Shuang-Hua Yang Book 2014 Springer-Verlag London 2014 Embedded Software.Environment Monitori

[复制链接]
楼主: 军械
发表于 2025-3-23 13:47:43 | 显示全部楼层
Embedded Software Design for WSNs,d data transmission and reception. The embedded software architecture for WSNs is given with the Jennic ZigBee and the Contiki 6LowPAN as two examples. Examples of both analog and digital sensor driver developments are introduced. The implementation of establishing WSNs is illustrated by adopting an
发表于 2025-3-23 16:39:45 | 显示全部楼层
Routing Technologies in WSNs,or reactive routings or based on network structures or network protocol operations. After briefly introducing general routing protocols, the Ad hoc On-Demand Distance Vector (AODV) routing protocol and the cluster-tree routing methods are described in detail. These are commonly used by ZigBee networ
发表于 2025-3-23 20:48:14 | 显示全部楼层
Optimization of Sink Node Positioning, include an infinite solution space, the involvement of a huge number of sensor nodes, the different network architectures and routing protocols in use, different sensor node capabilities, and different application needs. This chapter categorizes the optimal sink node positioning problem in terms of
发表于 2025-3-24 00:17:18 | 显示全部楼层
Interference of WSNs with IEEE 802.11b Systems,ber of wireless technologies such as 6LowPAN, ZigBee, Bluetooth, and WiFi are all using the 2.4 GHz free-licence frequency band, the possibility of interference between them has to be addressed in any design and implementation of a WSN. This chapter initially identifies the causes of interference in
发表于 2025-3-24 04:16:13 | 显示全部楼层
Sensor Data Fusion and Event Detection,lude the sensors’ internal errors, a harsh environment in which the sensors are deployed, and data loss occurring during wireless transmission. Sensor data fusion consists of three steps, data pre-processing, data mining, and data post-processing. This chapter discusses data pre-processing and data
发表于 2025-3-24 08:48:38 | 显示全部楼层
WSN Security,s them attractive targets for unscrupulous individuals to subvert, in an attempt to gain access to the WSNs and/or disrupt the interactions of users with both the networks and subsequently with their environment. Consequently, providing effective security is crucial for the successful adoption and o
发表于 2025-3-24 11:34:33 | 显示全部楼层
发表于 2025-3-24 18:34:27 | 显示全部楼层
发表于 2025-3-24 22:47:14 | 显示全部楼层
发表于 2025-3-25 00:13:44 | 显示全部楼层
Building Fire Safety Protection: SafetyNET,on about the building, occupants and/or the location of the hazard. They do not know whether it is safe to enter and how to most efficiently deal with the hazard. This chapter introduces a completed UK government funded project ‘Secure Adhoc Fire and Emergency safety NETwork (SafetyNET)’, which meet
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 21:00
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表